Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 574

JWT (JSON Web Token)

What is JWT (JSON Web Token)?

JWT (JSON Web Token)Compact, URL-safe token format (RFC 7519) that carries signed JSON claims, widely used as access tokens, ID tokens, and session containers.


A JSON Web Token is a string of three Base64URL-encoded parts joined by dots: header, payload, and signature. The header declares the signing algorithm, the payload carries claims such as iss, sub, aud, exp, and custom data, and the signature lets a recipient verify integrity and origin. JWTs may be signed (JWS) or encrypted (JWE) and are central to OAuth 2.0, OpenID Connect, and service-to-service authentication. Their stateless nature simplifies horizontal scaling but complicates revocation. Always pin the algorithm server-side, validate aud, iss, and exp, prefer short lifetimes, and pair with refresh tokens or token introspection.

Examples

  1. 01

    An OIDC ID token signed with RS256 returned to a single-page app.

  2. 02

    An access token with claims { "sub": "u123", "scope": "read:profile", "exp": 1734567890 }.

Frequently asked questions

What is JWT (JSON Web Token)?

Compact, URL-safe token format (RFC 7519) that carries signed JSON claims, widely used as access tokens, ID tokens, and session containers. It belongs to the Identity & Access category of cybersecurity.

What does JWT (JSON Web Token) mean?

Compact, URL-safe token format (RFC 7519) that carries signed JSON claims, widely used as access tokens, ID tokens, and session containers.

How does JWT (JSON Web Token) work?

A JSON Web Token is a string of three Base64URL-encoded parts joined by dots: header, payload, and signature. The header declares the signing algorithm, the payload carries claims such as iss, sub, aud, exp, and custom data, and the signature lets a recipient verify integrity and origin. JWTs may be signed (JWS) or encrypted (JWE) and are central to OAuth 2.0, OpenID Connect, and service-to-service authentication. Their stateless nature simplifies horizontal scaling but complicates revocation. Always pin the algorithm server-side, validate aud, iss, and exp, prefer short lifetimes, and pair with refresh tokens or token introspection.

How do you defend against JWT (JSON Web Token)?

Defences for JWT (JSON Web Token) typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for JWT (JSON Web Token)?

Common alternative names include: JSON Web Token.

Related terms

See also