All toolsESC
Security / JWT Encoder
JWT Encoder
Build JWT tokens with custom header and payload, signed with HMAC-SHA256.
Header
ALGORITHMPayload
DATAError
Edit & generate
Set your header, payload, and secret, then hit Generate.
Tips
HS256 — HMAC with SHA-256 signing
iat — Add issued-at timestamp
exp — Add expiry as Unix timestamp
Secret — Leave empty for unsigned token
Try next
About JWT Encoder
Build and sign JWT tokens with custom headers and payloads using HMAC-SHA256. RAW's JWT Encoder lets you create tokens for testing APIs, debugging authentication flows, and prototyping without needing a backend. Set custom claims, expiration times, and signing secrets.
How to use
- 1Edit the header JSON (algorithm and type are pre-filled).
- 2Edit the payload with your custom claims (sub, iss, exp, etc.).
- 3Enter your HMAC secret key for signing.
- 4The signed JWT token is generated in real-time — copy and use it.
Frequently Asked Questions
Which signing algorithms are supported?
RAW currently supports HMAC-SHA256 (HS256) for JWT signing. This is the most commonly used symmetric signing algorithm for JWT tokens.
Is it safe to enter my secret key?
Yes. The signing happens entirely in your browser. Your secret key is never transmitted to any server. However, never use production signing keys in any web tool — use test keys only.
Can I set custom expiration times?
Yes. Add an exp claim to your payload with a Unix timestamp. You can also add iat (issued at), nbf (not before), and any custom claims you need.