Security / JWT Encoder

JWT Encoder

Build JWT tokens with custom header and payload, signed with HMAC-SHA256.

Header
ALGORITHM
Payload
DATA

Error

Edit & generate

Set your header, payload, and secret, then hit Generate.

Tips

HS256 — HMAC with SHA-256 signing

iat — Add issued-at timestamp

exp — Add expiry as Unix timestamp

Secret — Leave empty for unsigned token

About JWT Encoder

Build and sign JWT tokens with custom headers and payloads using HMAC-SHA256. RAW's JWT Encoder lets you create tokens for testing APIs, debugging authentication flows, and prototyping without needing a backend. Set custom claims, expiration times, and signing secrets.

How to use

  1. 1Edit the header JSON (algorithm and type are pre-filled).
  2. 2Edit the payload with your custom claims (sub, iss, exp, etc.).
  3. 3Enter your HMAC secret key for signing.
  4. 4The signed JWT token is generated in real-time — copy and use it.

Frequently Asked Questions

Which signing algorithms are supported?
RAW currently supports HMAC-SHA256 (HS256) for JWT signing. This is the most commonly used symmetric signing algorithm for JWT tokens.
Is it safe to enter my secret key?
Yes. The signing happens entirely in your browser. Your secret key is never transmitted to any server. However, never use production signing keys in any web tool — use test keys only.
Can I set custom expiration times?
Yes. Add an exp claim to your payload with a Unix timestamp. You can also add iat (issued at), nbf (not before), and any custom claims you need.