Security JWT
What this category is for
Use JWT nodes to decode tokens, verify signature/claims, or sign tokens inside workflows. This is runtime token handling and does not depend on gateway auth profile settings.
Node list table
| Node type | Purpose | Key inputs | Branch outputs |
|---|---|---|---|
jwt_node | Perform decode, verify, or sign operations on JWTs. | Config: operation, plus mode-specific fields (method, secret, jwks_url, issuer, audience, algorithm, expiry_seconds); Input: token for decode/verify, claims for sign | valid, invalid (verify only) |
Common patterns
1) Bearer token verification gate
- Extract bearer token from request header into input
token - Configure
operation: verify,method: hs256, andsecret - Route
validto business flow,invalidto 401 response
2) OIDC-style verification via JWKS
- Configure
operation: verify,method: jwks,jwks_url - Optionally enforce
issuerandaudience - Use
payloadclaims downstream for authorization decisions
3) Token introspection-lite for logging
- Configure
operation: decodeto inspect header/payload without signature enforcement - Use only for observability/debugging, not security decisions
4) Service token minting
- Configure
operation: signwithsecretand optionalexpiry_seconds - Pass
claimsinput from upstreamset_node/code_node
Common mistakes and how to debug
- Missing
secretonhs256verify/sign: verify returnsinvalid; sign returns execution error. Confirm config uses non-empty secret. - JWKS verify failing with
kiderrors: token header must includekid; JWKS endpoint must expose matching key. - Bearer prefix issues: node trims
Bearerautomatically, but malformed token format still returns invalid. - Issuer/audience mismatch: verify may pass signature but fail claim checks; inspect
erroroutput for exact mismatch. - Using
decodefor access control: decode does not verify signature. Useverifyfor trust decisions.