JwtUtils 1.3.5
There is a newer version of this package available.
See the version list below for details.
See the version list below for details.
dotnet add package JwtUtils --version 1.3.5
NuGet\Install-Package JwtUtils -Version 1.3.5
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="JwtUtils" Version="1.3.5" />
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add JwtUtils --version 1.3.5
The NuGet Team does not provide support for this client. Please contact its maintainers for support.
#r "nuget: JwtUtils, 1.3.5"
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install JwtUtils as a Cake Addin #addin nuget:?package=JwtUtils&version=1.3.5 // Install JwtUtils as a Cake Tool #tool nuget:?package=JwtUtils&version=1.3.5
The NuGet Team does not provide support for this client. Please contact its maintainers for support.
JwtUtils
Fastest, low-allocation, simple API library to work with JWT-tokens
It wrap most useful API to work with JWT (Create, Validate, Read)
Now you don't need to use strange and inconvenient API in other packages<br/><br/>
Available algorithms:
Symmetric: HS256, HS384, HS512
Asymmetric: RS256, RS384, RS512
Benchmarks:
Comparing JwtUtils (Current) VS JWT-Dotnet VS System.IdentityModel.Tokens.Jwt
See https://github.com/ZOXEXIVO/JwtUtils
Usage
Symmetric algorithms: HS256, HS384, HS512
Create (Untyped payload)
var claims = new Dictionary<string, object>
{
{ "exp", 1639942616 },
{ "uname", "i.a.ivanov" },
{ "claim1", "claim1_value" },
{ "claims_array", new [] {"claim_item1", "claim_item2"}}
};
var token = JWT.HS256.Create(claims, "{TOKEN_SECRET}");
Create (Typed payload)
public class JwtPayload
{
[JsonPropertyName("uid")]
public int UserId { get; set; }
}
var payload = new JwtPayload
{
UserId = 123
};
var token = JWT.HS256.Create(payload, "{TOKEN_SECRET}");
Validate
string token = "{YOUR_JWT_TOKEN}";
string tokenSecret = "{TOKEN_SECRET}";
if (JWT.HS256.ValidateSignature(token, tokenSecret))
{
// Token signature valid
}
Read
string token = "{JWT-TOKEN}";
// Default - no typed
var tokenResult = JWT.Read(token);
var expiration = token.Exp();
// You can map Jwt to your own model
var tokenResult = JWT.Read<CustomJwtModel>(token);
Asymmetric algorithms: RS256, RS384, RS512
Create (Untyped payload)
// Private key in default PEM format
string privateKey = "@"MIIJKgIBAAKCAgEA9GF97STxVGbXpBFmudS/RRT58mfiR/+t2zb4f/uF3qmYb/yu
b3CtKwYPtGkQncSvba2HSurYArAxsCU2QeSAYbmCgtiXcF2Hw8Xt/ADY711iBDwq
.............................................
O9wqUEJy2v8xOMbHvMkoKLPLc590zGV88HNvzJHkF5N5HWTB9ZZEWcehf6RcTA==";
var payload = new Dictionary<string, object>
{
{ "exp", 1639942616 },
{ "uname", "i.a.ivanov" },
{ "claim1", "claim1_value" },
{ "claim2", "claim2_value" },
{ "claim3", "claim3_value" },
{ "claims_array", new [] {"claim_item1", "claim_item2"}}
};
var token = JWT.RS256.Create(payload, privateKey);
Create (Typed payload)
// Private key in default PEM format
string privateKey = "@"MIIJKgIBAAKCAgEA9GF97STxVGbXpBFmudS/RRT58mfiR/+t2zb4f/uF3qmYb/yu
b3CtKwYPtGkQncSvba2HSurYArAxsCU2QeSAYbmCgtiXcF2Hw8Xt/ADY711iBDwq
.............................................
O9wqUEJy2v8xOMbHvMkoKLPLc590zGV88HNvzJHkF5N5HWTB9ZZEWcehf6RcTA==";
public class JwtPayload
{
[JsonPropertyName("uid")]
public int UserId { get; set; }
}
var payload = new JwtPayload
{
UserId = 123
};
var token = JWT.RS256.Create(payload, privateKey);
Validate
// Public key with PEM format
string publicKey = "@"MIIJKgIBAAKCAgEA9GF97STxVGbXpBFmudS/RRT58mfiR/+t2zb4f/uF3qmYb/yu
b3CtKwYPtGkQncSvba2HSurYArAxsCU2QeSAYbmCgtiXcF2Hw8Xt/ADY711iBDwq
.............................................
O9wqUEJy2v8xOMbHvMkoKLPLc590zGV88HNvzJHkF5N5HWTB9ZZEWcehf6RcTA==";
if (JWT.RS256.ValidateSignature("{YOUR_JWT_TOKEN}", publicKey))
{
// Token signature valid
}
Read
string token = "{JWT-TOKEN}";
// Default - untyped Dictionary<string, object>
var tokenResult = JWT.Read(token);
var expiration = token.Exp();
// You can map Jwt to your own model
var tokenResult = JWT.Read<CustomJwtModel>(token);
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net5.0 was computed. net5.0-windows was computed. net6.0 was computed. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
.NET Core | netcoreapp3.0 was computed. netcoreapp3.1 was computed. |
.NET Standard | netstandard2.1 is compatible. |
MonoAndroid | monoandroid was computed. |
MonoMac | monomac was computed. |
MonoTouch | monotouch was computed. |
Tizen | tizen60 was computed. |
Xamarin.iOS | xamarinios was computed. |
Xamarin.Mac | xamarinmac was computed. |
Xamarin.TVOS | xamarintvos was computed. |
Xamarin.WatchOS | xamarinwatchos was computed. |
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.
-
.NETStandard 2.1
- Microsoft.IO.RecyclableMemoryStream (>= 3.0.0)
- System.Text.Json (>= 8.0.1)
NuGet packages (1)
Showing the top 1 NuGet packages that depend on JwtUtils:
Package | Downloads |
---|---|
EnvusoHttpFramework
Package Description |
GitHub repositories
This package is not used by any popular GitHub repositories.