Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Creates a new JSON Web Token (JWT) for testing purposes.
Usage
devproxy jwt create [options]
Example
Generates a JWT for a user named Megan Bowen
with the issuer my-app
and audience https://myserver.com
. The token includes the role admin
, scopes read
and write
, and a custom claim custom:claim
. The token is valid for 120 minutes.
devproxy jwt create --name "Megan Bowen" --issuer "my-app" --audience "https://myserver.com" --roles "admin" --scopes "read" --scopes "write" --claims "custom:claim" --valid-for 120
Arguments
None
Options
Name | Description | Allowed values | Default |
---|---|---|---|
-n, --name |
The name of the user to create the token for. | string | Dev Proxy |
-i, --issuer |
The issuer of the token. | string | dev-proxy |
-a, --audience |
The audiences to create the token for. Specify once for each audience. | string | https://myserver.com |
-r, --roles |
A role claim to add to the token. Specify once for each role. | string | None |
-s, --scopes |
A scope claim to add to the token. Specify once for each scope. | string | None |
--claims |
Claims to add to the token. Specify once for each claim in the format name:value . |
None | |
-v, --valid-for |
The duration which the token is valid for. Duration is set in minutes. | 60 |
|
--signing-key |
The key to use to sign the token. Must be at least 32 characters long. | Randomly generated | |
--log-level <loglevel> |
Level of messages to log | trace , debug , information , warning , error |
information |
Note
Registered claims (e.g. iss
, sub
, aud
, exp
, nbf
, iat
, jti
) are automatically added to the token. If you specify any of these claims in the --claims
option, the values you provide will be ignored.