<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with jwt]]></title><description><![CDATA[A list of topics that have been tagged with jwt]]></description><link>https://fusionauth.io/community/forum/tags/jwt</link><generator>RSS for Node</generator><lastBuildDate>Wed, 15 Apr 2026 13:06:57 GMT</lastBuildDate><atom:link href="https://fusionauth.io/community/forum/tags/jwt.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[Getting custom information from the hosted login pages into the JWT]]></title><description><![CDATA[<p dir="auto">This is not available today without some glue code.</p>
<p dir="auto">Currently our suggestion is to use Javascript on the Login page to jam the claim into a meta field that is shown on a Webhook payload, like jamming stuff into event.info.deviceDescription .</p>
<p dir="auto">Then you create user.login.success webhook, making sure it is transactional. On login, the event is fired that off to your system and then you extract the claim off the event.info.deviceDescription field and make a PATCH call to FusionAuth. In that PATCH call, you add this to a field on user.data.x.</p>
<p dir="auto">Then once that PATCH is successful, the 200 response back to the user.login.success event which completes the login and triggers the JWT populate lambda. That lambda extracts the claim off the user.data.x field and puts it into the JWT.</p>
<p dir="auto">It's not pretty but it is the only way to have this work for now. (For self-service registration you can use a custom hidden field, much easier.)</p>
<p dir="auto">Relevant docs:</p>

<a href="https://fusionauth.io/docs/extend/code/lambdas/jwt-populate" rel="nofollow ugc">https://fusionauth.io/docs/extend/code/lambdas/jwt-populate</a>
<a href="https://fusionauth.io/docs/extend/events-and-webhooks/events/user-login-success" rel="nofollow ugc">https://fusionauth.io/docs/extend/events-and-webhooks/events/user-login-success</a>
<a href="https://fusionauth.io/docs/apis/users#update-a-user" rel="nofollow ugc">https://fusionauth.io/docs/apis/users#update-a-user</a>

]]></description><link>https://fusionauth.io/community/forum/topic/2917/getting-custom-information-from-the-hosted-login-pages-into-the-jwt</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/2917/getting-custom-information-from-the-hosted-login-pages-into-the-jwt</guid><dc:creator><![CDATA[dan]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[JWT Validation Issues with RSA-SHA256 and JwtBearer Middleware (.NET &#x2F; C#)]]></title><description><![CDATA[<p dir="auto">Hi everyone,</p>
<p dir="auto">I'm facing challenges validating JWTs generated by FusionAuth using RSA-SHA256 within my .NET application using the JwtBearer middleware. I've generated a public/private key pair in the FusionAuth Key Master and configured my application as follows:</p>
<pre><code class="language-cs">public static void AddFusionAuthentication(this IServiceCollection services)
{
    var fusionAuthSettings = services.BuildServiceProvider().GetRequiredService&lt;IOptions&lt;FusionAuthSettings&gt;&gt;().Value;
    byte[] publicKeyBytes = Convert.FromBase64String(fusionAuthSettings.IssuerSigningPublicKey);
    
    services
        .AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
        .AddJwtBearer(opt =&gt;
        {
            opt.Authority = fusionAuthSettings.FusionAuthUrl;
            opt.Audience = fusionAuthSettings.ClientId;
            opt.IncludeErrorDetails = true; // for debugging

            opt.TokenValidationParameters = new()
            {
                ValidateIssuer = true,
                ValidIssuers = [fusionAuthSettings.Issuer],
                ValidateIssuerSigningKey = true,
                IssuerSigningKey = new SymmetricSecurityKey(publicKeyBytes)
            };
        });

    services.AddAuthorization(options =&gt; { });
}
</code></pre>
<p dir="auto">However, I'm encountering two unexpected scenarios:</p>
<ol>
<li>The JWT validation succeeds regardless of the value I set for IssuerSigningPublicKey.</li>
<li>Even when using the correct public key from FusionAuth, JWTs signed with different keys are still validated successfully.</li>
</ol>
<p dir="auto">It seems like the signature validation isn't working as expected.</p>
<p dir="auto">Has anyone else encountered similar issues? Could there be a configuration problem in FusionAuth or my .NET application? Any guidance or suggestions for troubleshooting would be greatly appreciated.</p>
<p dir="auto">Thanks in advance!</p>
]]></description><link>https://fusionauth.io/community/forum/topic/2707/jwt-validation-issues-with-rsa-sha256-and-jwtbearer-middleware-net-c</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/2707/jwt-validation-issues-with-rsa-sha256-and-jwtbearer-middleware-net-c</guid><dc:creator><![CDATA[chukwuemekai]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[How to generate and authorized java spring controller using JWT]]></title><description><![CDATA[<p dir="auto"><a class="mention plugin-mentions-user plugin-mentions-a" href="https://fusionauth.io/community/forum/uid/2561">@shyamsundar-k</a> said in <a href="/community/forum/post/6388">How to generate and authorized java spring controller using JWT</a>:</p>
<blockquote>
<p dir="auto">We need to pass the token in the API header as Authorization: Bearer&lt;token&gt; But what is the process so that I can validate the endpoint with the valid token if the token is invalid or does not have the required roles or scope then I should get 401 else I should be able to access the API successfully.</p>
</blockquote>
<p dir="auto">Once you have a token in your API, you can validate it in two different ways. But it's worth noting that to validate the token, you must validate the signature and then the claims.</p>
<p dir="auto">First option: use a library to validate the signature. Most languages have options. For java, <a href="https://github.com/fusionauth/fusionauth-jwt#verify-and-decode-a-jwt-using-rsa" rel="nofollow ugc">you can use fusionauth-jwt, the readme has sample code</a>.</p>
<p dir="auto">Second option: <a href="https://fusionauth.io/docs/v1/tech/apis/jwt#validate-a-jwt" rel="nofollow ugc">use the validate API</a>. You could use the <a href="https://github.com/FusionAuth/fusionauth-java-client/blob/master/src/main/java/io/fusionauth/client/FusionAuthClient.java#L5399" rel="nofollow ugc">FusionAuth client library</a> to make this call if you'd like.</p>
<p dir="auto">The first means you have to pick a library. The second means you have to make a network call.</p>
<p dir="auto">Either way, after you validate the signature, you need to check the claims (issuer, audience, expiration, custom claims) to make sure they are what you expect.</p>
<p dir="auto">Here's more about how to <a href="https://fusionauth.io/articles/tokens/building-a-secure-jwt#consuming-a-jwt" rel="nofollow ugc">consume a JWT</a>.</p>
]]></description><link>https://fusionauth.io/community/forum/topic/2456/how-to-generate-and-authorized-java-spring-controller-using-jwt</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/2456/how-to-generate-and-authorized-java-spring-controller-using-jwt</guid><dc:creator><![CDATA[dan]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Does fusion auth supports es256k header for secp256k1 curve keys?]]></title><description><![CDATA[<p dir="auto">Hiya <a class="mention plugin-mentions-user plugin-mentions-a" href="https://fusionauth.io/community/forum/uid/2222">@benjamineroommen</a> ,</p>
<p dir="auto">I'm not sure what you mean? Are you talking about the JWT generated for a login event?</p>
]]></description><link>https://fusionauth.io/community/forum/topic/2337/does-fusion-auth-supports-es256k-header-for-secp256k1-curve-keys</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/2337/does-fusion-auth-supports-es256k-header-for-secp256k1-curve-keys</guid><dc:creator><![CDATA[dan]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[fusion auth versus jose4j library for jwt using secp256k]]></title><description><![CDATA[
ok main thing is, is it ok to use header ES256 for jwt created using secp256k1 keys?

<p dir="auto"><a href="https://datatracker.ietf.org/doc/html/rfc8812" rel="nofollow ugc">https://datatracker.ietf.org/doc/html/rfc8812</a> says, secp256k1 curve should only be used with ES256k header, but in authfusion even if we give k1 pair keys and then use sign and encode a JWT using EC, it will come as ES256 only, is that okay?</p>

Another doubt is, those jwt (k1 curve keys + ES256) created in authfusion is only able to verify in jose4j with .setRelaxVerificationKeyValidation() //needed if the key is smaller than 256 bits.

<p dir="auto">Without it we get the error:</p>
JWT processing failed. Additional details: &lsqb;&lsqb;17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: ES256/SHA256withECDSA expects a key using P-256 but was null):

<p dir="auto">Description inside <strong>setRelaxVerificationKeyValidation</strong> :</p>
Bypass the strict checks on the verification key. This might be needed, for example, if the JWT issuer is using 1024-bit RSA keys or HMAC secrets that are too small (smaller than the size of the hash output)

<p dir="auto">Is it the correct way to validate jwt created using ec in authfusion?</p>
]]></description><link>https://fusionauth.io/community/forum/topic/2315/fusion-auth-versus-jose4j-library-for-jwt-using-secp256k</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/2315/fusion-auth-versus-jose4j-library-for-jwt-using-secp256k</guid><dc:creator><![CDATA[benjamineroommen]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Jwks doesn&#x27;t have key to match kid or alg from JWT (client credentials token)]]></title><description><![CDATA[<p dir="auto">The tenant is using the "<strong>Default signing key (HS256)</strong>" for the access token.</p>
]]></description><link>https://fusionauth.io/community/forum/topic/2150/jwks-doesn-t-have-key-to-match-kid-or-alg-from-jwt-client-credentials-token</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/2150/jwks-doesn-t-have-key-to-match-kid-or-alg-from-jwt-client-credentials-token</guid><dc:creator><![CDATA[vlad.koshkarov]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Issuing Signature failed tokens]]></title><description><![CDATA[<p dir="auto">Created the github issue - <a href="https://github.com/FusionAuth/fusionauth-issues/issues/1795" rel="nofollow ugc">https://github.com/FusionAuth/fusionauth-issues/issues/1795</a></p>
]]></description><link>https://fusionauth.io/community/forum/topic/2115/issuing-signature-failed-tokens</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/2115/issuing-signature-failed-tokens</guid><dc:creator><![CDATA[aleksandr.vits-rimer]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[When and how should I validate a JWT issued by FusionAuth?]]></title><description><![CDATA[<p dir="auto">Validating the token on every new connection is considered best practice as it is the most secure.</p>
<p dir="auto">There are two ways to validate a token. You can do it within your own application code leveraging a library that checks the signature and validates the claims (this only works when you sign your JWTs with a public key). Or you can do it by calling out to FusionAuth, and then validating the claims. For scalability/simplicity reasons, we recommend using the library unless there are reasons it won't work</p>
<p dir="auto">By doing this server side using a library you no longer need to make the API call to FusionAuth to perform the validation. You would only need the public key of whichever signing key was used by FusionAuth. More on that here: <a href="https://fusionauth.io/docs/v1/tech/core-concepts/key-master#overview" rel="nofollow ugc">https://fusionauth.io/docs/v1/tech/core-concepts/key-master#overview</a> The public key is available via JWKS.</p>
<p dir="auto">When using keys we also recommend you think about key rotation, explained in more detail here: <a href="https://fusionauth.io/docs/v1/tech/tutorials/key-rotation" rel="nofollow ugc">https://fusionauth.io/docs/v1/tech/tutorials/key-rotation</a></p>
<p dir="auto">If you decide on leveraging the endpoints (making a call to FusionAuth) for validation, here are a couple links that can be used depending on your scenario.</p>
<p dir="auto"><a href="https://fusionauth.io/docs/v1/tech/apis/jwt#validate-a-jwt" rel="nofollow ugc">https://fusionauth.io/docs/v1/tech/apis/jwt#validate-a-jwt</a> (proprietary)<br />
<a href="https://fusionauth.io/docs/v1/tech/oauth/endpoints#userinfo" rel="nofollow ugc">https://fusionauth.io/docs/v1/tech/oauth/endpoints#userinfo</a> (part of the OIDC standard)</p>
<p dir="auto">In both cases, you must validate the claims. Some are standard, as outlined here: <a href="https://fusionauth.io/learn/expert-advice/tokens/anatomy-of-jwt#claims-to-verify" rel="nofollow ugc">https://fusionauth.io/learn/expert-advice/tokens/anatomy-of-jwt#claims-to-verify</a></p>
<p dir="auto">But there may be app specific custom claims your code should verify too.</p>
]]></description><link>https://fusionauth.io/community/forum/topic/2107/when-and-how-should-i-validate-a-jwt-issued-by-fusionauth</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/2107/when-and-how-should-i-validate-a-jwt-issued-by-fusionauth</guid><dc:creator><![CDATA[dan]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[How can I pass info from a external identity provider to a JWT in FusionAuth]]></title><description><![CDATA[<p dir="auto">The way to do this is to use the user.data or registration.data objects as a transfer mechanism.</p>
<p dir="auto">If you are using OIDC (SAML is much the same, but I'll use OIDC as an example), you can create a OIDC Reconcile Lambda. It might look like this:</p>
// Using the JWT returned from UserInfo, reconcile the User and User Registration.
function reconcile(user, registration, jwt) {
  user.data.favoriteColor = jwt.favoriteColor;
}

<p dir="auto">So the jwt in this case is that returned from the OIDC identity provider. We store the data in user.data.</p>
<p dir="auto">Now we need to pull it off of the user.data object using a JWT populate lambda. That might look a little something like this:</p>
// Using the user and registration parameters add additional values to the jwt object.
function populate(jwt, user, registration) {
  jwt.favoriteColor = user.data.favoriteColor;
}

<p dir="auto">favoriteColor is now available as a claim in the JWT produced by FusionAuth.</p>
<p dir="auto">Don't forget to assign your lambdas to the correct operations. The OIDC Identity provider needs to be configured with the reconcile lambda. The application's JWT tab is the right place to configure the use of the JWT populate lambda.</p>
<p dir="auto">More information on all the lambda options available here: <a href="https://fusionauth.io/docs/v1/tech/lambdas/" rel="nofollow ugc">https://fusionauth.io/docs/v1/tech/lambdas/</a></p>
]]></description><link>https://fusionauth.io/community/forum/topic/975/how-can-i-pass-info-from-a-external-identity-provider-to-a-jwt-in-fusionauth</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/975/how-can-i-pass-info-from-a-external-identity-provider-to-a-jwt-in-fusionauth</guid><dc:creator><![CDATA[dan]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Do you support adding headers to the fusionauth generated jwt]]></title><description><![CDATA[<p dir="auto">No, FusionAuth doesn't support adding JWT headers to FusionAuth generated JWTs. I looked at the code and don't think it'd be a ton of work to add support; there's already some scaffolding in the fusionauth-jwt OSS project.</p>
<p dir="auto">I highly encourage anyone with this problem to file a feature request here with more details about your needs: <a href="https://github.com/fusionauth/fusionauth-issues/issues" rel="nofollow ugc">https://github.com/fusionauth/fusionauth-issues/issues</a></p>
<p dir="auto">We consult that in our roadmap planning. We also offer professional services if you need us to build it on a schedule. Please send a request to <a href="https://fusionauth.io/contact" rel="nofollow ugc">our sales department</a> if that is an option you'd like to pursue.</p>
<p dir="auto">An alternative would be to build a service that would re-sign your JWTs from FusionAuth with the needed header changes. Not optimal, I understand, but another avenue that might get you what you need.</p>
]]></description><link>https://fusionauth.io/community/forum/topic/966/do-you-support-adding-headers-to-the-fusionauth-generated-jwt</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/966/do-you-support-adding-headers-to-the-fusionauth-generated-jwt</guid><dc:creator><![CDATA[dan]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Getting error with OIDC identity provider]]></title><description><![CDATA[<p dir="auto">That is an encoded (signed) JWT being sent in response to the user info request that the FusionAuth OIDC identity provider is making.</p>
<p dir="auto">This is technically allowed in the <a href="https://openid.net/specs/openid-connect-core-1_0.html#UserInfoResponse" rel="nofollow ugc">OIDC spec</a>, but we do not currently support this response type.</p>
<p dir="auto">Per spec, the endpoint should support a JSON response which is the default unless the client requests a signed or encrypted response body.</p>
<p dir="auto">I would look at how your client is registered and see if it is asking for a JWT userinfo response at that time, and change it to be a normal JSON response. You could also <a href="https://github.com/fusionauth/fusionauth-issues/issues" rel="nofollow ugc">file an issue</a> detailing your needs for FusionAuth to support this user info response type.</p>
<p dir="auto">If that isn't an option, you could also look at using a SAML Identity Provider if the remote identity source supports that.</p>
]]></description><link>https://fusionauth.io/community/forum/topic/834/getting-error-with-oidc-identity-provider</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/834/getting-error-with-oidc-identity-provider</guid><dc:creator><![CDATA[dan]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Can you store JWTs in session cookies]]></title><description><![CDATA[<p dir="auto">Yes. You can use the Authorization Code grant with cookies. Here is a workflow diagram of this: <a href="https://fusionauth.io/learn/expert-advice/authentication/webapp/oauth-authorization-code-grant-jwts-refresh-tokens-cookies/" rel="nofollow ugc">https://fusionauth.io/learn/expert-advice/authentication/webapp/oauth-authorization-code-grant-jwts-refresh-tokens-cookies/</a></p>
]]></description><link>https://fusionauth.io/community/forum/topic/678/can-you-store-jwts-in-session-cookies</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/678/can-you-store-jwts-in-session-cookies</guid><dc:creator><![CDATA[dan]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Revoking access tokens]]></title><description><![CDATA[<p dir="auto">No, those tokens are completely de-coupled from FusionAuth (in a fundamental way, that is the point of those tokens).</p>
<p dir="auto">There are revocation strategies however, but they require some additional work.</p>
<p dir="auto">Here is one strategy we have documented: <a href="https://fusionauth.io/learn/expert-advice/tokens/revoking-jwts/" rel="nofollow ugc">https://fusionauth.io/learn/expert-advice/tokens/revoking-jwts/</a></p>
]]></description><link>https://fusionauth.io/community/forum/topic/639/revoking-access-tokens</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/639/revoking-access-tokens</guid><dc:creator><![CDATA[dan]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Should I validate my JWTs with FusionAuth or locally?]]></title><description><![CDATA[<p dir="auto">You should always validate your JWT locally.</p>
<p dir="auto"><a href="https://fusionauth.io/docs/v1/tech/core-concepts/authentication-authorization/" rel="nofollow ugc">As outlined in this doc</a>, you need to make sure, at a minimum, that the aud, roles, and iss claims are as expected, and that can only be done by looking at a JWT and examining those claims. If you use a library that supports JWKS, doing this should be super simple.</p>
<p dir="auto">Note that the FusionAuth API endpoint validates JWTs at a basic level. It ensures that the JWT hasn't expired and that it was signed correctly.</p>
<p dir="auto">The reasons to use the API endpoint are:</p>

If you have an HMAC signed JWT and you don't want to share the secret with the JWT consumer
If you have no JWT library that is available (whether because it hasn't been written, or you don't want to deploy it with your application)
You are willing to accept a network call instead of loading up a such a library

]]></description><link>https://fusionauth.io/community/forum/topic/610/should-i-validate-my-jwts-with-fusionauth-or-locally</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/610/should-i-validate-my-jwts-with-fusionauth-or-locally</guid><dc:creator><![CDATA[dan]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[fusionauth-example-asp-netcore: Malformed client_id]]></title><description><![CDATA[<p dir="auto">That's great to hear, glad you figured it out!</p>
]]></description><link>https://fusionauth.io/community/forum/topic/576/fusionauth-example-asp-netcore-malformed-client_id</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/576/fusionauth-example-asp-netcore-malformed-client_id</guid><dc:creator><![CDATA[dan]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Validation of signed JWTs in an offline manner]]></title><description><![CDATA[<p dir="auto">If you want to skip calling FusionAuth for each of these validation events, you can validate the JWT on your end without a network call.</p>
<p dir="auto">If you configure a key pair (public + private) to sign your JWT, then the public key will be available in the JWKS. Many libraries exist that will validate JWTs using JWKS.</p>
<p dir="auto"><a href="https://fusionauth.io/docs/v1/tech/oauth/endpoints/#openid-configuration" rel="nofollow ugc">https://fusionauth.io/docs/v1/tech/oauth/endpoints/#openid-configuration</a><br />
<a href="https://fusionauth.io/docs/v1/tech/oauth/endpoints/#json-web-key-set-jwks" rel="nofollow ugc">https://fusionauth.io/docs/v1/tech/oauth/endpoints/#json-web-key-set-jwks</a></p>
]]></description><link>https://fusionauth.io/community/forum/topic/543/validation-of-signed-jwts-in-an-offline-manner</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/543/validation-of-signed-jwts-in-an-offline-manner</guid><dc:creator><![CDATA[dan]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Different JWT expiration times based on how they are generated]]></title><description><![CDATA[<p dir="auto">The JWT TTL can be configured per application, so if you were using a different application for OIDC vs an API - then you could do it.</p>
<p dir="auto">But if you don't want to use multiple applications, then it is not possible, at least currently.</p>
<p dir="auto">I could see a use case for asking for a JWT with a TTL equal to or less than the configuration and that request being honored, that could be a feature request. But as of right now, the only option is different applications.</p>
]]></description><link>https://fusionauth.io/community/forum/topic/492/different-jwt-expiration-times-based-on-how-they-are-generated</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/492/different-jwt-expiration-times-based-on-how-they-are-generated</guid><dc:creator><![CDATA[dan]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Token type?]]></title><description><![CDATA[<p dir="auto">Seems like the library I used is opinionated. Thanks for the hints.</p>
]]></description><link>https://fusionauth.io/community/forum/topic/433/token-type</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/433/token-type</guid><dc:creator><![CDATA[AliMirlou]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Are FusionAuth access tokens always JWTs?]]></title><description><![CDATA[<p dir="auto">Yes. While OAuth2 access tokens aren't guaranteed by the spec to be JSON web tokens, in FusionAuth <a href="https://fusionauth.io/community/forum/topic/426/when-is-introspect-endpoint-needed/4">access tokens are always JWTs</a>.</p>
]]></description><link>https://fusionauth.io/community/forum/topic/430/are-fusionauth-access-tokens-always-jwts</link><guid isPermaLink="true">https://fusionauth.io/community/forum/topic/430/are-fusionauth-access-tokens-always-jwts</guid><dc:creator><![CDATA[dan]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>