JWA, JWS, JWE, JWT, JWK, JWKS for Node.js, Browser, Cloudflare Workers, Deno, Bun, and other Web-interoperable runtimes
npm install josejose is a JavaScript module for JSON Object Signing and Encryption, providing support for JSON Web Tokens (JWT), JSON Web Signature (JWS), JSON Web Encryption (JWE), JSON Web Key (JWK), JSON Web Key Set (JWKS), and more. The module is designed to work across various Web-interoperable runtimes including Node.js, browsers, Cloudflare Workers, Deno, Bun, and others.

If you want to quickly add JWT authentication to JavaScript apps, feel free to check out Auth0's JavaScript SDK and free plan. [Create an Auth0 account; it's free!][sponsor-auth0]
Support from the community to continue maintaining and improving this module is welcome. If you find the module useful, please consider supporting the project by becoming a sponsor.
jose has no dependencies and it exports tree-shakeable ESM[^cjs].
jose is distributed via npmjs.com, jsr.io, jsdelivr.com, and github.com.
example ESM import[^cjs]
``js`
import * as jose from 'jose'
The jose module supports JSON Web Tokens (JWT) and provides functionality for signing and verifying tokens, as well as their JWT Claims Set validation.
- JWT Claims Set Validation & Signature Verification using the jwtVerify functionSignJWT
- Using a remote JSON Web Key Set (JWKS)
- Using a local JSON Web Key Set (JWKS)
- Signing using the class
- Utility functions
- Decoding Token's Protected Header
- Decoding JWT Claims Set prior to its validation
The jose module supports encrypted JSON Web Tokens and provides functionality for encrypting and decrypting tokens, as well as their JWT Claims Set validation.
- Decryption & JWT Claims Set Validation using the jwtDecrypt functionEncryptJWT
- Encryption using the class
- Utility functions
- Decoding Token's Protected Header
The jose module supports importing, exporting, and generating keys and secrets in various formats, including PEM formats like SPKI, X.509 certificate, and PKCS #8, as well as JSON Web Key (JWK).
- Key Import Functions
- JWK Import
- Public Key Import (SPKI)
- Public Key Import (X.509 Certificate)
- Private Key Import (PKCS #8)
- Key and Secret Generation Functions
- Asymmetric Key Pair Generation
- Symmetric Secret Generation
- Key Export Functions
- JWK Export
- Private Key Export
- Public Key Export
The jose module supports signing and verification of JWS messages with arbitrary payloads in Compact, Flattened JSON, and General JSON serialization syntaxes.
- Signing - Compact, Flattened JSON, General JSON
- Verification - Compact, Flattened JSON, General JSON
- Using a remote JSON Web Key Set (JWKS)
- Using a local JSON Web Key Set (JWKS)
- Utility functions
- Decoding Token's Protected Header
The jose module supports encryption and decryption of JWE messages with arbitrary plaintext in Compact, Flattened JSON, and General JSON serialization syntaxes.
- Encryption - Compact, Flattened JSON, General JSON
- Decryption - Compact, Flattened JSON, General JSON
- Utility functions
- Decoding Token's Protected Header
The following are additional features and utilities provided by the jose module:
- Calculating JWK Thumbprint
- Calculating JWK Thumbprint URI
- Verification using a JWK Embedded in a JWS Header
- Unsecured JWT
- JOSE Errors
The jose module is compatible with JavaScript runtimes that support the utilized Web API globals and standard built-in objects or are Node.js.
The following runtimes are supported _(this is not an exhaustive list)_:
- Bun
- Browsers
- Cloudflare Workers
- Deno
- Electron
- Node.js
Please note that certain algorithms may not be available depending on the runtime used. You can find a list of available algorithms for each runtime in the specific issue links provided above.
| Version | Security Fixes 🔑 | Other Bug Fixes 🐞 | New Features ⭐ | Runtime and Module type |
| ----------------------------------------------- | ----------------- | ------------------ | --------------- | ------------------------------- |
| v6.x | [Security Policy] | ✅ | ✅ | Universal[^universal] ESM[^cjs] |
| v5.x | [Security Policy] | ❌ | ❌ | Universal[^universal] CJS + ESM |
| v4.x | [Security Policy] | ❌ | ❌ | Universal[^universal] CJS + ESM |
| v2.x | [Security Policy] | ❌ | ❌ | Node.js CJS |
Details
- JSON Web Signature (JWS) - RFC7515
- JSON Web Encryption (JWE) - RFC7516
- JSON Web Key (JWK) - RFC7517
- JSON Web Algorithms (JWA) - RFC7518
- JSON Web Token (JWT) - RFC7519
- JSON Web Key Thumbprint - RFC7638
- JSON Web Key Thumbprint URI - RFC9278
- JWS Unencoded Payload Option - RFC7797
- CFRG Elliptic Curve ECDH and Signatures - RFC8037
- Fully-Specified Algorithms for JOSE - RFC9864
- ML-DSA for JOSE - draft-ietf-cose-dilithium-10
The algorithm implementations in jose have been tested using test vectors from their respective specifications as well as RFC7520.
[sponsor-auth0]: https://a0.to/signup/panva
[WebCryptoAPI]: https://w3c.github.io/webcrypto/
[Fetch API]: https://developer.mozilla.org/en-US/docs/Web/API/Fetch_API
[Security Policy]: https://github.com/panva/jose/security/policy
[^cjs]: CJS style let jose = require('jose') is possible in Node.js versions where the require(esm)` feature is enabled by default (^20.19.0 || ^22.12.0 || >= 23.0.0).
[^universal]: Assumes runtime support of [WebCryptoAPI][] and [Fetch API][]