PSJsonWebToken
jose-jwt
Our great sponsors
PSJsonWebToken | jose-jwt | |
---|---|---|
2 | 2 | |
23 | 900 | |
- | - | |
7.1 | 8.8 | |
2 months ago | 16 days ago | |
PowerShell | C# | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
PSJsonWebToken
-
cUrl to Invoke-RestMethod
So it depends on if your endpoint accepts JWTs. Generally I obtain a JWT from a seperate endpoint by passing a client ID and secret via IRM. The other way for endpoints that I "own" is that I generate one myself via New-JsonWebToken in my PSJsonWebToken module. Examples in readme here under "Token decoding, creation, and validation": https://github.com/anthonyg-1/PSJsonWebToken
-
Module for interacting with JWTs and JWKs
Hello again! I've written a PowerShell module, PSJsonWebToken, that contains functions to create, validate, and test JSON Web Tokens (JWT) as well as the creation of JSON Web Keys (JWK). This module has been useful to me in validating the security of endpoints that accept JWTs for authentication as well as generating JWKs for signature verification for JWTs in an OpenID Connect flow. There are also some advanced functions for base64 decoding and encoding, exporting .NET X509Certificate objects to formatted strings, etc. https://github.com/anthonyg-1/PSJsonWebToken
jose-jwt
-
Creating a JWT RS256 with private key
Use the jose-jwt library and thank me later
-
PowerShell, ADFS, and OpenID Connect: A tale of glory or infinite sadness?
As far as using something other than oAuth its all about what your app supports. If basic authentication is supported, go ahead and send your credentials straight to the server as a -credential and skip ADFS. The REST API we have at work can handle tokens signed with different keys so if a client wanted to generate a RSA keypair and share the public key with us they could generate and sign their own token (jose-jwt works well in PS for this) and submit it straight to the server without going through ADFS. Again, its all about what your app is capable of.
What are some alternatives?
jwt - Safe, simple and fast JSON Web Tokens for Go
authlib - The ultimate Python library in building OAuth, OpenID Connect clients and servers. JWS,JWE,JWK,JWA,JWT included.
fusionauth-jwt - A simple to use Java 8 JWT Library. Verify, Sign, Encode, Decode all day.
jjwt - Java JWT: JSON Web Token for Java and Android
jose - JWA, JWS, JWE, JWT, JWK, JWKS for Node.js, Browser, Cloudflare Workers, Deno, Bun, and other Web-interoperable runtimes.
JOSESwift - A framework for the JOSE standards JWS, JWE, and JWK written in Swift.
jenkins - PowerShell module for interacting with a CloudBees Jenkins server using the Jenkins Rest API.
google-oauth2-jwt - Get the signed JWT for Google Service Accounts
angular-auth-oidc-client - npm package for OpenID Connect, OAuth Code Flow with PKCE, Refresh tokens, Implicit Flow
IdentityModel.OidcClient.Samples