JSON Web Token(JWT)

Quickly learn about JWT and how to use it on All That Node!

What is JSON Web Token?

JSON Web Token (JWT) is an open, industry standard RFC 7519 method for representing claims securely between two parties. You can enable JWT in All That Node and send requests with JWT to ensure only authorized requests are available. — an excerpt from

When should you use JSON Web Tokens?

JSON Web Tokens (JWTs) provide a secure method of exchanging information between different entities. By employing techniques such as signing with public/private key pairs, JWTs offer assurance regarding the authenticity of the senders. Furthermore, the inclusion of the header and payload in the signature calculation allows for the verification of data integrity, ensuring that the content has not been altered.

How to use JWT with All That Node projects?

It may look complicated, but it's not. We will guide you to successful JWT setting.
You can add up to 25 JWTs for one project.

Step 1. Generate the private / public key pair

  1. 1.
    Generate key pair that conforms the RS256 or ES256 algorithm . You can use some tools such as openSSL.
  2. 2.
    Example to create the private / public key pair
    // RSA
    openssl genrsa -out private.pem 2048
    openssl rsa -in private.pem -outform PEM -pubout -out public.pem
    // EC256
    openssl ecparam -name prime256v1 -genkey -noout -out privtemp.pem
    openssl pkcs8 -in privtemp.pem -topk8 -nocrypt -out private.pem
    openssl ec -in private.pem -pubout -out public.pem

Step 2. Upload the public key to your project dashboard

If you register at least one public key, a request without a JWT fails.
  1. 1.
    Go to your "Security" menu on your dashboard.
  2. 2.
    Click the "Add a Public Key" button.
  3. 3.
    (Optional) Enter a name.
  4. 4.
    Upload the public key that you generated above to “JWT Public Key” section.
  5. 5.
    Click "Add" to register your public key.
  6. 6.
    Check the "Id" of your public key is added to the list in the security settings. It is used as the "kid" (Key ID) for generating the JWT.

Step 3. Generate JWT

You have to set header, payload, signature to generate a JWT. Visit for more examples!
Those 3 parts make up the JWT and are separated by ".”. Thus, JWT looks like:

1. Header

"alg": "RS256",
"typ": "JWT",
"kid": "54f26cb4-15a9-11ee-a1d8-0a58538e0d0c"
The signing algorithm being used.
The type of the token you are going to generate.
The public key "Id" from All That Node Dashboard.

2. Payload

"exp": 1719511840,
"nbf": 1687834195,
"aud": ""
(Optional) Expiration timestamp for the JWT. (Unix timestamp)
(Optional) The JWT is valid only after the current time. (Unix timestamp)
(Optional) If this audience option exists, the token is valid only when the value ends with " ", case-insensitive
💡 The presence of "exp," "nbf," and "aud" fields in the JSON Web Tokens (JWTs) is not mandatory. The JWT will be accepted without any further inspection if the optional fields "exp," "nbf," and "aud" are not present in the token.

3. Signature

To create the signature part of the JWT, you have to encode the header and payload according to the JWT specification and then sign them.
💡 you can generate JWT easily on

4. Send a request with JWT

Almost finished! When you send a request, add generated JWT to the head of request, or the request fails.f
Please put the JWT in Authorization HTTP header. You can use curl with -H "Authorization: Bearer <JWT>"
curl -X POST \
-H "Content-Type: application/json" \
-H "Authorization: Bearer <YOUR_JWT>" \
--data '{"jsonrpc": "2.0", "id": 1, "method": "eth_blockNumber", "params": []}' \


Q: I want to force the issued JWT to expire.
A: If you suspect that the issued JWT might have been compromised and you wish to prevent its usage, you can remove the corresponding public key from the security settings within your project.
Q: Which cipher does All That Node support?
A: For now, All That Node supports RSA 256(RS256) and ECDSA 256(ES256), as specified in RFC7518 table 3.1.
Q: Can I add multiple JWTs to a project?
A: You can activate up to 25 JWTs on a project at once.
Q: My requests return 403 errors.
A: The 403 error indicates that the server understood the request, but it refuses to authorize it. There are a few potential reasons for this error:
  1. 1.
    Invalid JWT format: Ensure that the JWT included in the request header is correctly formatted according to the expected specifications. Verify that the header, payload, and signature are properly constructed.
  2. 2.
    Expired JWT: Check the expiration time (exp claim) of the JWT. If the JWT has exceeded its expiration time, it will no longer be considered valid for authentication.
  3. 3.
    Security settings: If you have enabled additional security measures in your project, such as IP blocking or other access restrictions, make sure your requests comply with these settings. If your IP address has been blocked or restricted, you may encounter a 403 error.