---
title: "JWT: 2 years later"
description: "Json Web Tokens (JWT) gets a logo, new website and more"
authors:
  - name: "Matias Woloski"
    url: "https://auth0.com/blog/authors/matias-woloski/"
date: "Jul 21, 2015"
category: "Identity & Security,Identity,JWT"
tags: ["jwt", "openid-connect", "logo"]
url: "https://auth0.com/blog/jwt-json-webtoken-logo/"
---

# JWT: 2 years later



In 2013 when we started building Auth0 we had to decide which standard we wanted our platform to be built on. Back then there was [WS-Fed](https://en.wikipedia.org/wiki/WS-Federation) and [SAML2](http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf). I was very familiar with both, having worked on many projects with Microsoft technologies. My main issue with these standards was that they were too complex: too many knobs and levers, interop issues and above all, a lack of libraries.

<!--more-->

On the other extreme we had OAuth2 which was rapidly being adopted because of its simplicity. It was also being used by Facebook, Google and many others. There were already libraries written in many languages, making it even more appealing.

However, [OAuth2](https://tools.ietf.org/html/rfc6749) was/is an __authorization__ protocol, not one specific for __authentication__ [[1](http://www.thread-safe.com/2012/01/problem-with-oauth-for-authentication.html)] [[2](http://homakov.blogspot.com.ar/2012/08/oauth2-one-accesstoken-to-rule-them-all.html)].

[OpenID Connect](http://openid.net/specs/openid-connect-core-1_0.html) was being drafted as a very thin layer on top of OAuth2 to overcome exactly that issue. With the introduction of [JSON Web Tokens](https://tools.ietf.org/html/rfc7519) there was now a simple way of verifying user identity and audience (the consumer of these tokens).

Back then it was on [draft-06](https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-06), and I decided to join the Working Group.

## Why is JWT so popular?

![](https://images.ctfassets.net/23aumh6u8s0i/6eRP0BpQt8Hf1qY6WHNRGk/34336bf2f0d2af90d7d920b9c0ed84c7/jwt-google-trend)

I think there are many reasons why JWT is being widely adopted:

* It embraces JSON which is already heavily adopted across many stacks.
* It is simple to use and simple to implement (hence more libraries and fewer interop issues).
* It supports symmetric and asymmetric crypto which solves the majority of use cases.

## Numbers speak for themselves

About 2 years since the first draft this simple, yet useful standard expanded:

![](https://images.ctfassets.net/23aumh6u8s0i/1PUSHZTPdUqD2jvVlkN47L/9f2f1b3696ac54aae970f444e9751a0d/banner-jwt)

* [972 GitHub repos](https://github.com/search?q=jwt) related to JWT.
* [2600+ StackOverflow](http://stackoverflow.com/search?q=jwt) threads.
* 400K page views on [jwt.io](http://jwt.io).
* [50K Google](https://www.google.com.ar/search?q="json+web+token") results.

If you use Android, AWS, Microsoft Azure, Salesforce, or Google then chances are that you are already using JWT.

<include src="TweetQuote" quoteText="If you use AWS, Microsoft Azure, Salesforce, or Google then chances are that you are already using JWT."/>

We very much believe in this standard so we wanted to keep making contributions to foster its adoption. We are happy to share the **new logo**, the **new website**, **badges**, and other things. :)


## New Logo

The central component of the branding is a logo symbol representing an individual JSON Web Token. The circular icon was designed to suggest a coin while avoiding being mistaken for a digital currency symbol.

Here are some initial sketches and colors:

![](https://images.ctfassets.net/23aumh6u8s0i/4XQlyCKEVRjmXqvPOwSj5q/3af5e76fc7292dfd4e7b437d282a9eaf/jwt_02)
![](https://images.ctfassets.net/23aumh6u8s0i/2idVA183X17v3CfGC0uOmB/35b22395ff6ee0bbd090f81a57cd08c1/jwt_04)

We decided to use the starburst shape representing the crypto protection of a JSON Web Token. Multicolored spokes radiate from the centralized hub representing the various claims within a payload.
Here is the final symbol:

![](https://images.ctfassets.net/23aumh6u8s0i/6sw33rq7EM8nCi5Gov3RCD/6b1d1cf37d688b3e81d2445da694e938/jwt_01)

JSON Web Token has been abbreviated to the initials JWT and custom lettering was developed.

![](https://images.ctfassets.net/23aumh6u8s0i/6w5TnOcVKczBfjTvk5zpWU/96dd7ee784a2171e263bc71a15f9b343/jwt_03)
![](https://images.ctfassets.net/23aumh6u8s0i/16VIM0ExdiVtMpEVamzZzG/a0b6699a966257d51fa001ab55ddf5b4/jwt_05)

## New Site

We redesigned [jwt.io](http://jwt.io), incorporating the new branding. The debugger is still the central piece. We added support for RS256 in addition to HS256.

<img src="https://images.ctfassets.net/23aumh6u8s0i/5ng8giWbaI8NDj6ze9gLje/912d6a18286b995b182592eafda32760/jwt-1" class="expand"/>

In the libraries section, we improved the readability by color coding each library and using the proper logos for each. In addition to that, we added the number of stars from the GitHub repository.

<img src="https://images.ctfassets.net/23aumh6u8s0i/58Jbwy39S0YKyg9rDsICdv/d619bf661636457130fa4a31c948d68b/jwt-2" class="expand"/>

## Badges and Others

If your API supports JSON Web Tokens, feel free to add this badge

![](https://images.ctfassets.net/23aumh6u8s0i/jZkOsCfAXX0zSbq0Ae82v/77da371796a706d6b96b7cda06c6cde5/jwt-compatible)

If there is some functionality on your site that uses and exposes JSON Web Tokens, you can use the following button to open the JWT on jwt.io.

[![](https://images.ctfassets.net/23aumh6u8s0i/38tcsWr8NpjrGjCwMWQLZ7/b786abbaf88c090d025319eb3a91a087/jwt-view)](http://jwt.io/#id_token=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWV9.TJVA95OrM7E2cBab30RMHrHDcEfxjoYZgeFONFh7HgQ)

The token is sent through the hash like this: `http://jwt.io/#id_token=eyJhbGciOi....`

Finally, we designed some cool JWT t-shirts that you can order from [swag.auth0.com](http://swag.auth0.com).


## Acknowledgements

Special thanks to [Ty Wilkins](http://tywilkins.com/) for crafting the logo and lettering, [Ricky Rauch](http://twitter.com/rickyrauch) and [team](http://dribbble.com/auth0) for the awesome looking website, [Alberto Pose](http://twitter.com/thepose) who created the initial jwt.io version and curates the community contributions, [Guillermo Rauch](http://twitter.com/rauchg) for his constant advice, [Mike Jones](http://self-issued.info) for introducing me into the working group and all of you who [contributed to jwt.io](https://github.com/jsonwebtoken/jsonwebtoken.github.io/graphs/contributors) through GitHub.

**JWT all the things!**

<include src="asides/Jwt" />
