JWT Analyzer / Inspector in Hasura Console
v1.0.0-beta.3 release, a JWT analyzer is now part of the Hasura console. Up until now, JWTs had to be decoded using an external tool like https://jwt.io, etc.
Let's see how we can use this feature! This example uses Firebase JWT sample app (https://github.com/hasura/graphql-engine/tree/master/community/sample-apps/firebase-jwt) to generate a token. You can use any other JWT provider and configure Hasura with the JWT secret using the
--jwt-secret flag or
HASURA_GRAPHQL_JWT_SECRET environment variable.
After logging in and getting a valid JWT token, we add it to the
Authorization request header in the console's Graphiql page:
If we click on the rectangular icon on the right, the JWT analyzer opens and we get information on the token validity, Hasura claims, headers and the full payload. Here a snapshot:
You can find more information about this change in the changelog. Do try this out and let us know what you think about it!