JWT Signature Algorithms
The following table shows JWT signature algorithms that are supported in Smile CDR for both signing and signature verification of JSON Web Tokens.
| Name | Algorithm | Notes |
|---|---|---|
| HS256 | HMAC using SHA-256 hash algorithm | The HMAC+SHA family of algorithms requires a secret key to be shared between the issuing server and the verifying server, so the private key must be explicitly defined in the server definition configured with Smile CDR. |
| HS384 | HMAC using SHA-384 hash algorithm | |
| HS512 | HMAC using SHA-512 hash algorithm | |
| RS256 | RSASSA-PKCS-v1_5 using SHA-256 hash algorithm | |
| RS384 | RSASSA-PKCS-v1_5 using SHA-384 hash algorithm | |
| RS512 | RSASSA-PKCS-v1_5 using SHA-512 hash algorithm | |
| ES256 | ECDSA using P-256 (secp256r1) curve and SHA-256 hash algorithm | |
| ES256K | ECDSA using P-256K (secp256k1) curve and SHA-256 hash algorithm | |
| ES384 | ECDSA using P-384 curve and SHA-384 hash algorithm | |
| ES512 | ECDSA using P-521 curve and SHA-512 hash algorithm | |
| PS256 | RSASSA-PSS using SHA-256 hash algorithm and MGF1 mask generation function with SHA-256 | |
| PS384 | RSASSA-PSS using SHA-384 hash algorithm and MGF1 mask generation function with SHA-384 | |
| PS512 | RSASSA-PSS using SHA-512 hash algorithm and MGF1 mask generation function with SHA-512 | |
| EdDSA | EdDSA signature algorithms |
You are about to leave the Smile Digital Health documentation and navigate to the Open Source HAPI-FHIR Documentation.