The IoT products support verification of JWT signatures generated with these algorithms:

  • RS256. RSA Digital Signature Algorithm with the SHA-256 hash function. It's an asymmetric algorithm that uses a pair of RSA private and public keys to generate and validate JWT signatures. For IoT, you can use only RSA keys with a key length between 1024 and 4096 bits. See JWT algorithms.

  • ES256. Elliptic Curve Digital Signature Algorithm with the P-256 curve and the SHA-256 hash function. It's an asymmetric algorithm that uses a pair of ECDSA private and public keys to generate and validate JWT signatures. For IoT, you can use only ECDSA keys using the P-256 (secp256k1) curve. See JWT algorithms.