express-jwt vs express-jwt-authz vs express-jwt-permissions vs jsonwebtoken vs passport-jwt
JWT Authentication and Authorization Strategies in Express.js
express-jwtexpress-jwt-authzexpress-jwt-permissionsjsonwebtokenpassport-jwtSimilar Packages:

JWT Authentication and Authorization Strategies in Express.js

These five packages address different layers of JSON Web Token (JWT) security within the Node.js ecosystem. jsonwebtoken is the foundational utility for creating and verifying tokens cryptographically. express-jwt and passport-jwt are middleware solutions that integrate token verification into Express request pipelines, with the latter fitting into the broader Passport authentication strategy system. express-jwt-authz and express-jwt-permissions focus on authorization, checking if an authenticated user has specific scopes or permissions to access a resource. Together, they cover the full spectrum from token generation to access control.

Npm Package Weekly Downloads Trend

3 Years

Github Stars Ranking

Stat Detail

Package
Downloads
Stars
Size
Issues
Publish
License
express-jwt04,51028.5 kB66a year agoMIT
express-jwt-authz0997.75 kB6-MIT
express-jwt-permissions052219.9 kB9-MIT
jsonwebtoken018,16143.4 kB1873 months agoMIT
passport-jwt01,98552 kB43-MIT

JWT Authentication and Authorization Strategies in Express.js

Securing a Node.js API usually involves two distinct steps: proving who the user is (authentication) and checking what they are allowed to do (authorization). The packages jsonwebtoken, express-jwt, passport-jwt, express-jwt-authz, and express-jwt-permissions each solve a specific part of this puzzle. Choosing the right combination depends on your architecture, existing dependencies, and security requirements.

🔐 Core Token Handling: Low-Level vs Middleware

The foundation of any JWT system is the ability to sign and verify tokens securely. This is where jsonwebtoken stands apart from the rest.

jsonwebtoken is the cryptographic engine. It does not know about Express, HTTP requests, or middleware. It simply takes data, signs it with a secret or private key, and verifies incoming tokens.

// jsonwebtoken: Manual verification
const jwt = require('jsonwebtoken');

function verifyToken(req, res, next) {
  const token = req.headers['authorization'];
  try {
    const decoded = jwt.verify(token, process.env.JWT_SECRET, { algorithms: ['HS256'] });
    req.user = decoded;
    next();
  } catch (err) {
    res.status(401).send('Invalid Token');
  }
}

express-jwt wraps this logic into an Express middleware. It automatically extracts the token from the Authorization header and attaches the decoded payload to req.user.

// express-jwt: Middleware verification
const { auth } = require('express-jwt');

app.use(auth({
  secret: process.env.JWT_SECRET,
  algorithms: ['HS256'],
  requestProperty: 'user'
}));

passport-jwt integrates JWT verification into the Passport strategy pattern. It requires a bit more setup but allows you to mix JWT auth with other strategies like Google OAuth or username/password.

// passport-jwt: Strategy-based verification
const JwtStrategy = require('passport-jwt').Strategy;

passport.use(new JwtStrategy({
    jwtFromRequest: ExtractJwt.fromAuthHeaderAsBearerToken(),
    secretOrKey: process.env.JWT_SECRET
  },
  (payload, done) => {
    // Find user in DB here if needed
    return done(null, payload);
  }
));

🛡️ Authorization: Scopes and Permissions

Once a user is authenticated, you often need to restrict access based on roles, scopes, or permissions. This is where express-jwt-authz and express-jwt-permissions come into play.

express-jwt-authz is designed for simple scope checking. It expects the decoded token to contain a scope claim (usually a space-separated string) and checks if the required scope is present.

// express-jwt-authz: Scope checking
const jwtAuthz = require('express-jwt-authz');

app.get('/admin', 
  jwtAuthz(['read:admin', 'write:admin']), 
  (req, res) => {
    res.send('Admin access granted');
  }
);

express-jwt-permissions offers a more flexible model. It allows you to define custom permission rules and checks them against the token payload. It is useful if your permissions are stored as arrays or custom objects rather than simple space-separated scopes.

// express-jwt-permissions: Custom permission checking
const permissions = require('express-jwt-permissions');

const guard = permissions();

app.get('/dashboard', 
  guard.check(['dashboard:view']), 
  (req, res) => {
    res.send('Dashboard loaded');
  }
);

⚠️ Security and Maintenance Status

Security libraries require active maintenance. jsonwebtoken is the industry standard for the cryptographic piece and is widely trusted when configured correctly.

express-jwt has had significant security issues in the past (specifically regarding algorithm confusion attacks). Modern versions require you to explicitly specify allowed algorithms. If you use it, you must ensure you are on the latest version and strictly define the algorithms option.

// express-jwt: Secure configuration required
// NEVER omit the algorithms array
app.use(auth({
  secret: process.env.SECRET,
  algorithms: ['RS256'] // Explicitly define algorithm
}));

passport-jwt benefits from the broader Passport ecosystem. While Passport itself is mature, some plugins receive updates less frequently. However, because the core logic is simple, it remains a stable choice for many teams.

// passport-jwt: Stable strategy setup
// Ensure secretOrKey is managed securely (env vars)
passport.use(new JwtStrategy({
  secretOrKey: process.env.JWT_SECRET,
  jwtFromRequest: ExtractJwt.fromAuthHeaderAsBearerToken()
}, verifyCallback));

express-jwt-authz and express-jwt-permissions are smaller, niche packages. They are generally stable because they perform simple logic, but they rely on the authentication middleware (like express-jwt) running before them. If the authentication step fails to attach the user object, these will error.

// express-jwt-authz: Depends on prior auth middleware
app.use(auth({ secret: '...', algorithms: ['HS256'] })); // Must run first
app.use(jwtAuthz(['read:data'])); // Runs second

🔄 Integration Patterns

How you combine these tools defines your app's architecture.

Pattern A: The Minimalist Stack

Use jsonwebtoken + custom middleware + express-jwt-permissions. This gives you full control without extra dependencies like Passport.

// Minimalist: Custom middleware + permissions
app.use(verifyToken); // Custom using jsonwebtoken
app.get('/api', permissions.check(['read']), handler);

Pattern B: The Passport Ecosystem

Use passport-jwt + express-jwt-authz. Ideal if you already use Passport for session or OAuth login.

// Passport Stack: Strategy + Authz
app.get('/api', 
  passport.authenticate('jwt', { session: false }), 
  jwtAuthz(['read']), 
  handler
);

Pattern C: The Auth0 Style

Use express-jwt + express-jwt-authz. This mirrors the default setup often suggested for Auth0 integration.

// Auth0 Style: Dedicated middleware + Authz
app.use(auth({ secret: jwks.expressJwtSecret(...), algorithms: ['RS256'] }));
app.get('/api', jwtAuthz(['read:messages']), handler);

📊 Summary: Key Differences

Featurejsonwebtokenexpress-jwtpassport-jwtexpress-jwt-authzexpress-jwt-permissions
Primary RoleCrypto UtilityAuth MiddlewareAuth StrategyScope MiddlewarePermission Middleware
Express Specific❌ No✅ Yes✅ Yes✅ Yes✅ Yes
Handles Signing✅ Yes❌ No❌ No❌ No❌ No
Handles Verification✅ Yes✅ Yes✅ Yes❌ No❌ No
Authorization❌ No❌ No❌ No✅ Scopes✅ Permissions
EcosystemStandaloneAuth0 / StandalonePassportAuth0 / StandaloneStandalone

💡 Final Recommendation

For most new projects, passport-jwt combined with jsonwebtoken offers the best balance of flexibility and ecosystem support. It allows you to swap authentication strategies later without rewriting your middleware stack.

If you are building a simple microservice that only needs to verify tokens issued by a trusted authority (like Auth0 or AWS Cognito), express-jwt is lighter and faster to set up. Just be rigorous about security configuration.

For authorization, express-jwt-authz is sufficient for simple role-based access control (RBAC). If your permissions are complex (e.g., resource-level access), consider writing a custom middleware using jsonwebtoken data rather than relying on a niche package that might not fit your exact data model.

How to Choose: express-jwt vs express-jwt-authz vs express-jwt-permissions vs jsonwebtoken vs passport-jwt

  • express-jwt:

    Choose express-jwt if you want a dedicated, lightweight middleware solely for verifying JWTs in Express without the overhead of the Passport ecosystem. Ensure you configure the algorithms option explicitly to avoid security vulnerabilities.

  • express-jwt-authz:

    Choose express-jwt-authz if you need simple scope-based authorization (e.g., checking for 'read:users' scope) and are already using express-jwt or a similar middleware that attaches the decoded token to the request.

  • express-jwt-permissions:

    Choose express-jwt-permissions if you require more flexible permission modeling than simple scopes, such as checking specific resource permissions, and need a middleware that integrates directly with Express request handlers.

  • jsonwebtoken:

    Choose jsonwebtoken if you need low-level control over signing and verifying tokens without Express-specific middleware. It is the core dependency for most other JWT libraries and is essential if you are building custom authentication logic or working outside of Express.

  • passport-jwt:

    Choose passport-jwt if your application already uses Passport for other strategies (like OAuth or Local) and you want a unified interface for authentication. It is ideal for complex apps requiring multiple login methods.

README for express-jwt

express-jwt

This module provides Express middleware for validating JWTs (JSON Web Tokens) through the jsonwebtoken module. The decoded JWT payload is available on the request object.

Install

$ npm install express-jwt

API

expressjwt(options)

Options has the following parameters:

  • secret: jwt.Secret | GetVerificationKey (required): The secret as a string or a function to retrieve the secret.
  • getToken?: TokenGetter (optional): A function that receives the express Request and returns the token, by default it looks in the Authorization header.
  • isRevoked?: IsRevoked (optional): A function to verify if a token is revoked.
  • onExpired?: ExpirationHandler (optional): A function to handle expired tokens.
  • credentialsRequired?: boolean (optional): If its false, continue to the next middleware if the request does not contain a token instead of failing, defaults to true.
  • requestProperty?: string (optional): Name of the property in the request object where the payload is set. Default to req.auth.
  • Plus... all the options available in the jsonwebtoken verify function.

The available functions have the following interface:

  • GetVerificationKey = (req: express.Request, token: jwt.Jwt | undefined) => Promise<jwt.Secret>;
  • IsRevoked = (req: express.Request, token: jwt.Jwt | undefined) => Promise<boolean>;
  • TokenGetter = (req: express.Request) => string | Promise<string> | undefined;

Usage

Basic usage using an HS256 secret:

var { expressjwt: jwt } = require("express-jwt");
// or ES6
// import { expressjwt, ExpressJwtRequest } from "express-jwt";

app.get(
  "/protected",
  jwt({ secret: "shhhhhhared-secret", algorithms: ["HS256"] }),
  function (req, res) {
    if (!req.auth.admin) return res.sendStatus(401);
    res.sendStatus(200);
  }
);

The decoded JWT payload is available on the request via the auth property.

The default behavior of the module is to extract the JWT from the Authorization header as an OAuth2 Bearer token.

Required Parameters

The algorithms parameter is required to prevent potential downgrade attacks when providing third party libraries as secrets.

:warning: Do not mix symmetric and asymmetric (ie HS256/RS256) algorithms: Mixing algorithms without further validation can potentially result in downgrade vulnerabilities.

jwt({
  secret: "shhhhhhared-secret",
  algorithms: ["HS256"],
  //algorithms: ['RS256']
});

Additional Options

You can specify audience and/or issuer as well, which is highly recommended for security purposes:

jwt({
  secret: "shhhhhhared-secret",
  audience: "http://myapi/protected",
  issuer: "http://issuer",
  algorithms: ["HS256"],
});

If the JWT has an expiration (exp), it will be checked.

If you are using a base64 URL-encoded secret, pass a Buffer with base64 encoding as the secret instead of a string:

jwt({
  secret: Buffer.from("shhhhhhared-secret", "base64"),
  algorithms: ["RS256"],
});

To only protect specific paths (e.g. beginning with /api), use express router call use, like so:

app.use("/api", jwt({ secret: "shhhhhhared-secret", algorithms: ["HS256"] }));

Or, the other way around, if you want to make some paths unprotected, call unless like so.

app.use(
  jwt({
    secret: "shhhhhhared-secret",
    algorithms: ["HS256"],
  }).unless({ path: ["/token"] })
);

This is especially useful when applying to multiple routes. In the example above, path can be a string, a regexp, or an array of any of those.

For more details on the .unless syntax including additional options, please see express-unless.

This module also support tokens signed with public/private key pairs. Instead of a secret, you can specify a Buffer with the public key

var publicKey = fs.readFileSync("/path/to/public.pub");
jwt({ secret: publicKey, algorithms: ["RS256"] });

Customizing Token Location

A custom function for extracting the token from a request can be specified with the getToken option. This is useful if you need to pass the token through a query parameter or a cookie. You can throw an error in this function and it will be handled by express-jwt.

app.use(
  jwt({
    secret: "hello world !",
    algorithms: ["HS256"],
    credentialsRequired: false,
    getToken: function fromHeaderOrQuerystring(req) {
      if (
        req.headers.authorization &&
        req.headers.authorization.split(" ")[0] === "Bearer"
      ) {
        return req.headers.authorization.split(" ")[1];
      } else if (req.query && req.query.token) {
        return req.query.token;
      }
      return null;
    },
  })
);

Retrieve key dynamically

If you need to obtain the key dynamically from other sources, you can pass a function in the secret parameter with the following parameters:

  • req (Object) - The express request object.
  • token (Object) - An object with the JWT payload and headers.

For example, if the secret varies based on the issuer:

var jwt = require("express-jwt");
var data = require("./data");
var utilities = require("./utilities");

var getSecret = async function (req, token) {
  const issuer = token.payload.iss;
  const tenant = await data.getTenantByIdentifier(issuer);
  if (!tenant) {
    throw new Error("missing_secret");
  }
  return utilities.decrypt(tenant.secret);
};

app.get(
  "/protected",
  jwt({ secret: getSecret, algorithms: ["HS256"] }),
  function (req, res) {
    if (!req.auth.admin) return res.sendStatus(401);
    res.sendStatus(200);
  }
);

Secret rotation

The getSecret callback could also be used in cases where the same issuer might issue tokens with different keys at certain point:

var getSecret = async function (req, token) {
  const { iss } = token.payload;
  const { kid } = token.header;
  // get the verification key by a given key-id and issuer.
  return verificationKey;
};

Revoked tokens

It is possible that some tokens will need to be revoked so they cannot be used any longer. You can provide a function as the isRevoked option. The signature of the function is function(req, payload, done):

  • req (Object) - The express request object.
  • token (Object) - An object with the JWT payload and headers.

For example, if the (iss, jti) claim pair is used to identify a JWT:

const jwt = require("express-jwt");
const data = require("./data");

const isRevokedCallback = async (req, token) => {
  const issuer = token.payload.iss;
  const tokenId = token.payload.jti;
  const token = await data.getRevokedToken(issuer, tokenId);
  return token !== "undefined";
};

app.get(
  "/protected",
  jwt({
    secret: "shhhhhhared-secret",
    algorithms: ["HS256"],
    isRevoked: isRevokedCallback,
  }),
  function (req, res) {
    if (!req.auth.admin) return res.sendStatus(401);
    res.sendStatus(200);
  }
);

Handling expired tokens

You can handle expired tokens as follows:

  jwt({
    secret: "shhhhhhared-secret",
    algorithms: ["HS256"],
    onExpired: async (req, err) => {
      if (new Date() - err.inner.expiredAt < 5000) { return;}
      throw err;
    },,
  })

Error handling

The default behavior is to throw an error when the token is invalid, so you can add your custom logic to manage unauthorized access as follows:

app.use(function (err, req, res, next) {
  if (err.name === "UnauthorizedError") {
    res.status(401).send("invalid token...");
  } else {
    next(err);
  }
});

You might want to use this module to identify registered users while still providing access to unregistered users. You can do this by using the option credentialsRequired:

app.use(
  jwt({
    secret: "hello world !",
    algorithms: ["HS256"],
    credentialsRequired: false,
  })
);

Typescript

A Request type is provided from express-jwt, which extends express.Request with the auth property. It could be aliased, like how JWTRequest is below.

import { expressjwt, Request as JWTRequest } from "express-jwt";

app.get(
  "/protected",
  expressjwt({ secret: "shhhhhhared-secret", algorithms: ["HS256"] }),
  function (req: JWTRequest, res: express.Response) {
    if (!req.auth?.admin) return res.sendStatus(401);
    res.sendStatus(200);
  }
);

Migration from v6

  1. The middleware function is now available as a named import rather than a default one: import { expressjwt } from 'express-jwt'
  2. The decoded JWT payload is now available as req.auth rather than req.user
  3. The secret function had (req, header, payload, cb), now it can return a promise and receives (req, token). token has header and payload.
  4. The isRevoked function had (req, payload, cb), now it can return a promise and receives (req, token). token has header and payload.

Related Modules

Tests

$ npm install
$ npm test

Contributors

Check them out here

Issue Reporting

If you have found a bug or if you have a feature request, please report them at this repository issues section. Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.

Author

Auth0

License

This project is licensed under the MIT license. See the LICENSE file for more info.