Generate and test JWTs with Dev Proxy
Demonstrates how to use devproxy jwt create to generate JSON Web Tokens for testing API authentication scenarios with a simulated CRUD API secured by JWT validation.
Generate and test JWTs with Dev Proxy
Summary
This sample demonstrates how to use the devproxy jwt create command to generate JSON Web Tokens (JWTs) for testing API authentication scenarios. It includes a simulated CRUD API secured with JWT validation, allowing you to test different authentication scenarios locally without needing external identity providers.

Compatibility
Contributors
Version history
| Version | Date | Comments |
|---|---|---|
| 1.1 | February 4, 2026 | Updated to Dev Proxy v2.1.0 |
| 1.0 | January 10, 2026 | Initial release |
Minimal path to awesome
-
Get the sample:
-
Download just this sample:
npx gitload-cli https://github.com/pnp/proxy-samples/tree/main/samples/jwt-testing-toolkitor
-
Download as a .ZIP file and unzip it, or
-
Clone this repository
-
-
Start Dev Proxy:
devproxy -
In another terminal, generate a JWT with read scope and test the API:
# Generate a JWT with read scope devproxy jwt create --name "Megan Bowen" --issuer "dev-proxy" --audiences "https://api.contoso.com" --scopes "Customers.Read" # Copy the generated token and use it to call the API # Replace <token> with the generated JWT curl -ikx http://127.0.0.1:8000 https://api.contoso.com/v1/customers \ -H "Authorization: Bearer <token>"
JWT Generation Examples
The sample demonstrates three common JWT scenarios:
JWT with Read Scope
devproxy jwt create --name "Megan Bowen" --issuer "dev-proxy" --audiences "https://api.contoso.com" --scopes "Customers.Read"
JWT with Write Scope
devproxy jwt create --name "Alex Wilber" --issuer "dev-proxy" --audiences "https://api.contoso.com" --scopes "Customers.Write"
JWT with Admin Role
devproxy jwt create --name "Admin User" --issuer "dev-proxy" --audiences "https://api.contoso.com" --roles "Customers.Admin"
Testing Scenarios
Scenario 1: Successful Read Request
# Generate token with read scope
TOKEN=$(devproxy jwt create --name "Megan Bowen" --issuer "dev-proxy" --audiences "https://api.contoso.com" --scopes "Customers.Read" | grep -o 'eyJ[^"]*')
# Get all customers
curl -ikx http://127.0.0.1:8000 https://api.contoso.com/v1/customers \
-H "Authorization: Bearer $TOKEN"
# Get specific customer
curl -ikx http://127.0.0.1:8000 https://api.contoso.com/v1/customers/1 \
-H "Authorization: Bearer $TOKEN"
Scenario 2: Successful Write Request
# Generate token with write scope
TOKEN=$(devproxy jwt create --name "Alex Wilber" --issuer "dev-proxy" --audiences "https://api.contoso.com" --scopes "Customers.Write" | grep -o 'eyJ[^"]*')
# Create new customer
curl -ikx http://127.0.0.1:8000 https://api.contoso.com/v1/customers \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{"id": 4, "name": "Adventure Works", "email": "hello@adventure.com", "department": "IT"}'
# Update customer
curl -ikx http://127.0.0.1:8000 https://api.contoso.com/v1/customers/1 \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-X PATCH \
-d '{"department": "Engineering"}'
Scenario 3: Admin Delete Operation
# Generate token with admin role
TOKEN=$(devproxy jwt create --name "Admin User" --issuer "dev-proxy" --audiences "https://api.contoso.com" --roles "Customers.Admin" | grep -o 'eyJ[^"]*')
# Delete customer
curl -ikx http://127.0.0.1:8000 https://api.contoso.com/v1/customers/3 \
-H "Authorization: Bearer $TOKEN" \
-X DELETE
Scenario 4: Unauthorized Access (Missing Scope)
# Generate token with read scope only
TOKEN=$(devproxy jwt create --name "Megan Bowen" --issuer "dev-proxy" --audiences "https://api.contoso.com" --scopes "Customers.Read" | grep -o 'eyJ[^"]*')
# Try to create customer (should fail - requires write scope)
curl -ikx http://127.0.0.1:8000 https://api.contoso.com/v1/customers \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{"id": 5, "name": "Test", "email": "test@test.com"}'
Scenario 5: No Authorization Header
# Call API without token (should fail)
curl -ikx http://127.0.0.1:8000 https://api.contoso.com/v1/customers
Features
This sample provides everything you need to test JWT-based authentication:
Simulated CRUD API with JWT Validation:
GET /customers- RequiresCustomers.ReadscopeGET /customers/{id}- RequiresCustomers.ReadscopePOST /customers- RequiresCustomers.WritescopePATCH /customers/{id}- RequiresCustomers.WritescopeDELETE /customers/{id}- RequiresCustomers.Adminrole
Using this sample you can use Dev Proxy to:
- Generate test JWTs locally without external identity providers
- Test API authentication and authorization scenarios
- Validate scope-based and role-based access control
- Debug authentication issues in your applications
Help
We do not support samples, but this community is always willing to help, and we want to improve these samples. We use GitHub to track issues, which makes it easy for community members to volunteer their time and help resolve issues.
You can try looking at issues related to this sample to see if anybody else is having the same issues.
If you encounter any issues using this sample, create a new issue.
Finally, if you have an idea for improvement, make a suggestion.
Disclaimer
THIS CODE IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING ANY IMPLIED WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR NON-INFRINGEMENT.