Introduction
When a user signs in with Dynamic, your client receives a JSON Web Token (JWT) from Dynamic. To trust the user’s identity on your backend, you must verify that JWT on the server before using any claims (user ID, wallets, etc.). Client-sent tokens cannot be trusted until they are cryptographically verified. Regardless of which Dynamic SDK you use on the client (React, React Native, Flutter, Swift, Kotlin, JavaScript, etc.), your backend verifies the same Dynamic-issued JWT the same way. The flow is:- Client gets the JWT from Dynamic (the way you obtain it depends on your SDK—e.g.
getAuthToken(),sdk.auth.token, etc.). - Client sends the JWT to your backend (e.g. in the
Authorization: Bearer <token>header). - Backend verifies the JWT using Dynamic’s public key (signature and claims). This step is identical for all client SDKs.
- Backend uses the verified claims (e.g.
subfor user ID,verified_credentials) to authorize the request.
Understanding JWTs
A JWT has three parts: header, payload (claims), and signature. Dynamic signs JWTs with RS256 (RSA signature with SHA-256). The signing key is unique per environment, so you use the public key for your environment to verify that the token was issued by Dynamic and has not been tampered with.Standard claims
Dynamic’s JWTs include standard JWT claims:| Claim | Description |
|---|---|
iss | Issuer. Dynamic sets this to the issuer for your environment (e.g. app.dynamic.xyz/<environment_id>). |
aud | Audience. Intended audience for the token. |
sub | Subject. The Dynamic user ID. |
iat | Issued at. Unix timestamp when the token was issued. |
exp | Expiration. Unix timestamp when the token expires. |
Dynamic-specific claims
The payload may also include Dynamic-specific claims. These fields are optional and depend on whether you collect the information during onboarding:| Claim | Description |
|---|---|
alias | Alias from customer information capture. |
email | Email from customer information capture. |
environment_id | Unique ID of the project environment (from the dashboard API). |
given_name | First name from customer information capture. |
family_name | Last name from customer information capture. |
lists | Names of access lists enabled for this user. See Access Control. |
verified_credentials | List of all verified credentials connected to this user. |
verified_account | If present, the most recently signed and verified account. |
Example payload
Getting the verification key
To verify a Dynamic-issued JWT, you need the public key for your environment. You can get it in two ways:- Developer Dashboard — In the API tab of your developer dashboard, you can find the public key for your environment.
-
JWKS endpoint — Dynamic exposes a JWKS (JSON Web Key Set) endpoint so your server can fetch the public key(s) used to sign tokens:
Replace
{environmentId}with your environment ID (from the dashboard). Your JWT library can use this URL to resolve the key by thekid(key ID) in the JWT header. See the Find JWKS for public key API reference.
Verifying the JWT yourself
On your backend, after you receive the JWT (e.g. from theAuthorization: Bearer <token> header):
- Verify the signature — Decode the JWT and verify the signature using the public key (RS256). If verification fails, reject the request.
-
Validate claims — Ensure:
issmatches the issuer for your environment (e.g.app.dynamic.xyz/<environment_id>).expis in the future andiatis reasonable (token not expired, not from the future).audif you use audience restrictions.
-
Optional: handle scopes — Dynamic may include a
scopesclaim. For example,requiresAdditionalAuthindicates the user must complete additional verification (e.g. MFA) before the token is fully trusted. Reject or handle such tokens according to your policy.
jsonwebtoken + jwks-rsa), Python (PyJWT), Go (jwt-go), etc. The verification logic is the same regardless of which client SDK sent the token.
Security
Server-side and JWT security are critical. Follow Dynamic’s security guidance for JWT lifetime and storage (e.g. never log or persist user JWTs), cookie-based authentication to reduce session hijacking risk, secure storage of API keys (backend only, never on the client), and protection against common attack vectors. See the Security overview and Best Practices (including JWT length and storage, CORS, and developer credentials). For threat-specific mitigations, see Mitigating attack vectors.Using your own JWT with Dynamic
If you have your own authentication system or another auth provider, you can use your own JWTs to sign users into Dynamic. Dynamic will verify your JWT (using a JWKS endpoint you provide) and then issue its own session/JWT. This is useful for bringing existing users into Dynamic without changing your auth flow. For setup and requirements (e.g.iss, sub, exp), see Third-party authentication (enterprise feature).
Next steps
-
Getting the token from the client — How you obtain the JWT on the client depends on your SDK. For step-by-step and code samples:
- Server-side verification (JavaScript)
- Server-side verification (React)
- Server-side verification (React Native)
- For Flutter, Swift, Kotlin, and other SDKs, use the auth or session docs for your SDK to get
sdk.auth.token(or equivalent) and send it to your backend; the backend verification steps above apply unchanged.
- Frameworks — If you use Next.js, see NextAuth with Dynamic. For Passport.js, use the official passport-dynamic extension.
- API reference — Find JWKS for public key.