For HMAC based algorithms, the JWT functions expect the key to be base64 url encoded.
But some "bare keys" may already look base64 encoded. Auth0 for example, uses base64 strings as keys. They need another base64-encode() to be used with jwt-decode().
You can do this on-the-fly:
Of course, you could also do that once outside of FLAT before setting the env var:
For RSASSA based algorithms, the JWT functions expect the key to be PEM encoded, but without the BEGIN and END lines, and without any line breaks. To generate the private and public keys in this format:
To extract the public key for signature verification in the required format:
Note that, with RSASSA based algorithms, you have to specify the algorithm in the jwt-decode() function.