Securitypopular
Bearer Authorization Header Regex Pattern
Validates a complete Authorization HTTP header in Bearer scheme.
Pattern
^Bearer\s+[A-Za-z0-9._~+/=-]+$Tested examples
Bearer eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiIxMjMifQ.abcdBearer abc123_def-456Basic dXNlcjpwYXNzbearer lowercaseTest it live
Live Regex TesterJS
0 matches/
/g
Bearer eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiIxMjMifQ.abcd Bearer abc123_def-456
Use it in your language
Use it in
// JavaScript / Node.js
const regex = /^Bearer\s+[A-Za-z0-9._~+/=-]+$/;
const value = "Bearer eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiIxMjMifQ.abcd";
const isMatch = regex.test(value);
console.log(isMatch); // true / false
// Extract all matches
const matches = value.match(/^Bearer\s+[A-Za-z0-9._~+/=-]+$/g) || [];Tags
Frequently asked questions
How do I use the Bearer Authorization Header regex pattern in JavaScript?
Wrap the pattern in slashes: const re = /^Bearer\s+[A-Za-z0-9._~+/=-]+$/; — then call re.test(value) to check a single value, or value.match(re) to find matches. The "Use it in" snippets above give you the exact code for 9 languages.
Is this bearer authorization header regex production-ready?
Yes — every pattern in the library is tested against valid and invalid examples. Still, regex is one layer in a defense-in-depth strategy: pair it with server-side validation (e.g. Luhn for credit cards, mod-97 for IBAN, real DNS lookup for emails) for critical inputs.
Why does my pattern fail in another language?
Different regex engines (PCRE, Java, Python, Go's RE2) support slightly different syntax. The most common gotchas: lookbehinds (not in RE2), named groups syntax, and how backslashes need to be escaped inside string literals. The code snippets above already escape correctly for each language.
Can I edit this pattern and test it live?
Yes — use the live tester above. Type your test string and toggle flags (g, i, m, s, u, y) to see matches highlighted instantly, including capture groups.
Related patterns
See all Security →Security
SQL Injection Detection
Detects suspicious SQL injection patterns.
SecurityStrong Password
At least 12 characters with lowercase, uppercase, digit, and special character.
SecurityJWT Token
Validates the structure of a JSON Web Token (three Base64URL parts separated by dots).
SecurityUltra-Secure Password
Minimum 12 characters, must include uppercase, lowercase, number, and special character.
SecurityBasic XSS Detection
Detects common XSS patterns.
SecurityTOTP / OTP Code
Validates 6-digit one-time passwords (TOTP, Google Authenticator, SMS OTP).
Browse the full library — 209 tested regex patterns across 16 categories.