JWT Decoder
Decode and inspect JSON Web Tokens (JWT) instantly. View header, payload, and signature sections with proper formatting.
What is a JSON Web Token (JWT)?
A JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. JWTs are commonly used for authentication and information exchange in modern web applications.
A JWT consists of three parts separated by dots (.): Header.Payload.Signature
- Header: Contains the token type (JWT) and the signing algorithm (e.g., HS256, RS256)
- Payload: Contains the claims - statements about an entity (typically the user) and additional data
- Signature: Used to verify that the sender of the JWT is who it says it is and to ensure the message wasn't changed
How JWT Decoding Works
JWTs use Base64URL encoding, which makes them safe to pass in URLs and HTTP headers. Our decoder:
- Splits the token into three parts using the dot (.) separator
- Decodes each part from Base64URL encoding
- Parses JSON from the decoded header and payload
- Displays the signature in its encoded form
- Extracts timing information like issued time (iat), expiration (exp), and not-before (nbf)
Important: This tool only decodes and displays JWT contents. It does not verify the signature or validate the token's authenticity. Signature verification requires the secret key and should be done server-side.
Common JWT Claims
Common Use Cases
- Debugging Authentication: Inspect JWTs to verify they contain the correct claims and data
- Token Expiration: Check when a token was issued and when it expires
- Development & Testing: Examine tokens during API development and integration testing
- Security Audits: Review JWT structure and claims for security analysis
- Integration Issues: Troubleshoot problems with third-party services using JWTs
- Learning: Understand JWT structure and how authentication tokens work
FAQ
Security & Privacy
- Client-Side Only: All decoding happens in your browser using JavaScript
- No Server Requests: Your JWT tokens are never sent to any server
- No Storage: Tokens are not saved or logged anywhere
- Open Source: You can verify our code to ensure your data stays private
Warning: Never share your JWT tokens publicly or paste them into untrusted websites. JWTs often contain sensitive information and can be used to impersonate users if intercepted.
Usage Tips
- Check token expiration before debugging authentication issues
- Verify the algorithm (alg) in the header matches your server configuration
- Look for custom claims specific to your application
- Compare issued time (iat) with your server logs to track token creation
- Use the copy buttons to easily share decoded sections (but be careful with sensitive data)
- Bookmark this tool for quick access during development and debugging