JWT Decoder
Decode and inspect JSON Web Tokens. View header, payload, and signature details — entirely in your browser, nothing sent to any server.
Header
JOSE Header
Payload
Claims Set
Signature
Signature verification requires the secret or public key, which is not available in the browser.
How to Use
-
1
Paste your JWT token
Copy a JSON Web Token from an Authorization header, cookie, or API response and paste it into the decoder. The tool splits the token at the dots and decodes each part without sending data to a server.
-
2
Inspect header and payload claims
Review the JOSE header (algorithm, key ID, token type) and all payload claims including iss, sub, aud, exp, iat, nbf, and any custom claims. Expiry times are shown in human-readable local time.
-
3
Verify structure and expiry
Check whether the token is expired (exp claim), not yet valid (nbf claim), and whether the algorithm in the header matches your expected signing method. Note that signature verification requires your secret or public key.
About
JSON Web Tokens are the dominant format for stateless authentication and authorization in modern web APIs, standardized in RFC 7519 and part of the broader JOSE (JSON Object Signing and Encryption) framework defined across RFC 7515–7518. A JWT encodes identity claims in a compact, URL-safe format that can be verified by any party holding the correct key — eliminating the need for server-side session storage and enabling scalable distributed architectures.
The JWT Decoder performs client-side decoding entirely in the browser, never transmitting your token to a remote server. It parses the Base64URL-encoded header and payload, formats the JSON for readability, and converts Unix timestamps for exp (expiration), iat (issued at), and nbf (not before) into human-readable local time. Custom claims added by your identity provider — roles, permissions, tenant IDs — are surfaced alongside the standard RFC 7519 registered claims.
Critical security note: decoding a JWT is not the same as validating it. Decoding only reads the payload; validation requires checking the cryptographic signature against a trusted key, confirming the algorithm matches your expected scheme, and verifying time-based claims (exp, nbf) and audience (aud). The decoder is a diagnostic tool for inspecting token contents during development and debugging — production token validation must always be performed server-side using a well-maintained JWT library that enforces algorithm restrictions per RFC 8725 (JWT Best Current Practices).