JWT Decoder

Decode and inspect JSON Web Tokens safely in your browser.

JWT Decoder

Decode and inspect JSON Web Tokens

JWT Token Input

Privacy Notice: All decoding happens in your browser. Your tokens are never sent to any server. JWTs are decoded, not verified. This tool does not validate signatures.

Decoded Token

No JWT Decoded Yet

Paste a JWT token and click decode to see its contents

JWT Structure & Claims Reference

1. Paste your token

Paste any JWT — from a browser cookie, an Authorization header, or an OAuth response. The token is decoded entirely in your browser; no data is sent to any server.

2. Inspect claims

The decoder shows the header (algorithm, token type), payload (all claims including expiration, subject, roles), and flags whether the token is currently expired based on the exp claim.

3. Debug auth issues

Use the decoded claims to debug authentication failures — check if the token has expired, if the audience (aud) matches your service, or if expected custom claims are present.

Standard JWT Claims Reference

ClaimFull nameDescriptionRequired?
issIssuerIdentifies who issued the token (e.g., auth.example.com)No
subSubjectThe user or entity the token represents (e.g., user ID)No
audAudienceIntended recipients of the tokenNo
expExpiration TimeUnix timestamp after which the token is invalidNo
nbfNot BeforeUnix timestamp before which the token is not validNo
iatIssued AtUnix timestamp when the token was createdNo
jtiJWT IDUnique identifier to prevent token replay attacksNo

JWT Security: What You Can and Cannot Verify

A JWT consists of three Base64URL-encoded parts separated by dots: header.payload.signature. The header and payload are simply encoded — not encrypted. Anyone who has the token can decode and read the claims without a key. This means never put sensitive data like passwords or credit card numbers in a JWT payload.

The signature is what provides security. It is a cryptographic hash of the header and payload, signed with a secret (HMAC) or private key (RS256/ES256). Servers verify the signature before trusting any claims. This tool decodes the payload for inspection — it does not verify the signature, which requires the secret or public key. For security auditing, always verify the signature server-side; never trust a decoded JWT without signature verification.

Frequently Asked Questions

Common questions about JWT Decoder