Decode and inspect JSON Web Tokens (JWT). View header, payload, claims, and check expiration instantly.
JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. It consists of three parts separated by dots: Header.Payload.Signature
JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. JWTs are commonly used for authentication and authorization in modern web applications and APIs.
A JWT consists of three parts separated by dots (.):
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5cThe payload contains claims, which are statements about an entity (typically the user) and additional data. There are three types of claims: registered, public, and private.
iss - Issuersub - Subjectaud - Audienceexp - Expiration Timenbf - Not Beforeiat - Issued Atjti - JWT IDYou can define your own custom claims to transmit information between parties.
name - User nameemail - Email addressrole - User rolepermissions - Access rightsSymmetric algorithm using a shared secret key. Fast and simple.
Asymmetric algorithm using public/private key pairs. More secure.
Asymmetric with elliptic curve cryptography. Smaller keys, faster.
All decoding happens in your browser. Your tokens never leave your device or touch our servers.
Decode JWTs in milliseconds. No waiting, no loading, just instant results.
Automatically detects and warns if tokens are expired based on the exp claim.
Copy header, payload, or signature individually with one click.
No. Decoding simply reads the contents of a JWT. Verification checks that the signature is valid using the secret key or public key. This tool only decodes - it does not verify signatures.
Yes. JWTs are Base64-encoded, not encrypted. Anyone with access to the token can decode and read the header and payload. This is why you should never store sensitive information in JWTs.
"Bearer" is an authentication scheme that indicates the requester has a token that grants access. You'll often see JWTs sent as Authorization: Bearer <token>in HTTP headers. Our tool automatically strips the "Bearer" prefix.
Signature verification must be done server-side using a JWT library (like jsonwebtoken for Node.js, PyJWT for Python, etc.) with the secret key or public key. You cannot verify signatures without the key.