JWT Decoder
Paste a JWT to instantly decode its header, payload, and signature. Inspect registered claims with descriptions, check expiry status, and verify signatures with HMAC secrets or public keys. Runs entirely in your browser; nothing is transmitted.
Guide
How to Use
- 1 Paste your JWT
Copy a JWT from your application, API response, or browser DevTools and paste it into the input field. Decoding starts automatically after a short pause.
- 2 Inspect the decoded panels
The header and payload appear as formatted JSON with syntax highlighting. Hover over registered claim keys (iss, sub, exp…) to see their RFC 7519 descriptions.
- 3 Check expiry and validity
A coloured badge in the payload panel shows whether the token is still valid, has expired, or is not yet active (based on exp and nbf claims).
- 4 Verify the signature
Open the Verify Signature panel, choose HMAC Secret, PEM Public Key, or JWK, enter your key, and click Verify to confirm the signature cryptographically.
- 5 Copy decoded data
Use the Copy button in each panel to put the decoded header or payload JSON on your clipboard, or copy a plain-text token summary.
Reference
JWT Structure Explained
| Part | Contents | Encoding |
|---|---|---|
| Header | Base64URL-encoded JSON specifying the token type (typ) and signing algorithm (alg). Always the first segment. | Base64URL |
| Payload | Base64URL-encoded JSON containing the claims — assertions about the subject plus any custom data. | Base64URL |
| Signature | The cryptographic signature over header.payload, using the algorithm declared in the header. Proves the token has not been tampered with. | Base64URL |