JWT Decoder

Our JWT decoder parses JSON Web Tokens and displays the header, payload, and signature in a clear, formatted view. See all standard claims (iss, sub, aud, exp, iat, nbf, jti) with human-readable timestamps. Check if tokens are expired, view algorithm information, and copy individual sections. Supports HS256, HS384, HS512, RS256, RS384, RS512, ES256, ES384, ES512, and PS256 algorithms. 100% client-side — your tokens are never sent to any server.

star 4.9
auto_awesome AI
New

auto_awesome AI Analysis

Powered by Claude

JWT Analysis:

  • Algorithm: Check header for signing algorithm
  • Claims: Review payload for exp, iat, sub claims

Tip: JWTs are encoded, NOT encrypted — never store secrets in them.

lightbulb Tips

  • JWT = Header.Payload.Signature (3 parts)
  • Payloads are encoded, NOT encrypted
  • Always check 'exp' claim for expiration
  • RS256 is more secure than HS256 for APIs

How to Use This Calculator

content_paste

Paste Token

Paste your JWT token (the long string with two dots) into the input field.

code

View Header

See the algorithm and token type from the JWT header.

visibility

Inspect Payload

View all claims including timestamps, subject, issuer, and custom data.

schedule

Check Expiration

See if the token is expired and when it was issued.

The Formula

A JWT consists of three Base64URL-encoded parts separated by dots. The Header specifies the signing algorithm (e.g., HS256, RS256). The Payload contains claims — registered claims like 'exp' (expiration), 'iat' (issued at), 'sub' (subject), and custom claims. The Signature is created by signing the encoded header and payload with a secret key or private key.

JWT = Base64URL(Header) + '.' + Base64URL(Payload) + '.' + Signature

lightbulb Variables Explained

  • Header JSON object with algorithm (alg) and token type (typ)
  • Payload JSON object containing claims (data) like sub, exp, iat
  • Signature HMAC or RSA signature of header + payload for verification
  • Base64URL URL-safe Base64 encoding (- instead of +, _ instead of /)

tips_and_updates Pro Tips

1

JWT tokens are NOT encrypted — anyone can read the payload by Base64-decoding it

2

Always check the 'exp' claim — expired tokens should be rejected by your API

3

The 'iat' (issued at) and 'nbf' (not before) claims help prevent token replay attacks

4

HS256 uses a shared secret; RS256 uses public/private key pairs — RS256 is more secure for distributed systems

5

Never store sensitive data (passwords, credit cards) in JWT payloads

6

Token size matters — JWTs are sent with every HTTP request in the Authorization header

7

Use short expiration times (15-60 min) with refresh tokens for better security

Decode & Inspect JWT Tokens Online

Our free JWT decoder parses JSON Web Tokens and displays the header, payload, and signature in a clear, formatted view. Check expiration times, view all claims, and inspect token details. 100% client-side — your tokens never leave your browser.

JWT Token Decoder - View Header & Payload

Paste any JWT token and instantly see its decoded header and payload as formatted JSON. Our decoder identifies the signing algorithm, displays all standard and custom claims, and converts Unix timestamps to human-readable dates. Color-coded display makes it easy to distinguish the three JWT parts.

JWT Debugger - Check Expiration & Claims

Debug JWT issues by checking expiration times, issued-at timestamps, and claim values. Our tool shows whether tokens are expired, how long until expiration, and highlights potential issues. Essential for API development, authentication debugging, and security auditing.

Frequently Asked Questions

sell

Tags

verified

Data sourced from trusted institutions

All formulas verified against official standards.