JWT Decoder
Decode and inspect JSON Web Tokens. View header, payload claims, and check expiry - without a secret key.
⚠ Signature is not verified - this tool only decodes. To verify the signature, use your server-side JWT library with the appropriate secret or public key.
About JWT Decoder
A JSON Web Token (JWT) consists of three Base64URL-encoded parts separated by dots: the header (algorithm and type), the payload (claims), and the signature. This tool decodes the first two parts so you can inspect the contents. The signature is shown as-is but is not verified.
Standard Claims Explained
- sub - Subject. The entity the token refers to (usually a user ID).
- iss - Issuer. Who created and signed the token.
- aud - Audience. Who the token is intended for.
- exp - Expiration time (Unix timestamp). The token is invalid after this time.
- iat - Issued at (Unix timestamp). When the token was created.
- nbf - Not before (Unix timestamp). Token is invalid before this time.
- jti - JWT ID. A unique identifier for this specific token.
How to Use
- Paste a JWT token (the full string starting with "eyJ...") into the input.
- The tool instantly decodes and displays the Header, Payload, and Signature sections.
- Check the payload claims (sub, iat, exp, etc.) and see if the token is expired.
- Click Copy to copy individual decoded sections.
How It Works
A JWT has three Base64URL-encoded parts separated by dots. The tool splits on dots, Base64URL-decodes each part, and parses the header and payload as JSON. The exp claim is compared to the current time to show expiration status.
Example
A JWT from your API response: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiJ1c2VyMTIzIiwiaWF0IjoxNjAwMDAwMDAwfQ.signature
Decodes to: Algorithm HS256, Subject "user123", Issued At the given timestamp.