JWT Decoder
Paste a JWT to inspect the header and payload. Decoding runs locally; signatures are not verified.
JWT Decoder Online
JSON Web Tokens pack a header, payload, and signature into three Base64url segments. Paste a token from OAuth flows, APIs, or localStorage to inspect decoded JSON claims, useful for debugging iss, aud, sub, and exp without shipping secrets to a third party.
Where Is This Useful?
How to Use
- Paste the full JWT string (three segments separated by dots)
- Click Decode or press Ctrl+Enter
- Read header & payload JSON; check the Claims box for
expwhen present
What You See
- Header: typically
algandtyp - Payload: registered and custom claims as JSON
- Signature segment: shown as opaque text (not verified here)
- exp: human-readable UTC time when the claim exists
Security Notes
Decoding is not verifying. Anyone can Base64-decode a JWT; trust comes from cryptographic signature checks with the issuer's keys. Never treat decoded content alone as proof of authenticity.
Frequently Asked Questions
Are signatures verified?
No. This tool only Base64url-decodes the header and payload. Use your auth library or JWKS to verify signatures in production.
Is the token sent to a server?
No. Decoding runs entirely in your browser.
What about exp?
When an exp claim exists as a Unix timestamp, the tool shows an ISO time and whether it looks expired relative to your device clock.
Related Tools