JWT Decoder - Decode JSON Web Tokens Online

Decode and inspect JWT tokens instantly. View header, payload, and all claims. Debug authentication tokens without exposing your secret key.

What Is a JWT?

A JSON Web Token (JWT, pronounced "jot") is a compact, self-contained token format defined by RFC 7519. It encodes claims — statements about a user or system — as a JSON object that is digitally signed, ensuring the payload cannot be tampered with undetected.

A JWT consists of three Base64url-encoded parts separated by dots:

xxxxx.yyyyy.zzzzz
Header . Payload . Signature

JWT Structure Explained

Header

Specifies the token type and signing algorithm. Common algorithms:

Payload — Standard Claims

ClaimMeaningType
issIssuer — who issued the tokenstring
subSubject — usually the user IDstring
audAudience — intended recipientstring/array
expExpiration — Unix timestamp after which the token is invalidnumber
nbfNot before — token not valid before this timenumber
iatIssued at — creation Unix timestampnumber
jtiJWT ID — unique ID for replay preventionstring

Signature

Proves the token has not been tampered with. For HS256: HMAC-SHA256(base64url(header) + "." + base64url(payload), secret). Signature verification requires the secret or public key — decoding alone only shows the raw payload without confirming authenticity.

Common JWT Debugging Scenarios

Security Best Practices

Frequently Asked Questions

What is a JWT token?

A JSON Web Token is a compact, URL-safe token with three parts: header (algorithm/type), payload (claims about the user), and signature (integrity proof). It is widely used for stateless authentication — the server signs user info so future requests can be verified without a database lookup.

Is it safe to decode a JWT in this online tool?

This decoder runs entirely in your browser — your token never leaves your machine. As a general security practice, avoid pasting production tokens with sensitive user data into any public tool. Use this for development and debugging tokens only.

Does decoding verify the JWT signature?

No. Decoding only extracts and displays the header and payload. Signature verification requires the secret (HMAC) or public key (RSA/ECDSA) and must be done server-side. Never make authorization decisions based solely on a decoded but unverified JWT.

What are common JWT claims?

Standard claims: iss (issuer), sub (subject/user ID), aud (audience), exp (expiration), iat (issued at), nbf (not before), jti (unique ID). Applications commonly add custom claims like roles, email, or permissions.

Related Encode / Decode Tools