Decode and inspect JWT tokens instantly in the browser. View header, payload, and signature — with expiry status, claims validation, and HMAC verification. Free, no signup.
JWT Decoder — Inspect JSON Web Tokens Safely in the Browser
JSON Web Tokens are the de facto standard for stateless authentication on the web. When debugging authentication flows, the first tool a developer reaches for is a JWT decoder — a way to see what claims are encoded in a token, whether it has expired, and whether its signature is valid. This tool provides all three functions without sending your token anywhere.
Understanding JWT Structure
A JWT consists of three dot-separated base64url-encoded strings. The header specifies the algorithm (alg) used to sign the token — typically HS256 for HMAC-SHA256 or RS256 for RSA. The payload contains the claims — registered claims like sub, exp, and iat, plus any custom application claims. The signature is computed over the header and payload using the algorithm and key, allowing the receiver to verify the token hasn't been tampered with.
Standard JWT Claims
- sub (Subject) — Identifies the principal that is the subject of the JWT, typically the user ID
- iss (Issuer) — Identifies who issued the token — the authentication server's URL
- aud (Audience) — Identifies the recipient(s) for which the token is intended
- exp (Expiration Time) — Unix timestamp after which the token must be rejected
- iat (Issued At) — Unix timestamp when the token was created
- nbf (Not Before) — Unix timestamp before which the token must be rejected
- jti (JWT ID) — Unique identifier for the token, used to prevent replay attacks