Back to Utilities
ANALYZER

JWT Decoder

Decode JSON Web Tokens and inspect the header, payload claims and expiry — entirely in your browser, no data sent to any server.

Security notice: Never paste production JWTs or tokens containing sensitive data. This tool runs entirely in your browser — nothing is sent to any server.

Understanding JWTs

1

Header

Specifies the token type (JWT) and the signing algorithm (e.g. HS256, RS256). Always Base64url encoded.

2

Payload

Contains the claims — sub (subject), iss (issuer), exp (expiry), iat (issued at) and any custom data.

3

Signature

Cryptographic proof that the token was issued by the expected party and hasn't been tampered with.

Common standard claims

subSubject — who the token is about (user ID)
issIssuer — who issued the token (your auth service)
expExpiration — Unix timestamp when token expires
iatIssued at — Unix timestamp when token was created
nbfNot before — token is not valid before this time
audAudience — who the token is intended for