Navigation

JWT Decoder

Decode and inspect JSON Web Tokens. View header, payload, claims, and expiration status. 100% client-side — nothing leaves your browser.

Token

Paste a JWT (eyJhbG...) — it will be auto-decoded on paste.

Header
Decoded header will appear here...
Payload
Decoded payload will appear here...
Claims
Parsed claims will appear here...
Related tools

Frequently Asked Questions

A JWT is a compact token format (RFC 7519) used to securely transmit information between parties. It has three parts separated by dots: a Base64URL-encoded header (algorithm info), payload (claims), and signature. JWTs are stateless and commonly used for API authentication, single sign-on (SSO), and authorization.

No. The header and payload are only Base64URL-encoded, not encrypted. Anyone can decode them. Verification involves checking the cryptographic signature using the issuer's secret or public key to ensure the token hasn't been modified. This tool decodes for inspection only.

The exp claim is a Unix timestamp indicating when the token expires. If the current time is past this value, the token is expired. Most APIs reject expired tokens. Check the "issued at" (iat) and "not before" (nbf) claims to understand the token's validity window.