Decode and inspect JSON Web Tokens — view header, payload, claims, expiry status, and signature details instantly.
atob()
.
No token data is ever sent to any server.
A JSON Web Token (JWT) is a compact, URL-safe token format used to securely transmit information between parties. A JWT consists of three Base64URL-encoded parts separated by dots: a Header (algorithm and token type), a Payload (claims/data), and a Signature (used to verify integrity). JWTs are widely used in authentication and authorization flows — when you log in to a web application, the server often returns a JWT that your browser sends with every subsequent request.
alg
) such as HS256, RS256, or ES256, and the token type (
typ
), which is always
JWT
.
sub
(subject),
iss
(issuer),
aud
(audience),
exp
(expiry),
iat
(issued at), and
nbf
(not before). Custom claims can be any key-value pair.
Signature verification requires the secret key (for HMAC) or the private key (for asymmetric algorithms). Exposing these keys in browser JavaScript would completely defeat the purpose of signing — any attacker could read the key from the browser's developer tools. Verification must always happen on a trusted server. This tool safely decodes (not verifies) the JWT, which is useful for debugging, inspecting claims, and checking expiry without needing the key.