JWT Decoder
Paste a JWT to inspect its header and payload. Decoding stays on your machine — important for tokens that contain secrets.
How to use JWT Decoder
- Paste your JWT into the input area.
- The header and payload are decoded automatically as you type.
- Inspect any standard claims (iss, sub, exp, iat) in the formatted payload.
- Copy the decoded JSON for use in your debugger or test suite.
What is a JWT?
A JSON Web Token (JWT) is a compact, URL-safe way to represent claims between two parties. It's the most common format for stateless authentication on the web — when you log in, the server returns a JWT, and your client sends it on every subsequent request to prove who you are.
Anatomy
A JWT has three parts separated by dots: header.payload.signature. The header and payload are Base64url-encoded JSON. The signature is computed over the first two parts using a secret (HMAC) or private key (RSA, ECDSA). Decoding only requires Base64; verifying requires the key.
Why decoding tokens locally matters
Many JWTs include enough information to identify a user, an organization, or an internal API permission. Even an expired token still leaks identifiers. Pasting one into a server-backed tool means a third party logs your identity. This decoder runs in the browser; the token never leaves the page.