JWT (JSON Web Token) is an open standard (RFC 7519) for representing claims securely between parties. A JWT consists of three Base64URL-encoded parts separated by dots: the header, the payload, and the signature. This tool decodes the header and payload — the signature cannot be verified without the secret key.
A JSON Web Token (JWT) is a compact, URL-safe method of representing claims between two parties, defined in RFC 7519. This decoder takes the raw JWT string you paste in and splits it into its three component parts — header, payload, and signature — formatting the JSON sections for easy reading. Everything runs in your browser; your token is never transmitted to any server.
A JWT is three Base64URL-encoded strings joined by dots: header.payload.signature.
sub (subject), iss (issuer), exp (expiry), iat (issued at), and custom application-defined claimsexp). A token with a past expiry timestamp should be rejected by the server. This decoder shows the exp field so you can see if a token is still valid.JWTs are used in virtually every modern authentication system — OAuth 2.0, OpenID Connect, and most API authentication schemes rely on them. Developers use a JWT decoder to inspect the claims inside an access token or ID token during debugging, to check token expiry, to verify the correct scopes were granted, or to diagnose authentication failures in development environments.
Yes — decoding happens entirely in your browser. Nothing is sent to any server. However, never share JWTs containing sensitive data on untrusted tools.
No — signature verification requires the secret key or public key, which you should never share with third-party tools.