A secure browser-based tool for decoding JSON Web Tokens. Inspect headers and payloads with confidence—your tokens never leave your device.
Algorithm and token type information
Decoded header will appear here...
Claims and user data
Decoded payload will appear here...
JSON Web Tokens (JWT) are an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. JWTs are commonly used for authentication and information exchange in web development.
A JWT consists of three parts separated by dots:
Reserved Claims:
iss
: Issuer - identifies the principal that issued the JWTsub
: Subject - identifies the subject of the JWTaud
: Audience - identifies the recipients the JWT is intended forexp
: Expiration Time - identifies the time after which the JWT is no longer validOther Common Claims:
iat
: Issued At - identifies the time at which the JWT was issuednbf
: Not Before - identifies the time before which the JWT must not be acceptedjti
: JWT ID - provides a unique identifier for the JWTname
: Full Name - a common custom claim for the user's full nameAuthentication: After a user signs in, the server issues a JWT that can be used to identify the user for subsequent requests, eliminating the need to query the database for user information on each request.
Information Exchange: JWTs can securely transmit information between parties, with the signature ensuring the data hasn't been tampered with.
Authorization: JWTs can contain user roles and permissions that services can use to determine access rights.
Security Notice:
This tool only decodes JWTs, it doesn't validate signatures or verify tokens. For security-critical applications, always verify tokens server-side with proper cryptographic validation.