JWT Decoder

Paste a JSON Web Token to inspect its header, payload, and claims. Decoding runs entirely in your browser.

Color-coded: header . payload . signature
HEADER
PAYLOAD

How JWTs are structured

A JSON Web Token is three Base64URL-encoded segments separated by dots: header.payload.signature. The header and payload are JSON objects. The signature is a cryptographic signature over the first two segments using the algorithm specified in the header.

Common standard claims

ClaimMeaning
issIssuer — who issued the token
subSubject — who the token is about (often user ID)
audAudience — who the token is intended for
expExpiration time (Unix timestamp). Tokens past this are invalid.
nbfNot before — token is invalid before this time
iatIssued at — when the token was created
jtiJWT ID — unique identifier, useful for revocation

Security tips

Frequently asked questions

What's the difference between JWT, JWS, and JWE?

JWT is the umbrella term for the token format. JWS (JSON Web Signature) is a JWT that is signed but not encrypted — the most common form, what this tool decodes. JWE (JSON Web Encryption) is a JWT that is encrypted, so the payload is opaque without the decryption key.

What does the signature actually verify?

The signature is computed over base64url(header) + "." + base64url(payload). It proves both that the header and payload haven't been changed and that whoever signed the token had the correct key.