JWT Decoder
Decode and inspect JSON Web Tokens instantly. Client-side only.
Token
About JWT Tokens
JSON Web Tokens (JWT) are a compact, URL-safe way to represent claims between two parties. They consist of three parts: a header, a payload, and a signature.
Header
Contains the token type and signing algorithm (e.g., HS256, RS256).
Payload
Contains the claims: user data, expiration, issuer, and custom fields.
Signature
Verifies the token hasn't been tampered with. Cannot be verified client-side without the secret.
How to Use This JWT Decoder
- Paste your JWT token — Copy the full token
string (starting with
eyJ...) into the input field above. - View decoded header and payload instantly — The header reveals the signing algorithm and token type, while the payload shows all claims and user data.
- Check expiration status — If the token
contains an
expclaim, the decoder will show whether the token is still valid or has expired.
Common JWT Claims
Issuer — identifies who created the token
Subject — identifies the principal (usually a user ID)
Expiration — Unix timestamp after which the token is invalid
Issued At — Unix timestamp when the token was created
Audience — intended recipient of the token
Not Before — token is not valid before this timestamp
JWT ID — unique identifier to prevent token replay
JWT Security Best Practices
- Always validate signatures server-side before trusting token contents
- Check expiration (
exp) before trusting any claims - Use HTTPS for all token transmission to prevent interception
- Keep signing keys secret and rotate them periodically
- Set reasonable expiration times — shorter-lived tokens reduce risk
FAQ
Can this tool verify JWT signatures?
This tool decodes only. Signature verification requires the secret key (for HMAC) or the public key (for RSA/ECDSA) and should always be performed server-side as part of your authentication flow.
Is it safe to paste my JWT here?
Yes. All decoding happens entirely in your browser using JavaScript. No data is sent to any server — you can verify this by checking the network tab in your browser's developer tools.
What algorithms does JWT support?
Common algorithms include HS256 (HMAC-SHA256), RS256 (RSA-SHA256), and ES256
(ECDSA-SHA256). The algorithm is specified in the token's header under the alg field.
Related Tools
Secure your webhook endpoints?
HookWatch supports JWT and HMAC signature verification for all incoming webhooks.
Get Started Free