JWT Decoder - Decode JSON Web Tokens Online
About the JWT Decoder
JSON Web Tokens are used widely for authentication and authorisation. OAuth 2.0 access tokens, OpenID Connect ID tokens, and many API authentication schemes use JWTs to carry identity claims between services. When debugging authentication flows, you need to see what is inside a token: who issued it, who it is for, when it expires, and what permissions it grants.
This decoder splits the token into its three parts, Base64URL-decodes the
header and payload, and presents the JSON in a formatted, readable layout.
Timestamp claims like exp, iat, and
nbf are automatically converted to human-readable dates, and
the tool flags whether the token is currently expired.
How to Use the JWT Decoder
Paste a JWT string into the input field. The decoder immediately separates the header, payload, and signature. The header shows the signing algorithm (e.g., HS256, RS256). The payload displays all claims in formatted JSON with timestamps converted to dates. The signature section shows the raw encoded signature for reference. If the token format is invalid, a clear error message explains what went wrong.
Features
- Header and payload inspection. See the algorithm, token type, and every claim in formatted JSON.
- Timestamp conversion. Unix timestamps in claims like
exp,iat, andnbfare shown as readable dates. - Expiration status. The decoder checks whether the token is expired and highlights the result.
- Format validation. Invalid tokens are rejected with a helpful error explaining the structural issue.
- Complete privacy. The token never leaves your browser, protecting sensitive claims and user data.
When to Decode JWTs
Decoding JWTs is essential when debugging OAuth login flows, investigating why an API returns 401 or 403 errors, verifying that a token contains the expected scopes or roles, and checking whether a refresh token has expired. Security engineers also decode tokens during penetration testing to inspect claim structures. A bookmarked JWT decoder is a quick win for anyone building or maintaining authenticated applications.