How to Use the JWT Token Decoder

Decode JSON Web Tokens (JWT) quickly to view header and payload information. Great for debugging authentication, inspecting claims, and understanding token structure.

Watch Demo Video

Simple 4-Step Process

1

Copy Your JWT Token

Get the JWT token from your application, API response, or authentication system. It usually starts with 'eyJ...'

2

Paste the Token

Paste your JWT token into the text area. The token should be a long string divided into three parts by dots.

3

Click Decode Button

Click the 'Decode' button to extract and show the header and payload information from your JWT token.

4

Review Decoded Data

Check the header (algorithm and token type) and payload (claims, expiration, user data) sections.

Understanding JWT Token Structure

A JWT token has three parts separated by dots (.). Each part serves a specific purpose:

Header

Contains metadata about the token

Algorithm (alg), Token Type (typ)

Payload

Contains the claims and user data

User info, Expiration (exp), Issued At (iat), Claims

Signature

Used to verify token authenticity

Not decoded - requires secret key to validate

Example JWT Token:
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c

Common JWT Claims

JWT payloads usually include these standard claims:

iss

Issuer - Who created the token

sub

Subject - Who the token is about

aud

Audience - Who should accept the token

exp

Expiration - When the token expires

iat

Issued At - When the token was created

nbf

Not Before - When the token becomes valid

Important Security Notes

  • This tool only decodes JWT tokens - it does not validate signatures.
  • Never share tokens with sensitive or production data.
  • JWTs are encoded, not encrypted - anyone can decode and read the contents.
  • Always verify tokens on your server before trusting their contents.
  • Check the expiration (exp) claim to ensure tokens haven't expired.