🐝

Bee Hive

JWT Decoder

Decode and inspect JSON Web Tokens.

About JWT Decoder

JSON Web Tokens (JWT) are an industry-standard method for securely transmitting information between parties as a JSON object. Our JWT Decoder tool helps developers, security engineers, and API integrators inspect and debug JWTs by decoding them into their three constituent parts: Header, Payload, and Signature. The tool displays the Header (which contains metadata about the token type and signing algorithm) and the Payload (which contains the claims or statements about an entity and additional data) in a beautifully formatted, human-readable format. JWTs are widely used for authentication and authorization in modern web applications, mobile apps, and microservices architectures. When you authenticate to a service, the server issues a JWT that your client can present on subsequent requests to prove identity without needing to re-authenticate. Our decoder also checks the expiration time (exp claim) in the payload and indicates whether the token is currently active or has expired. All decoding happens entirely within your browser using client-side JavaScript, ensuring your tokens and sensitive data never leave your device. It's important to note that this tool only decodes and displays the token contents—it does not and cannot verify the signature. Signature verification requires the secret key or public key used to sign the token, which should never be entered into third-party tools. Use this decoder to understand token structure, debug authentication issues, inspect claims, check expiration times, and learn how JWTs work. Whether you're developing OAuth 2.0 integrations, troubleshooting API authentication, or simply learning about modern web security, this tool provides immediate visibility into JWT contents.

Frequently Asked Questions

Is it safe to paste my JWT here?

Yes, decoding happens locally in your browser. However, never share your JWTs with untrusted parties as they contain sensitive session information.

Does this verify the signature?

No, this tool only decodes the payload. Signature verification requires the secret key, which you should not enter here.

What is a JWT?

JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.

What are the three parts of a JWT?

A JWT consists of three Base64-encoded parts separated by dots: Header (algorithm and token type), Payload (claims and data), and Signature (verification code). The format is: header.payload.signature

What claims are commonly found in the payload?

Common claims include 'iss' (issuer), 'sub' (subject/user ID), 'aud' (audience), 'exp' (expiration time), 'nbf' (not before), 'iat' (issued at), and 'jti' (JWT ID). Applications can also add custom claims.

Why can I read the JWT without the secret key?

JWTs are encoded, not encrypted. The signature prevents tampering but doesn't hide the contents. Anyone can decode and read the Header and Payload. Never put sensitive information like passwords in a JWT.

What signing algorithms are used?

Common algorithms include HS256 (HMAC with SHA-256 using a shared secret), RS256 (RSA signature with SHA-256 using public/private key pair), and ES256 (ECDSA with SHA-256). The algorithm is specified in the Header.

How do I know if my token is valid?

This tool shows if the token is expired by checking the 'exp' claim. However, to fully validate a token (signature verification, issuer validation, audience checks), you need server-side verification with the appropriate secret or public key.

What does 'Invalid JWT token' mean?

This error appears when the token doesn't have the correct JWT format (three Base64-encoded parts separated by dots) or when the Header or Payload cannot be parsed as valid JSON.

Can I edit or create JWTs with this tool?

No, this is a read-only decoder. Creating or modifying JWTs requires cryptographic signing with a secret key, which should only be done on trusted servers, never in browser-based tools.