What is a JWT?
JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed.
JWTs are widely used in modern web development for Authentication (logging in users) and Information Exchange. When a user logs in, the server generates a token that the client (browser) saves and sends back with every request to prove identity.
Key Features
100% Client-Side
Tokens are decoded locally in your browser. No data is ever sent to a server.
Syntax Highlighting
Beautifully formatted JSON output with color coding for easy reading.
Date Conversion
Automatically converts Unix timestamps (iat, exp, nbf) into human-readable dates.
Format Validation
Instantly detects malformed tokens or invalid Base64 strings.
How to Decode a Token
Debugging authentication issues is easy with our tool. Follow these steps:
Get Token
Copy the JWT string. It usually looks like eyJhbG... and is found in your browser's Local Storage or Cookies.
Paste It
Paste the string into the input box on this page. The tool will auto-detect the format.
Inspect
View the decoded Header and Payload. Check the "exp" field to see if the token is still valid.
The Anatomy of a JWT
Developer Note: JWTs are Base64Url encoded, NOT encrypted. This means anyone who has the token can read the data inside. Never store sensitive information like passwords in a JWT payload.
A JWT is composed of three parts separated by dots (.):
- Header
Contains metadata about the token, typically the type of token (JWT) and the signing algorithm being used (e.g., HMAC SHA256 or RSA).
- Payload
Contains the claims. Claims are statements about an entity (typically, the user) and additional data like user ID, roles, and expiration time.
- Signature
Used to verify that the message wasn't changed along the way. In the case of tokens signed with a private key, it can also verify that the sender is who they say they are.