All tools

JWT Decoder & Expiration Checker

Decode JWT tokens, inspect claims, and check expiration timestamps. All processing is done locally in your browser.

How to decode a JWT

A JSON Web Token (JWT, pronounced "jot") is a compact, URL-safe token format defined by RFC 7519. It consists of three Base64URL-encoded parts separated by dots: a header that specifies the signing algorithm, a payload containing claims like sub, roles, and exp, and a signature that helps verify the token has not been tampered with.

JWT structure

header.payload.signature

JWTs are commonly used for API authentication, single sign-on (SSO), and session management. This inspector decodes the header and payload so you can read the claims, check expiration timestamps, and debug token issues without sending the token anywhere.

JWT decoder examples

  • Decode a JWT from an API response to inspect its claims
  • Check the exp (expiration) and iat (issued at) timestamps in a token
  • Verify which signing algorithm (HS256, RS256, etc.) a token uses
  • Debug an "invalid token" error by inspecting the payload structure
  • Read the sub, iss, and aud claims to understand a token's scope

How to use this JWT decoder

  1. Paste a JWT into the text area.
  2. The inspector immediately decodes and displays the header and payload as formatted JSON.
  3. Expiration information is highlighted. You can see at a glance whether the token is still valid or has expired.

JWT decoder FAQ

Does this JWT decoder verify the signature?

This tool decodes and displays the token contents but does not verify the cryptographic signature. Signature verification requires the signing secret or public key, which should never be pasted into a web tool. Use a server-side library for signature validation.

How is my JWT processed?

All decoding happens entirely in your browser, and the token is never sent to any server. That said, JWTs often contain sensitive claims like sub, role names, email addresses, or permissions, so avoid sharing them in public channels regardless of the tool you use.

What do JWT claims mean?

  • iss: issuer, the system that created the token.
  • sub: subject, usually the user or entity the token represents.
  • aud: audience, the intended recipient of the token.
  • exp: expiration time, usually stored as a Unix timestamp.
  • iat: issued-at time.
  • nbf: not-before time; the token is not valid before this moment.

Why does my token show as three sections?

A JWT is always three Base64URL-encoded parts separated by dots:

header.payload.signature

The header declares the algorithm, the payload carries the claims, and the signature protects integrity. This tool decodes the first two parts, which are encoded, not encrypted.

Privacy

All JWT decoding happens entirely in your browser. Your tokens are never transmitted to any server; the Base64URL decoding runs locally in JavaScript.