Decode and inspect JSON Web Tokens — view header, payload, claims, expiry status, and signature details instantly.
atob().
No token data is ever sent to any server.
A JSON Web Token (JWT) is a compact, URL-safe token format used to securely transmit information between parties. A JWT consists of three Base64URL-encoded parts separated by dots: a Header (algorithm and token type), a Payload (claims/data), and a Signature (used to verify integrity). JWTs are widely used in authentication and authorization flows — when you log in to a web application, the server often returns a JWT that your browser sends with every subsequent request.
alg) such as HS256, RS256, or ES256, and the token type (typ), which is always JWT.sub (subject), iss (issuer), aud (audience), exp (expiry), iat (issued at), and nbf (not before). Custom claims can be any key-value pair.Signature verification requires the secret key (for HMAC) or the private key (for asymmetric algorithms). Exposing these keys in browser JavaScript would completely defeat the purpose of signing — any attacker could read the key from the browser's developer tools. Verification must always happen on a trusted server. This tool safely decodes (not verifies) the JWT, which is useful for debugging, inspecting claims, and checking expiry without needing the key.