Bearer prefix was pasted
Authorization headers include Bearer plus the token; decoding needs only the token.
Remove Bearer and paste the three-part JWT string.
Decode JWT headers, payloads and claims locally for API debugging and login issue checks. Tokens stay in your browser and are not uploaded.
JWT Decoder parses JWT Header and Payload locally so you can inspect claims, iat, exp and permission fields during login debugging or API integration. It decodes only and does not verify signatures.
Authorization headers include Bearer plus the token; decoding needs only the token.
Remove Bearer and paste the three-part JWT string.
Payload content can be forged until the signature is verified.
Use server-side verification with a secret or public key for security decisions.
Opaque tokens, session IDs and encrypted JWE tokens cannot be viewed as normal JWTs.
Check whether it has header.payload.signature structure.
This tool decodes tokens locally. It does not validate signatures.
| Action | Needs key? | Confirms | Does not confirm |
|---|---|---|---|
| JWT decode | No | Header, Payload and claims content | Whether the token was tampered with |
| Signature verification | Secret or public key | The token matches its signature | Business authorization by itself |
| Expiration check | No | The exp value if present | Server clock and revocation rules |
| Permission check | Usually server-side | Role/scope in application context | Security from Payload alone |
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiI0MiIsInNjb3BlIjoicmVhZCJ9.xxx
{
"sub": "42",
"scope": "read"
}This page decodes Header and Payload; it does not verify signatures.
Inspect sub, scope, iat and exp fields when login state behaves unexpectedly.
Confirm bearer tokens contain the expected role or permission claims.
Find exp or iat fields to investigate session lifetime problems.
No. The token is decoded locally in your browser.
No. Decoding only reads the encoded JSON. Signature verification requires a secret or public key.
The token may include a Bearer prefix, be incomplete, lack the normal three-part structure or contain extra whitespace.
If the payload includes exp, you can inspect that field. The page does not currently format exp as a date automatically.
Use it for inspection only. A payload is not trustworthy until the token signature is verified.
No. The JWT decoder is free and requires no account.
No. JWE is encrypted and needs keys. This tool is for common JWT/JWS viewing.
The tool does not upload them, but production tokens are still sensitive. Only inspect them when needed and avoid leaving results in the clipboard.