Decode token payloads
JWT Decoder
Read the header and payload of a JWT quickly when you need to inspect claims, expiry, or token structure during development.
- Decode header and payload locally
- Readable summary for time-based claims
- Clear warning that decode is not verification
JWT Decoder
2023-11-14T22:13:20.000Z
How to use
Step 1
Paste the token
Provide a JWT in the typical header.payload.signature format. The decoder reads the first two segments as Base64URL-encoded JSON.
Step 2
Review header and payload separately
Inspect algorithm, token type, custom claims, and time-based claims without manually copying segments into another tool.
Step 3
Verify elsewhere if security matters
Decoding is useful for inspection. Signature validation and trust decisions must happen in a proper security context.
FAQ
Does this tool verify the JWT signature?
No. It decodes the visible header and payload only. Signature verification requires the signing key and a trusted validation flow.
Why are exp and iat shown as dates?
These fields are typically Unix timestamps. Converting them to readable dates makes it easier to inspect token lifetime.
Can I decode tokens with custom claims?
Yes. Any JSON claims in the payload are shown as-is after decoding.
Related tools