Decode, inspect, and verify JSON Web Tokens — entirely in the browser
{
"alg": "HS256",
"typ": "JWT"
}{
"sub": "1234567890",
"name": "John Doe",
"iat": 1516239022
}A JSON Web Token (JWT) is a compact, URL-safe credential format that encodes a signed JSON payload. It's the dominant format for modern authentication (OAuth 2.0, OIDC, API keys). Debugging one usually means decoding the Base64URL segments, checking the expiry, and verifying the signature — this tool does all three without ever sending the token over the network.
No. Decoding and HMAC verification both happen in your browser using the Web Crypto API. Tokens are safe to paste here.
Those algorithms require the issuer's public key, which only the token issuer has. You can verify them on your own server with the public key; our tool handles HMAC (shared-secret) algorithms only.
A warning shown when the token will expire within the next 5 minutes — a common problem in failing deploys or clock-skew debugging.
Yes, any standards-compliant three-part JWT (header.payload.signature) with Base64URL encoding. Malformed tokens produce a clear error.
No, JWTs can contain any custom claims. Our analysis table highlights the standard RFC 7519 registered ones; your custom claims still appear in the raw payload view above.