The fastest online JWT decoder — paste any JSON Web Token and instantly
decode JWT header, payload and claims. Check expiration, issuer and all standard claims.
Our client-side JWT decoder runs entirely in your browser.
No uploads, no account, 100% private.
JWT Decoder · Claims Inspector · Expiry Check · Signature Verify · Free
Paste your JWT — from an API response, Authorization header or OAuth flow — into the input above.
Click Decode JWT. Header and payload are Base64URL-decoded in your browser. No server contact.
View all claims — sub, iss, exp, iat and custom claims — with human-readable timestamps.
Optionally verify the signature using your HS256 secret or RS256 public key — all in-browser.
A JWT decoder is a tool that reads a JSON Web Token and splits it into its three components — header, payload and signature — then decodes the Base64URL-encoded header and payload into readable JSON. This lets you inspect the algorithm, token type, issuer, subject, audience, expiration time and any custom claims without needing the secret key.
This online JWT decoder also acts as a JWT claims inspector and expiry checker — it calculates whether the token is still valid, how much time remains before it expires, or how long ago it expired. Optionally, paste your secret key or public key to perform JWT signature verification entirely in your browser using the Web Crypto API.
| Claim | Full Name | Description |
|---|---|---|
| sub | Subject | The user or entity the token refers to (e.g. user ID) |
| iss | Issuer | The server or service that issued the token |
| aud | Audience | The intended recipient(s) of the token |
| exp | Expiration | Unix timestamp after which the token is invalid |
| iat | Issued At | Unix timestamp when the token was issued |
| nbf | Not Before | Unix timestamp before which the token must not be used |
| jti | JWT ID | Unique identifier for the token (for revocation) |
This JWT decode tool supports all standard JWT formats. Here's how to use each feature:
Paste your JWT (the three-part dot-separated string) into the input field and click Decode JWT. The token is split and decoded instantly. The colour-coded preview under the input shows the header in red, payload in purple and signature in green — matching the standard colour convention used in jwt.io and similar JWT debugger tools.
The status banner at the top of the results shows whether the token is Valid, Expired, or has no expiry claim. For each timestamp claim (exp, iat, nbf), the decoder shows both the raw Unix timestamp and a human-readable date with the time remaining or elapsed — making this the ideal JWT decoder check expiration exp tool for debugging authentication issues.
The Verify Signature panel supports two modes. For HS256 tokens (the most common type used with HMAC-SHA256), paste your secret key and the tool uses the Web Crypto API to recompute the signature and compare it to the token's signature. For RS256 tokens, paste the public key in PEM format. Note that only the public key is needed for verification — the private key never needs to leave your server.
This tool works as a bearer token decoder for OAuth 2.0 access tokens and OpenID Connect ID tokens. If your API returns a Bearer token in the Authorization header, paste just the token string (without the Bearer prefix) to inspect the user claims, scopes, and expiration time.
This JWT decoder for developers is used across authentication, API development and security workflows:
localStorage or cookies to read user identity, roles and expiration without making an extra API call.alg: none), overly permissive claims or excessively long expiry times.kubectl get secret) and cloud provider tokens (AWS STS, GCP service accounts) to verify scope and expiry.eyJ) into the input above and click Decode JWT. The header, payload and signature are decoded and displayed instantly with human-readable timestamps for exp, iat and nbf. All decoding happens locally — the token never leaves your browser.exp (expiration) claim is a Unix timestamp (seconds since January 1, 1970 UTC). The JWT must not be accepted after this time. This decoder converts it to a human-readable date and shows whether the token is still valid, when it expires, or how long ago it expired — making it the ideal JWT decoder check expiration exp tool.nbf, or intended for the wrong audience. This tool does both.