JWT Decoder Online Free

The fastest online JWT decoder — paste any JSON Web Token and instantly decode JWT header, payload and claims. Check expiration, issuer and all standard claims. Our client-side JWT decoder runs entirely in your browser. No uploads, no account, 100% private.
JWT Decoder · Claims Inspector · Expiry Check · Signature Verify · Free

JWT Token
Header JOSE
Payload Claims
Signature Base64URL

🔑 Verify Signature (optional)

How It Works

1. Paste JWT Token

Paste your JWT — from an API response, Authorization header or OAuth flow — into the input above.

2. Decode Locally

Click Decode JWT. Header and payload are Base64URL-decoded in your browser. No server contact.

3. Inspect Claims

View all claims — sub, iss, exp, iat and custom claims — with human-readable timestamps.

4. Verify Signature

Optionally verify the signature using your HS256 secret or RS256 public key — all in-browser.

What Is a JWT Decoder?

A JWT decoder is a tool that reads a JSON Web Token and splits it into its three components — header, payload and signature — then decodes the Base64URL-encoded header and payload into readable JSON. This lets you inspect the algorithm, token type, issuer, subject, audience, expiration time and any custom claims without needing the secret key.

This online JWT decoder also acts as a JWT claims inspector and expiry checker — it calculates whether the token is still valid, how much time remains before it expires, or how long ago it expired. Optionally, paste your secret key or public key to perform JWT signature verification entirely in your browser using the Web Crypto API.

JWT Token Structure

eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkFsaWNlIiwiaWF0IjoxNjAwMDAwMDAwLCJleHAiOjE5MDAwMDAwMDB9.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c Header — algorithm (alg) and token type (typ) Payload — claims: sub, name, iat, exp, custom fields Signature — HMAC or RSA signature for verification

Standard JWT Claims

ClaimFull NameDescription
subSubjectThe user or entity the token refers to (e.g. user ID)
issIssuerThe server or service that issued the token
audAudienceThe intended recipient(s) of the token
expExpirationUnix timestamp after which the token is invalid
iatIssued AtUnix timestamp when the token was issued
nbfNot BeforeUnix timestamp before which the token must not be used
jtiJWT IDUnique identifier for the token (for revocation)

How to Decode JWT and View Claims

This JWT decode tool supports all standard JWT formats. Here's how to use each feature:

Decode JWT Token Online

Paste your JWT (the three-part dot-separated string) into the input field and click Decode JWT. The token is split and decoded instantly. The colour-coded preview under the input shows the header in red, payload in purple and signature in green — matching the standard colour convention used in jwt.io and similar JWT debugger tools.

JWT Decoder Check Expiration (exp)

The status banner at the top of the results shows whether the token is Valid, Expired, or has no expiry claim. For each timestamp claim (exp, iat, nbf), the decoder shows both the raw Unix timestamp and a human-readable date with the time remaining or elapsed — making this the ideal JWT decoder check expiration exp tool for debugging authentication issues.

JWT Signature Verifier

The Verify Signature panel supports two modes. For HS256 tokens (the most common type used with HMAC-SHA256), paste your secret key and the tool uses the Web Crypto API to recompute the signature and compare it to the token's signature. For RS256 tokens, paste the public key in PEM format. Note that only the public key is needed for verification — the private key never needs to leave your server.

Bearer Token Decoder for OAuth

This tool works as a bearer token decoder for OAuth 2.0 access tokens and OpenID Connect ID tokens. If your API returns a Bearer token in the Authorization header, paste just the token string (without the Bearer prefix) to inspect the user claims, scopes, and expiration time.

Who Uses a JWT Decoder?

This JWT decoder for developers is used across authentication, API development and security workflows:

JWT decoder decode JWT online JWT decode tool JSON Web Token decoder online JWT decoder JWT debugger JWT claims inspector bearer token decoder decode JWT token online free JWT decoder with signature verification client-side JWT decoder no upload JWT decoder check expiration exp JWT decoder for OAuth access tokens

Frequently Asked Questions

A JWT decoder splits a JSON Web Token into its header, payload and signature, then Base64URL-decodes the header and payload into readable JSON. It lets you inspect algorithm, token type, user claims, roles, expiry and any custom fields without the secret key. Decoding does not verify the signature — that requires the secret or public key.
Paste your JWT (the three-part dot-separated string starting with eyJ) into the input above and click Decode JWT. The header, payload and signature are decoded and displayed instantly with human-readable timestamps for exp, iat and nbf. All decoding happens locally — the token never leaves your browser.
This is a client-side JWT decoder no upload — your token is decoded entirely in your browser and never sent to any server. However, JWTs carry sensitive user data. As a best practice, avoid pasting production tokens that grant sensitive permissions. Use this tool for development and debugging tokens in non-production environments.
Yes. The Verify Signature panel supports HS256 (HMAC-SHA256) using a shared secret key, and RS256 (RSA-SHA256) using a public key in PEM format. The Web Crypto API performs the verification entirely in your browser. For HS256, paste your secret. For RS256, paste the public key only — the private key never needs to leave your server.
The exp (expiration) claim is a Unix timestamp (seconds since January 1, 1970 UTC). The JWT must not be accepted after this time. This decoder converts it to a human-readable date and shows whether the token is still valid, when it expires, or how long ago it expired — making it the ideal JWT decoder check expiration exp tool.
A JWT decoder reads the token and shows its contents — header, payload and claims — without checking authenticity. A JWT validator (or JWT debugger) additionally verifies the signature using the secret or public key and checks whether the token is expired, used before nbf, or intended for the wrong audience. This tool does both.