Free Online JWT Decoder & Inspector
Decode • Inspect Claims • Check exp/iat/nbf • Optional HS256/384/512 Verify
About this tool
This free online JWT decoder lets you inspect token header and payload claims instantly, including exp/iat/nbf checks and common structure validation. All decoding runs locally in your browser - no uploads and no server-side processing. Use it to debug authentication flows, verify what your app is actually receiving, and quickly export decoded sections for incident response or logging.
Common use cases
- Inspect header and payload claims during OAuth/OpenID debugging
- Check token expiration (exp), issued-at (iat), and not-before (nbf)
- Confirm issuer (iss), audience (aud), subject (sub), and scopes/roles
- Copy or download decoded sections for troubleshooting and reporting
- Optionally verify HS256/384/512 signatures when you have the shared secret
How it works
JWTs are three base64url-encoded parts: header, payload, and signature. This tool decodes the header and payload by base64url decoding and JSON parsing, then evaluates time-based claims (exp/iat/nbf) against your local clock. Signature verification is optional: when you provide a shared secret for HS* algorithms, the tool computes the expected HMAC and compares it to the token signature - all locally in the browser.
FAQ
Does this JWT decoder upload my token
No. Decoding and optional verification run locally in your browser.
Does decoding a JWT mean the signature is valid
No. Decoding only reveals the contents. Signature validity requires verification (HS* verify is available when you provide the secret).
Why do exp/iat/nbf checks show as invalid
Most issues come from clock skew, tokens being used too early (nbf), or expired tokens (exp). Confirm your system time and token issuance settings.
Related tools
- Base64 Encoder/Decoder — decode individual JWT segments (header, payload, signature) manually
- JSON Formatter — format the decoded JSON payload for easier reading
- Hash Generator — understand the HMAC-SHA256 signing algorithm behind JWT verification
- Secure Paste — share JWT debugging snippets without exposing live tokens