Paste a JWT token to decode
Paste a JWT token to decode
Decode JWT tokens online with our free JWT decoder. Inspect header algorithms, payload claims, and expiration timestamps in a readable format. The tool runs entirely in your browser, keeping your tokens private, and supports JWTs from Auth0, Firebase, AWS Cognito, and all standard OAuth2 providers.
Try Convert All - paste JSON once, see TypeScript, Go, YAML, and 15 more formats instantly.
Enter a complete JWT (three Base64-encoded segments separated by dots) in the input field. The decoder accepts tokens from any OAuth2, OpenID Connect, or custom JWT implementation.
The tool displays the JWT header (algorithm, type, key ID) and payload claims with human-readable timestamps for iat, exp, and nbf fields.
Review expiration status, issuer, audience, and custom claims. The decoder flags expired tokens with a clear warning.
Yes. The decoder runs entirely in your browser with no server-side processing. Your token is never transmitted over the network or stored anywhere. The tool is safe for inspecting production tokens.
No. This tool decodes and displays the JWT contents but does not verify the signature. Signature verification requires the signing key, which should never be shared with a client-side tool. Use this tool for inspection only.
The decoder shows all standard claims (iss, sub, aud, exp, nbf, iat, jti) and any custom claims in the payload. Timestamps are displayed in both Unix epoch and human-readable local time formats.
Yes. A JWT is a standard format regardless of the issuing provider. Tokens from Auth0, Firebase, AWS Cognito, Okta, Keycloak, and any other OpenID Connect provider are decoded identically.
If the input is not a valid JWT (missing segments, malformed Base64, or invalid JSON payload), the decoder shows a clear error indicating which part could not be parsed. This helps you diagnose token generation issues.