What this JWT decoder does

JWT (JSON Web Token) is a token format used for API authentication and authorization. This decoder reads the header and payload in your browser so you can quickly inspect claims like exp, iss, aud, roles/scopes — without sending the token anywhere.

Where JWT is used

JWT is commonly used in APIs as a Bearer token (the Authorization header), and sometimes in cookie-based sessions. In real products it governs access to profiles, orders, payments, and admin operations — which directly impacts security and authorization.

What to check in a token

  • Time: exp/iat/nbf — token lifetime and correct timestamps.
  • Context: iss/aud — ensure tokens from another environment/app are not accepted.
  • Privileges: roles/scope/permissions — excessive privileges, and whether the server ever trusts decoded data without verification.
  • Data minimization: avoid PII/sensitive data in the payload (JWT is readable).
More: JWT structure, checklist, examples

JWT structure

Format: header.payload.signature. Header/payload are usually base64url-encoded (not encrypted); the signature is validated on the server.

  • Header: token type and signature algorithm (alg).
  • Payload: claims (e.g., sub, roles, scope, exp, iss, aud).
  • Signature: signature (this tool does not verify it).

Decode vs verify

Decode is “read the payload”. Verify is validate the signature and rules (alg, iss, aud, time). Vulnerabilities often happen when a system trusts decode output instead of verify results.

Payload checklist

  • exp/iat/nbf: lifetime and constraints.
  • iss/aud: issuer and audience.
  • roles/scope: privileges.
  • PII: avoid personal data in the payload.

Useful links