What this JWT decoder does
JWT (JSON Web Token) is a token format used for API authentication and authorization. This decoder reads the header and payload in your browser so you can quickly inspect claims like exp, iss, aud, roles/scopes — without sending the token anywhere.
Where JWT is used
JWT is commonly used in APIs as a Bearer token (the Authorization header), and sometimes in cookie-based sessions. In real products it governs access to profiles, orders, payments, and admin operations — which directly impacts security and authorization.
What to check in a token
- Time:
exp/iat/nbf— token lifetime and correct timestamps. - Context:
iss/aud— ensure tokens from another environment/app are not accepted. - Privileges:
roles/scope/permissions— excessive privileges, and whether the server ever trusts decoded data without verification. - Data minimization: avoid PII/sensitive data in the payload (JWT is readable).
More: JWT structure, checklist, examples
JWT structure
Format: header.payload.signature. Header/payload are usually base64url-encoded (not encrypted); the signature is validated on the server.
- Header: token type and signature algorithm (
alg). - Payload: claims (e.g.,
sub,roles,scope,exp,iss,aud). - Signature: signature (this tool does not verify it).
Decode vs verify
Decode is “read the payload”. Verify is validate the signature and rules (alg, iss, aud, time). Vulnerabilities often happen when a system trusts decode output instead of verify results.
Payload checklist
exp/iat/nbf: lifetime and constraints.iss/aud: issuer and audience.- roles/scope: privileges.
- PII: avoid personal data in the payload.