Paste your JWT token into the input area on the left, or use one of the example tokens from the dropdown.
The token is automatically decoded — view the header, payload, and signature sections on the right.
Check the expiration status badge to see if the token is valid, expired, or not-yet-valid.
To verify an HMAC signature, enter your secret key in the signature panel and click Verify.
Review the security analysis panel for any warnings about the token's algorithm or claims.
Copy the decoded header or payload with ⌘⇧C, or share the token via a compressed URL.
Decode JWT tokens: instantly view header, payload, and signature in a clean three-panel layout.
Registered claims viewer: see human-readable explanations for iss, sub, aud, exp, nbf, iat, jti.
Expiration tracking: live countdown shows time until expiry, with color-coded status badges.
HMAC signature verification: verify HS256, HS384, HS512 signatures with your secret key.
Security analysis: detects alg:none vulnerability, expired tokens, missing claims, and weak algorithms.
OAuth 2.0 support: parses scope, roles, and other OAuth-specific claims.
OpenID Connect support: displays nonce, at_hash, auth_time, acr, amr claims.
Token structure visualizer: color-coded bar showing header/payload/signature proportions.
Clock tolerance: configurable tolerance in seconds for exp and nbf validation.
Auto-decode: automatically decodes JWT when pasting a valid token.
Shareable URLs: gzip-compresses your token into a URL for easy sharing.
Works entirely in your browser — no token data is ever sent to a server.