Features
Token decoder
Decode and analyze JWT tokens to view their structure:- Header inspection: View algorithm, token type, and other header claims
- Payload analysis: Examine all payload claims with descriptions
- Signature verification: Check token signature structure
- Expiration checking: Automatic validation of
exp,nbf, andiattimestamps - Claims documentation: Built-in descriptions for registered and public claims
The decoder automatically validates token expiration and displays whether the token is currently valid based on the
exp (expiration) and nbf (not before) claims.Token encoder
Create new JWT tokens with custom contents:- Custom headers: Define algorithm, token type, and additional header parameters
- Custom payloads: Add any claims including registered, public, and private claims
- Secret signing: Include a secret for signature generation
- Visual preview: See color-coded token parts (header, payload, signature)
Claims reference
The utility includes comprehensive documentation for: Registered Claims (RFC 7519):iss: Issuer of the tokensub: Subject (user) of the tokenaud: Intended audienceexp: Expiration time (Unix timestamp)nbf: Not before time (Unix timestamp)iat: Issued at time (Unix timestamp)jti: Unique token identifier
name,given_name,family_name: User name informationemail,email_verified: Email address and verification statusphone_number,phone_number_verified: Phone and verificationroles,permissions,groups: Authorization data- Many more standard claims
Use cases
Debugging authentication issues
When troubleshooting JWT-based authentication:- Paste the token from your application
- Check the expiration status
- Verify the issuer and audience claims
- Inspect user information in the payload
- Validate the signing algorithm
Understanding token structure
Learn how JWT tokens are structured:- Header (red):
{"alg":"HS256","typ":"JWT"} - Payload (purple):
{"sub":"1234567890","name":"John Doe","iat":1516239022} - Signature (cyan): HMAC SHA-256 signature
Testing API integrations
Create test tokens for API development:- Switch to the Encoder tab
- Customize the header with your algorithm
- Add payload claims matching your API requirements
- Generate the token with a test secret
- Copy and use in API requests
The encoder creates demo tokens for testing purposes. Production tokens should be generated server-side with proper cryptographic security.
Verifying token claims
Check if a token contains the expected claims:- Verify user roles and permissions
- Check token expiration time
- Validate issuer and audience
- Inspect custom application claims
- Review timestamp claims in human-readable format
Token validation
Automatic validation
The decoder automatically validates:- Token format: Checks for three dot-separated parts
- Base64url encoding: Validates proper encoding
- JSON structure: Ensures valid JSON in header and payload
- Expiration: Compares
expclaim with current time - Not before: Compares
nbfclaim with current time
Expiration status
Tokens are marked as invalid if:- The
exp(expiration) timestamp has passed - The
nbf(not before) timestamp hasn’t been reached yet - The token format is malformed
Timestamp claims (
exp, iat, nbf, auth_time, updated_at) display both the Unix timestamp and a human-readable date when you hover over them.Viewing modes
JSON view
See the raw JSON structure of the header and payload with:- Syntax highlighting for keys and values
- Formatted, readable output
- Copy button to extract JSON
- Interactive tooltips on claim names
Claims table view
View claims in a structured table format:- Claim column: The claim name with color coding
- Value column: The claim value with copy functionality
- Description column: Built-in documentation for known claims
- Learn more links: Direct links to RFC specifications
Signature verification
The utility displays signature information:- Signature algorithm from the header
- Base64url-encoded signature value
- Status indicator (note: actual cryptographic verification requires server-side implementation)