Decode and verify JWT tokens instantly. Empower your security workflows and uncover hidden risks with our trusted, developer-friendly JWT tool.
You’ve got this—verifying a JWT is easier than you think!
header.payload.signature
exp
, iat
, and nbf
JWT is a compact, URL-safe mechanism for securely transmitting information between parties. As defined in RFC 7519, it encodes structured claims in a way that ensures confidentiality and integrity.
A JWT consists of three base64url-encoded segments separated by dots:
For HMAC:
HMACSHA256(base64urlEncode(header) + "." + base64urlEncode(payload), secret)
If the computed signature doesn't match the token's, verification fails — indicating possible tampering.
alg
field in the JWT header to prevent downgrade attacks. Never allow none
unless explicitly and securely handled.Get started now—decode your first JWT and secure your tokens in seconds.
Token Part | Description | Example (Base64url Encoded) |
---|---|---|
Header | Specifies algorithm and token type | eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9 |
Payload | Contains user-defined claims such as sub , exp , iat , nbf , and aud | eyJzdWIiOiAiMTIzNDU2IiwgImV4cCI6IDE2ODk4ODAwMDAsICJpYXQiOiAxNjg5ODc2NDAwLCAibmJmIjogMTY4OTg3MzAwMCwgImF1ZCI6ICJhcGkuZXhhbXBsZS5jb20ifQ |
Signature | Cryptographic signature for validation, computed over the header and payload using the specified algorithm and key | dGVzdF9zaWduYXR1cmVfYmFzZTY0dXJs |