Published February 18, 2025 · 6 min read

JWT Decoder: How to Read JWT Tokens

If you work with APIs, authentication systems, or modern web applications, you've encountered JWT tokens. They appear as long, cryptic strings passed in HTTP headers, cookies, or URL parameters. But they're not encrypted — they're encoded. With the right tool, you can read exactly what's inside them. Here's everything you need to know about JWT tokens and how to decode them.

What Is a JWT Token?

JWT (JSON Web Token, pronounced "jot") is an open standard (RFC 7519) for securely transmitting information between parties as a JSON object. JWTs are commonly used for:

JWT Structure: The Three Parts

Every JWT consists of three parts separated by dots:

eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiIxMjM0NTY3ODkwIn0.dozjgNryP4J3jVmNHl0w5N_XgL0n3I9PlFUP0THsR8U

These three sections are:

  1. Header — Contains the token type (JWT) and the signing algorithm (e.g., HS256, RS256).
  2. Payload — Contains the claims — the actual data like user ID, email, roles, and expiration time.
  3. Signature — A cryptographic signature that verifies the token hasn't been modified. Created using the header, payload, and a secret key.

The header and payload are simply Base64URL-encoded JSON. They're not encrypted — anyone can decode them. The signature is what provides security by ensuring the data hasn't been tampered with.

How to Decode a JWT Token

  1. Open the JWT Decoder tool.
  2. Paste your JWT token into the input field.
  3. Instantly see the decoded header, payload, and signature information.

The decoder runs entirely in your browser. Your JWT tokens are never sent to any server — this is critical because tokens often contain sensitive authentication data.

Decode a JWT token now — private, instant, no account needed.

Decode JWT Token →

Common JWT Claims

The payload section contains "claims" — key-value pairs of information. Some standard claims include:

Applications also add custom claims like email, name, roles, or permissions.

Why JWT Privacy Matters

Many popular JWT decoder websites send your token to their server for processing. This is a serious security risk. A JWT token often contains:

Sending a valid JWT to a third-party server is essentially sharing your authentication credentials. Our browser-based JWT decoder eliminates this risk entirely — the decoding happens in JavaScript on your device.

JWT Debugging Tips

JWT Security Best Practices

Related Developer Tools

All tools on This 2 That run locally in your browser. Your data never leaves your device.