Back to tools

JWT

JWT Decoder and Generator

Decode JWT headers, payloads, and signatures locally in the browser, generate HS256, HS384, HS512, or debug-only none tokens, and learn JWT structure, signing, and common use cases.

Decode JWT

Header-
Payload-
Signature-

Header

Payload

ClaimValueNote

Generate JWT

Header

Payload

JWT Basics

Structure

JWT = Base64URL(Header) + "." + Base64URL(Payload) + "." + Base64URL(Signature)

The header describes type and algorithm, the payload stores claims, and the signature proves the first two parts were not tampered with.

Signature

HS256: HMAC-SHA256(base64url(header) + "." + base64url(payload), secret)

HS384 and HS512 use SHA-384 and SHA-512. RS256/ES256 need private-key signing and public-key verification; this tool focuses on local browser HMAC debugging.

Common claims

iss: issuer;sub: subject;aud: audience;exp: expires at;nbf: not before;iat: issued at;jti: token id。

exp, nbf, and iat are usually Unix timestamps in seconds.

Use cases

JWTs are commonly used for SPA login sessions, API Bearer tokens, short-lived service-to-service authorization, and identity claim transfer in SSO.

Security notes

JWT is encoded and signed, not encrypted. Anyone can decode the payload, so do not store passwords, secrets, national IDs, or other sensitive data. Production systems must validate alg, signature, exp, nbf, iss, aud, and use strong secrets.

Bearer usage

Authorization: Bearer <jwt>

Clients usually send the token in the Authorization header; servers trust identity data only after verifying the signature and claims.