JWT Encoder & Decoder
Encode and decode JSON Web Tokens (JWT). Create JWTs with custom headers and payloads, or decode existing tokens to inspect their contents. Free, instant, and nothing is sent to a server.
Encoded JWT
HEADER: ALGORITHM & TOKEN TYPE
PAYLOAD: DATA
VERIFY SIGNATURE
JWT Encoder & Decoder Online
This tool allows you to encode (create) and decode (inspect) JSON Web Tokens. Use the toggle at the top to switch between modes. Everything runs locally in your browser — your tokens and data are never sent to any server.
What Is a JWT?
A JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure.
JWT Structure
A JWT consists of three parts separated by dots (.):
- Header (Red) — Contains the token type (JWT) and signing algorithm (HS256, RS256, etc.)
- Payload (Purple) — Contains the claims (statements about the user and additional data)
- Signature (Blue) — Used to verify the token hasn't been altered
Common Uses
- Authentication — After user login, the server generates a JWT that the client uses for subsequent requests
- Information Exchange — Securely transmit information between parties using the signature
- API Security — Stateless authentication for REST APIs and microservices
- Single Sign-On (SSO) — Share authentication state across multiple domains
How to Use
Decoding a JWT
- Paste your JWT token into the Encoded JWT field (left panel)
- The header and payload automatically appear in the right panels
- Check the expiry status and other claims in the payload
Encoding a JWT
- Click the Encode toggle
- Edit the header JSON (algorithm and token type)
- Edit the payload JSON with your claims
- Enter a secret key if using HMAC algorithms
- Copy the generated JWT from the left panel
Security Best Practices
- Never commit JWT secrets to version control
- Use HTTPS when transmitting JWTs
- Set appropriate expiration times (
expclaim) - Use strong signing algorithms (avoid "none")
- Validate all claims (issuer, audience, etc.) on the server