JWT Decoder — Inspect Header, Payload & Expiry | Tinker
← Tinker
Paste a JWT token above to decode it
⚠️ Decoding only — no signature verification. Never share tokens containing sensitive data.

Understanding JWT Structure

A JSON Web Token (JWT) is a compact, URL-safe string made up of three Base64url-encoded parts separated by dots: header.payload.signature. The header and payload are readable by anyone — the signature is what makes them tamper-evident.

PartContentExample values
Header (orange)Algorithm & token typealg: HS256, typ: JWT
Payload (purple)Claims — user data & metadatasub, iat, exp, roles
Signature (green)HMAC or RSA of header + payloadOpaque bytes, base64url-encoded

Standard claim reference

ClaimFull nameTypeMeaning
issIssuerstringWho issued the token (e.g. your auth server URL)
subSubjectstringWho the token represents (usually a user ID)
audAudiencestring/arrayWho the token is intended for
expExpirationUnix timestampToken must be rejected after this time
nbfNot BeforeUnix timestampToken must be rejected before this time
iatIssued AtUnix timestampWhen the token was created
jtiJWT IDstringUnique identifier — used to prevent replay attacks

Security notes

© 2026, Tinker - tools · calculators · practice games