Is decoding a JWT the same as verifying it?
No. Decoding simply reads the Base64URL data, while verification checks the signature.
Decode header and payload, check exp, and verify signatures with an optional secret key. Everything runs locally in your browser.
Algorithm
-
Expiration
-
Signature
-
Paste a JWT to decode header/payload and optionally verify the signature.
Input
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiJ1c2VyXzEyMyIsImV4cCI6MTcxMDAwMDAwMH0.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk
Output
Header: {"alg":"HS256","typ":"JWT"}
Payload: {"sub":"user_123","exp":1710000000}The exp claim is a Unix timestamp in seconds.
No. Decoding simply reads the Base64URL data, while verification checks the signature.
Currently HS256/384/512 (HMAC). RSA and ECDSA tokens are not supported yet.
No. Decoding and verification run locally in your browser.