How to use
Use this JWT formatter to quickly inspect what a token contains.
- Paste the JWT (optionally starting with
Bearer) into the input box. - Select an output mode (full/header/payload) and optionally enable key sorting.
- Click Decode & Format to pretty-print the result.
- Use Copy to copy the output or Minify Output to compress it.
FAQ
Does this JWT formatter verify the signature?
No. It decodes base64url and parses JSON; signature verification requires a key/secret and is out of scope here.
Is my token sent to a server?
No. The decoder runs locally in your browser and makes no network requests.
What JWT formats are supported?
Standard JWS-style JWTs with 2 or 3 parts (header.payload[.signature]). It does not decrypt JWE tokens.
Why do I get “non-base64url characters”?
The token contains characters outside base64url (A–Z, a–z, 0–9, _ and -). Remove quotes/whitespace and paste the raw token.
How are exp/iat/nbf shown?
If present and numeric, they’re converted from Unix seconds to ISO and local date strings in the output.
Can I extract only the payload?
Yes—switch the output mode to Payload only to print just the decoded payload JSON (plus small metadata).
Why does the output say the signature is not verified?
Decoding only shows what’s inside the token; it does not prove who created it or whether it was tampered with.