How it works
- Paste a JWT token.
- Decode the header and payload.
- Review claims such as exp, iat, iss, aud and scopes.
Paste a JWT and inspect the readable header and payload claims without sending the token to an Orbitautil server.
Result
The processed output appears here after you run the tool.
JWT header and payload are Base64URL-encoded and readable. Signature verification requires the correct key and is outside this browser utility.
Tokens can act like credentials. Prefer test tokens and avoid sharing decoded values in screenshots or tickets.
Look at exp for expiration, iss for issuer, aud for audience and scope or roles for authorization context.
No. It only decodes the visible header and payload.
No. Decoding runs in your browser.
Prefer test tokens. Real tokens should be treated as credentials.
Format, validate, pretty print, sort and minify JSON locally in your browser with clear parse errors.
EnglishGenerate TypeScript interfaces from a JSON example directly in your browser.
EnglishPrepare text samples and test regular expression patterns carefully before using them in code.