Input

Output

Formatted result will be displayed here

What does a JWT parser show you?

A JWT parser splits a compact token at the two dots, Base64URL-decodes the header and payload, and shows each as pretty-printed JSON alongside the raw signature bytes. The goal is structural: see what algorithm the header claims, which claims the payload actually carries, and how long the signature is. This tool never calls a network; parsing is local so you can paste production tokens without leaking them.

Use Cases

Explore an unfamiliar token

Paste a token from a new partner integration and immediately see which claims they populate and what algorithm they sign with.

Check token length budgets

Mobile clients sometimes cap header size; parsing tells you which claim is responsible for a bloated token.

Confirm claim naming

Some services use custom claim names. The parser exposes them so your verifier can match the exact keys.

Sanity-check library output

After your code signs a token, parse it to confirm the header and payload look exactly like the spec expects.

FAQ

Does it verify the signature?

No. Parsing is structural only. Use a dedicated verifier with the right public key when signature validation matters.

Can it handle encrypted JWTs?

Only unencrypted JWS tokens are parsed. JWE tokens with five dot-separated parts need decryption before anything meaningful is visible.

Is the signature decoded?

The signature is Base64URL-decoded to bytes and its length is shown; the raw bytes themselves are rarely useful without the key.

Why does my token fail to parse?

Either the three parts are not present or one is not valid Base64URL. Check that you copied the whole token including both dots.