Authentication debugging
Decode payloads to review claims such as exp, aud, or scopes during sign-in troubleshooting.
Decode JWT headers or payloads without verifying the signature.
Inspect JSON Web Tokens by decoding the header or payload in isolation. JWT Inspector never touches the signature, making it safe to debug tokens copied from production.
Decode payloads to review claims such as exp, aud, or scopes during sign-in troubleshooting.
Inspect header fields like alg or kid to confirm the algorithm and key identifiers being used.
Verify that tokens issued by different services contain the expected claims and structures.
Provide the complete header.payload.signature string. Only the selected segment is decoded.
Switch segments instantly to compare metadata and claim contents without re-running the tool.
Copy decoded JSON when filing issues or sharing context—never expose the signature itself.
No. JWT Inspector only decodes Base64URL strings. Always verify signatures within your application when security matters.
Ensure the token contains three dot-separated segments. Signed tokens missing the signature or copied with whitespace will fail to decode.