Back to Tools Tools
JWT Debugger
Decode, debug, and verify JSON Web Tokens
About JWT
JSON Web Tokens (JWT) are compact, URL-safe means of representing claims to be transferred between two parties. They consist of three parts separated by dots: header, payload, and signature.
Common Algorithms:
- HS256: HMAC SHA-256 (symmetric)
- HS384: HMAC SHA-384 (symmetric)
- HS512: HMAC SHA-512 (symmetric)
- RS256: RSA SHA-256 (asymmetric)
- ES256: ECDSA SHA-256 (asymmetric)
Standard Claims:
- iss (issuer): Issuer of the JWT
- sub (subject): Subject of the JWT
- aud (audience): Recipient for which JWT is intended
- exp (expiration): Expiration time
- nbf (not before): Time before which JWT must not be accepted
- iat (issued at): Time at which JWT was issued
- jti (JWT ID): Unique identifier for the JWT