Feedback

JWT Decoding and Verification


          

          

          
Options
Note: RS/ES verification expects the public key to be PEM or JWK. Signature validity cannot be guaranteed without the appropriate key.

📖 Description

1. Why Do You Need a JWT Debugging Tool?

When developing OAuth2, Single Sign-On (SSO), or RESTful APIs, JWT serves as the link between client and server:


2. Core Feature Analysis

This site's tool provides a comprehensive breakdown of JWT's three components (Header, Payload, Signature):

A. Structured Decoding (Visual Decoding)
B. Real-time Signature Verification
C. Auto-correction & Time Conversion
D. Privacy Protection (Local Computation)

3. Common JWT Claim Field Reference

Field Full Name Purpose
iss Issuer Token issuer. Usually the URL of the auth server.
sub Subject Subject of the token. Usually a user ID or account.
exp Expiration Time Expiration time. The point when the token becomes invalid.
iat Issued At Issued at time. When the token was created.
aud Audience Audience. The intended recipient service for this token.

4. Brief Operation Flow

  1. Paste Token: Paste the complete JWT string (usually containing two dots .) into the left input box.
  2. View Decoding: The decoded raw content of the Header and Payload is immediately displayed on the right.
  3. Verify Signature (Optional): * Enter your secret key or paste the public key in the "Verify Signature" area below.
    • The system will provide real-time feedback on the signature verification result.
  4. Check Time: Review the "Validity Report" to confirm if the Token is in a usable state.

5. Why Choose This Site's JWT Assistant?

📖 Recommendation