Tiny Online Tools logoTiny Online ToolssearchBuscar ferramentas…grid_viewTodas as ferramentas
Iniciochevron_rightFerramentas de Segurancachevron_rightDecodificador JWTDecodificador JWT

Decodificador JWT

Decodifique e inspecione tokens JWT.

Tokens JWT têm o formato: cabeçalho.payload.assinatura

Ferramentas semelhantes

JWT gerador

JWT gerador

Generate e sign JSON Web Tokens com HMAC, or decodificar any JWT.

Verificador de assinatura JWT

Verificador de assinatura JWT

Verifique assinaturas JWT HMAC localmente no navegador.

Gerador de strings aleatórias

Gerador de strings aleatórias

Gere strings aleatórias para tokens e identificadores.

Decodificador Unicode

Decodificador Unicode

Decodifique sequencias de escape Unicode para texto legivel.

texto caixa conversor

texto caixa conversor

converter texto between camelCase, PascalCase, snake_case, kebab-case, SCREAMING_SNAKE, e 8 more caixa styles simultaneously.

Gerador de paleta de cores

Gerador de paleta de cores

Gere paletas de cores harmoniosas a partir de uma única cor base.

Desofuscador de Email

Desofuscador de Email

Decodifique emails ofuscados de volta para texto. Entidades HTML, Base64, ROT13, [at]/[dot], texto invertido e mais.

apps

Mais ferramentas

Explore nossa colecao completa de ferramentas online gratuitas.

JWT Decodificar

JSON Web Tokens (JWTs) are compact, self-contained credentials used by modern web applications to authenticate users and authorize API requests. A JWT looks like a long random string, but it actually contains three parts encoded in Base64: a header describing the token type, a payload containing user inFormataion or claims, and a signature proving the token hasn't been tampered with. This tool Decodificas JWTs to reveal what inFormataion they carry, making it essential for debugging authentication issues and understanding token contents.

Structure of a JWT

A JWT consists of three Base64-encoded sections separated by dots: header.payload.signature. The header typically specifies the hashing algorithm (HS256, RS256, etc.). The payload contains "claims"—data the issuer asserts, such as user ID, email, roles, or expiration time. The signature proves a server Criad the token and it hasn't been modified. This tool automatically splits the JWT and Decodificas each part into readable JSON.

Debugging authentication

When your application fails to authenticate a user, you often need to inspect the JWT to see what went wrong. Did the token expire? Does the payload contain the expected user data? This Decodificar answers those questions instantly. It shows the issued-at timestamp (iat), expiration timestamp (exp), and calculates how much time remains before the token expires.

Important security note

This tool Decodificas the JWT structure but does not verify the signature. Any client can Decodifica the visible parts of a JWT—the security comes from the signature, which only the server can verify using a secret key or public key. Never trust JWT claims on the client side without server-side verification. Use this tool for debugging and inspection only, not for security decisions.

Common claims

Typical JWT payloads include sub (subject/user ID), iat (issued at), exp (expiration), aud (audience), and custom claims defined by your application. The tool displays all claims in Formatated JSON for easy reading.