JWT & JWE Debugger – Decode, Verify, Validate Claims
Paste a token to instantly decode header and payload, verify signatures against secrets, PEM/JWK, or JWKS URL, validate claims, and re‑encode tokens for testing. Supports HS256, RS256, ES256, PS256, and EdDSA.
Introduction
The JWT & JWE Debugger helps developers and security engineers safely inspect and validate tokens. Paste a JWT to see the header, payload, and signature, verify it using a secret, public/private key, or a JWKS URL, and validate time-based claims like exp
, nbf
, and iat
.
Key Capabilities
- Decode header and payload with Base64URL
- Verify signature against symmetric or asymmetric keys (HS256, RS256, ES256, PS256, EdDSA)
- Validate
exp
,nbf
,iat
,aud
, andiss
- Highlight insecure algorithms (e.g.,
none
) - Edit fields and re‑encode tokens (including unsigned test tokens)
- Detect nested tokens inside claims
- JWKS URL integration for key discovery
How to Use
- Paste your JWT or JWE token into the input.
- Optionally specify expected
aud
andiss
to validate claims. - Select algorithm and choose key source: secret, PEM (SPKI/PKCS#8), JWK JSON, or JWKS URL.
- Click Verify to validate the signature.
- Switch to Edit & Re‑encode to modify fields and generate a new token for testing.
Security note: Never accept or deploy tokens using the
none
algorithm in production. Use strong keys and rotate regularly.
FAQs
Is my token sent to a server?
No. Decoding and verification are performed in your browser.
Can I debug JWE?
JWE headers are shown. Decryption requires the correct key/algorithm and may vary by provider support.
What algorithms are supported?
HS256, RS256, ES256, PS256, and EdDSA for verification; editing supports generating unsigned tokens or signing when a key is provided.