How to Use the JWT Header & Payload Viewer Effectively
Using the JWT Header & Payload Viewer is simple — but understanding how to interpret what you see is where the tool shines. Below is a quick walkthrough for developers and security testers.
1. Paste or Drop Your Token
Open the viewer and paste your JWT (e.g. eyJhbGciOi...) into the input box. The token will automatically decode into two JSON panels — one for the header and one for the payload.
2. Examine the Header
The header reveals the algorithm and type. Check that the algorithm matches your system’s expectations — e.g., RS256 for asymmetric signing or HS256 for HMAC-based signing.
3. Review the Payload
The payload lists claims such as sub (subject), exp (expiration), and custom data. Expiration times are auto-converted into UTC for readability.
4. Copy What You Need
Use the copy buttons to export header or payload JSON to your clipboard. This is especially useful for debugging, documenting API responses, or validating tokens in Postman.
5. Keep It Private
Remember — no data is ever sent out. All decoding happens locally. You can safely use this tool in corporate environments or offline workflows.
Example Session
Header:
{ "alg": "RS256", "typ": "JWT" }
Payload:
{ "sub": "42", "role": "developer", "exp": 1738867200 } Fast, private, transparent — that’s what modern JWT debugging should be.