Read the `exp` and `iat` claims
A decoded payload lets you confirm whether a token is already expired or issued in the expected time window.
header.payload.signature Understand the structure of a JWT, decode header and payload locally, and avoid common mistakes when inspecting tokens.
A JWT can look opaque at first glance, but its first two sections are only Base64URL-encoded JSON. Decoding them is usually enough to inspect claims, expiration times, audiences, and token metadata.
The important caveat is that decoding does not verify trust. You can read a token without validating its signature.
A JWT, or JSON Web Token, is a compact token format built from three dot-separated parts: header, payload, and signature.
The header describes the token type and algorithm, the payload contains claims, and the signature protects integrity.
A decoded payload lets you confirm whether a token is already expired or issued in the expected time window.
header.payload.signature Mismatch in `aud` or `iss` is a common cause of authentication failures between environments.
No. Decoding only reveals the header and payload. Signature verification requires the right secret or public key.
Yes. Reading header and payload does not require the signing key. Only verification does.