ADVERT
π JWT Inspector & Claims Diff
Decode two JWTs side by side, inspect their payloads, and highlight which claims are added, removed, or changed.
JWT Inspector & Claims Diff
Paste two JWTs to decode their headers and payloads side by side, and highlight which claims were added, removed, or changed between them.
JWT tokens
JWT A
JWT B
This tool only decodes the header and payload. It does not verify signatures or require any secret keys.
jwt compare tooljwt payload inspector
Decoded headers
Decoded payloads
Claims diff
Paste two JWTs above to see which claims match and which differ.
How to use this tool
- Paste your original JWT into the left box and the new JWT into the right box.
- Inspect headers and payloads in a readable JSON layout on both sides.
- Scan the claims diff panel to see which fields were added, removed, or changed.
JWT payload inspector for debugging
- Visually compare JWT payloads when debugging auth issues or rollout changes.
- Confirm which user claims have changed after authentication or refresh.
- Keep secrets safe by avoiding any need to enter signing keys.
What this JWT compare tool does and doesnβt do
- Decodes base64url-encoded JWT headers and payloads and displays them as JSON.
- Highlights claim keys that are added, removed, or changed between two tokens.
- Does not verify signatures or guarantee token validityβuse server-side libraries for security decisions.
FAQ
- Is it safe to paste production JWTs?
- JWTs can contain sensitive information. Only paste tokens you are comfortable handling in your browser, and never share them in screenshots or logs.
- Can I use this to verify signatures?
- No. This tool is for decoding and diffing payloads only. Signature verification requires server-side libraries and access to the appropriate keys.
- Does this support encrypted JWTs (JWE)?
- It expects standard signed JWTs (JWS). Encrypted JWEs cannot be decoded without the decryption key and are not supported here.
ADVERT
ADVERT