Validate & Decode OAuth Tokens Instantly (JWT, OIDC, Opaque)
Validate and inspect OAuth tokens in your browser. Decode JWT access tokens and ID tokens to view claims, scopes, and expiry. Analyse opaque tokens for entropy and format. Free and private.
How to Use OAuth Token Validator
How to Use the OAuth Token Validator:
Paste Your Token: Copy the OAuth token from your application — this can be a JWT access token, an OIDC ID token, or an opaque bearer token — and paste it into the input field.
Click "Validate Token": The tool detects the token type automatically. JWT tokens (which start with "eyJ" and have three dot-separated parts) are decoded and inspected. All other tokens are treated as opaque.
JWT Tokens — Inspect Claims: For JWT tokens, the tool displays:
- Algorithm from the header (e.g. HS256, RS256, ES256)
- Expiry status — whether the token is currently active or expired
- Scopes — the OAuth scopes granted to the token, shown as coloured badges
- OAuth Claims table — subject (sub), issuer (iss), audience (aud), client ID (client_id or azp), and JWT ID (jti)
- Timing panel — issued-at, not-before, and expires-at in local time
- Full Payload and Header — collapsible JSON panels with copy support
Opaque Tokens — Analyse Format: For non-JWT tokens, the tool shows:
- Token length in characters
- Shannon entropy — a measure of randomness (higher is better; < 3.0 bits/char suggests a sequential or weak token)
- Character set — whether the token uses alphanumeric, base64url, or mixed characters
- A note that opaque tokens must be validated via your authorisation server's introspection endpoint (RFC 7662)
Review Warnings: The tool surfaces issues such as expired tokens, missing scope or issuer claims, and the dangerous "alg: none" case.
Notes:
- Signature verification is not performed — the tool only decodes and analyses the token structure.
- Your token is never sent to any server. All processing happens in your browser.
Frequently Asked Questions
Most Viewed Tools
TOTP Code Generator
Generate time-based one-time passwords from a TOTP secret key. Enter your base32 secret, choose a period and digit length, and get the current and next codes with a live countdown timer. Useful for testing and debugging 2FA integrations.
Use Tool →JSON to Zod Schema Generator
Generate Zod validation schema code from a JSON sample object. Infers z.string(), z.number(), z.boolean(), z.array(), z.object(), and z.null() types automatically. Handles nested objects, arrays of objects with optional field detection, and outputs copy-ready TypeScript with import and z.infer type alias.
Use Tool →JSONL / NDJSON Formatter
Format, validate, and inspect JSON Lines (JSONL) and NDJSON files. Validates each line individually, reports parse errors by line number, outputs compact JSONL or a pretty-print preview, and lets you download the cleaned file.
Use Tool →Secret and Credential Scanner
Scan pasted text, code, or config files for accidentally exposed API keys, tokens, passwords, and private keys. Detects 50+ secret types across AWS, GitHub, Stripe, OpenAI, and more — all client-side, nothing leaves your browser.
Use Tool →TLS Cipher Suite Checker
Check TLS protocol version compatibility and cipher suite strength ratings against current best practices. Supports IANA and OpenSSL cipher names — rates each suite as Strong, Weak, or Deprecated and explains why.
Use Tool →Password Entropy Calculator
Calculate the information-theoretic bit entropy of any password or API key. Detects character set pools automatically, shows the total number of possible combinations, and estimates crack time across five attack scenarios from rate-limited web logins to GPU cracking clusters.
Use Tool →TOML Config Validator
Validate TOML configuration file syntax and report errors with line numbers. Paste any TOML content — Cargo.toml, pyproject.toml, config.toml — and instantly see a green checkmark with key counts and structure stats, or a precise error message pointing to the exact line. Includes a collapsible JSON structure preview to confirm what was parsed.
Use Tool →Content Security Policy Generator
Build Content Security Policy headers interactively. Toggle directives like script-src, style-src, and img-src, select allowed source tokens, and add custom origins. Instantly outputs your CSP as an HTTP header, meta tag, Nginx directive, or Apache header.
Use Tool →Related API & Backend Tools
OpenAPI Spec Validator
Validate OpenAPI 2.0 (Swagger) and OpenAPI 3.0/3.1 specification files for compliance, missing required fields, unresolved $ref paths, and schema errors. Paste JSON or YAML or upload a file — errors and warnings are listed by path with severity levels and actionable fix suggestions. All validation runs entirely in your browser.
Use Tool →GraphQL Variables Formatter
Format and validate GraphQL query variables JSON for use in queries and API clients. Paste your variables JSON alongside a GraphQL query to instantly format the JSON, validate that each variable matches its declared type, catch missing required variables, and highlight undeclared extras.
Use Tool →HTTP Request Headers Generator
Generate common HTTP request headers for authentication, content-type, caching, and security. Toggle each category, configure values, and copy the output as raw key-value pairs, JSON, fetch(), cURL, or axios.
Use Tool →Rate Limit Header Parser
Parse and visualize X-RateLimit headers from raw HTTP API responses. Paste response headers to instantly see your quota state — limit, remaining, used, and reset time — displayed as color-coded progress meters. Supports GitHub, OpenAI, Twitter/X, Shopify, and IETF standard rate limit headers.
Use Tool →Postman to OpenAPI Converter
Convert Postman Collection v2.1 JSON to OpenAPI 3.0 specification format. Upload or paste your collection, and get a downloadable openapi.yaml or openapi.json with mapped paths, parameters, request bodies, and example responses.
Use Tool →API Tester
Test HTTP API endpoints directly in your browser. Make GET, POST, PUT, PATCH, and DELETE requests with custom headers and request bodies. View status codes, response headers, and pretty-printed JSON responses — all client-side, no server proxy.
Use Tool →CORS Header Generator
Build CORS configuration headers interactively for web servers and APIs. Set allowed origins, methods, request headers, credentials, and preflight cache duration — then copy the generated Access-Control headers or ready-to-paste code snippets for nginx, Express.js, Flask, and .NET.
Use Tool →REST Endpoint Documenter
Document a REST endpoint quickly by entering the URL, method, headers, and sample request/response. Generates formatted Markdown documentation and an example cURL command instantly.
Use Tool →Share Your Feedback
Help us improve this tool by sharing your experience