Skip to content
master
Go to file
Code

README.md

jwt-decode is a small browser library that helps decoding JWTs token which are Base64Url encoded.

IMPORTANT: This library doesn't validate the token, any well formed JWT can be decoded. You should validate the token in your server-side logic by using something like express-jwt, koa-jwt, Owin Bearer JWT, etc.

Installation

Install with npm, bower, or downloading from the build directory of this repository.

Use with AMD, browserify or just include with an script tag.

Usage

var token = 'eyJ0eXAiO.../// jwt token';

var decoded = jwt_decode(token);
console.log(decoded);

/* prints:
 * { foo: "bar",
 *   exp: 1393286893,
 *   iat: 1393268893  }
 */

 // decode header by passing in options (useful for when you need `kid` to verify a JWT):
 var decodedHeader = jwt_decode(token, { header: true });
 console.log(decodedHeader)

 /* prints:
  * { typ: "JWT",
  *   alg: "HS256" }
  */

Note: A falsy or malformed token will throw an InvalidTokenError error.

Can also be used with browserify or webpack by doing npm install jwt-decode and requiring:

var jwtDecode = require('jwt-decode');

Polymer Web Component

Can also be installed and used with Polymer-based wrapper.

Include with a script tag

Copy the file jwt-decode.min.js from the build/ folder to your project somewhere, then include like so:

<script src="jwt-decode.min.js"></script>

Develop

Run grunt dev and fire a browser at http://localhost:9999/test_harness.html.

Issue Reporting

If you have found a bug or if you have a feature request, please report them at this repository issues section. Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.

Author

Auth0

License

This project is licensed under the MIT license. See the LICENSE file for more info.

You can’t perform that action at this time.