JWT Permission & Scope Inspector

Authorization issues often stem from missing scopes or incorrect roles in a token. Our decoder makes it easy to audit a user's permissions in a readable format.

When to use this solution:

Use this when a user has access to some parts of your app but is blocked from others unexpectedly.

Common Use Cases

Auditing user rolesChecking OAuth2 scopesVerifying group membershipsDebugging RBAC (Role-Based Access Control)

1Step-by-Step Guide

Paste the user's token

Paste the JWT you want to audit into the input area.

Locate permission claims

Scan the payload for fields like 'roles', 'scopes', 'permissions', or 'groups'.

Verify value list

Ensure the required permission (e.g., 'admin', 'read:users') is present in the array.

Check for typos

Verify that the claim values aren't misspelled, as permissions are often case-sensitive.

Ready to get started?

Use our free tool to solve this problem in seconds. No installation required.

Inspect Permissions

Frequently Asked Questions

Can I add new roles to my token here?

No, JWTs are cryptographically signed. Any change to the payload would require re-signing with the server's secret key.

Where are roles usually stored?

While there's no official standard, common fields are 'role', 'roles', or 'permissions' depending on your auth provider.