| Field | Value | Copy |
|---|---|---|
| {{ k }} | {{ v }} | |
| No details available. | ||
| # | DNS / IP | Copy |
|---|---|---|
| {{ i + 1 }} | {{ n }} | |
| No SAN entries | ||
Digital certificates are signed identity records that present a name and a public key from an issuer you can recognize. They help you verify who a service claims to be and show when that proof starts and ends. A compact digital certificate decoder lets you read the essentials clearly so you can decide what to trust.
Enter a certificate and get the subject, issuer, validity window, fingerprints, and alternate names in one view. You can paste text or drop a file and then review the fields and copy results for notes or tickets. For quick checks, compare the name you expect with the names listed under alternate names and confirm the dates make sense.
Use it when you have a certificate and need to inspect what it says, not when you are requesting a new one. For example, you might confirm that a server name appears in the alternate names and that the end date is after a planned go live.
Be cautious because readable details do not prove a trusted chain or revocation status, and local time displays may differ from server time. Your input stays on your device.
X.509 certificates express an entity’s identity and key material over a fixed validity period. The key fields include the subject’s Common Name (CN), optional Organization (O) and Organizational Unit (OU), the issuing Certification Authority (CA), a serial number, and not‑before and not‑after timestamps. Subject Alternative Name (SAN) lists additional DNS names, IP addresses, Uniform Resource Identifiers (URI), or email addresses.
The decoder computes fingerprints and a pin that summarize the certificate for comparison. A SHA‑256 fingerprint and a SHA‑1 fingerprint are derived from the certificate’s Distinguished Encoding Rules (DER) bytes, while the Subject Public Key Info (SPKI) pin uses a SHA‑256 digest of the SPKI structure and is rendered in base64. Signature algorithms are reported by their Object Identifier (OID) with a friendly name where known.
Key Usage and Extended Key Usage flags describe what the key may do, such as digitalSignature, keyEncipherment, serverAuth, or clientAuth. Basic Constraints indicate whether the certificate can act as a CA and, when present, include a path length limit. The tool highlights these to help you spot misuse, such as a leaf certificate marked as a CA.
Results are informational and intended for inspection. They do not establish a trust chain, verify signatures against a trust store, or check revocation; use a dedicated verifier for those tasks when needed.
| Symbol | Meaning | Unit/Datatype | Source |
|---|---|---|---|
| DER(cert) | Certificate encoded as bytes | byte string | Derived |
| FP256 | SHA‑256 fingerprint with colons | hex string | Derived |
| SPKI | Subject Public Key Info structure | byte string | Derived |
| SPKIpin | Pin of SPKI using SHA‑256 | base64 | Derived |
| SAN | Subject Alternative Name entries | array of strings | Parsed |
| OID | Identifier for signature algorithm | dotted string | Parsed |
DNS: example.com and DNS: www.example.com. Key Usage lists digitalSignature, keyEncipherment; Extended Key Usage includes serverAuth. Interpretation: the names include the expected host and the validity window is current.
| Field | Type | Min | Max | Step/Pattern | Error Text | Placeholder / Accepts |
|---|---|---|---|---|---|---|
| Certificate input (textarea) | string | — | — | PEM headers or base64 [A-Za-z0-9+/=\s]+ with length > 100 |
“No certificate found in input.” | -----BEGIN CERTIFICATE----- … |
| Certificate file | ArrayBuffer / text | — | — | Auto‑read as text or binary by extension/magic | “Unsupported or corrupted binary file.”; “Could not find a certificate in the file.” | Accepts .pem, .crt, .cer, .der, .p7b, .p7c |
| Decode action | button | — | — | Enables when input exists | “Paste a certificate or choose a file.” | — |
| Input | Accepted Families | Output | Encoding/Precision | Rounding |
|---|---|---|---|---|
| Certificate | PEM (single or chain), DER (binary or base64), PKCS#7 (PEM or DER) | Info table, SAN list, JSON payload, CSV exports | Fingerprints as upper‑case hex with colons; SPKI pin as base64 | None |
| JSON payload | meta.detected, meta.chainCount, meta.selectedIndex; certificate object; chain array | Download or copy | Two date fields in ISO; two in local display format | None |
Validity timestamps are provided as ISO strings and as localized strings using the device locale. Comparisons should account for timezone differences when scheduling cutovers.
Processing is browser‑based. Clipboard and file downloads use local APIs, and no data is transmitted or stored server‑side.
Runtime scales linearly with certificate size. Given the same input, the decoder produces identical outputs.
Behavior aligns with the X.509 public key infrastructure profile and common certificate handling practices. Fingerprints use cryptographic hash functions over DER encodings. Basic Constraints and Key Usage semantics follow the public key certificate profile. Subject Alternative Name conveys additional identities beyond the Common Name.
No data is transmitted or stored server‑side. Use outputs responsibly when they contain organizational identifiers or email addresses.
Certificate inspection produces human‑readable identity details and comparison fingerprints.
Example. Expecting api.example.com? Confirm it appears in SAN and the end date is after the cutover window.
You now have the essentials to compare, archive, or escalate.
No. Processing happens on your device and nothing is transmitted or retained server‑side.
PEM single or chain, DER as binary or base64, and PKCS#7 in either form. Common extensions include .pem, .crt, .cer, .der, .p7b, and .p7c.
No. It reads fields and computes fingerprints and pins. Use a trust validator to check chains, policies, and revocation.
Basic Constraints mark the certificate as allowed to issue other certificates. Leaf certificates normally show “CA: false”.
A dash indicates the field was absent in the certificate. Not all subjects include O or OU and some extensions may be missing.
No. This focuses on certificates. Convert or inspect CSRs with a dedicated tool, then compare the issued certificate separately.
Yes. Once loaded, decoding is local. Clipboard and file downloads also operate locally.
They are deterministic for a given input. Comparing two independently derived values is a reliable equality test.
That indicates a self‑signed certificate, typical for roots or some lab setups. Trust depends on where it is installed.