Field | Value | Copy |
---|---|---|
{{ r.k }} | {{ r.v }} | |
No data. |
Certificate signing requests are structured messages that present a public key and the subject information that a certificate should include. They let you prepare names and options in a consistent way so the issuer can verify details and produce a matching certificate.
You provide a primary host name or an IP address and, when needed, alternate names for the same service. The generator creates a fresh key pair, assembles the request, and signs it so the result can be submitted to your certificate authority.
A common pattern is a site that answers for one name and a short alias. Enter a domain for the main field and add a second name as an alternate so both resolve to the same identity without separate certificates.
A valid request proves format and signature only, not control of the names. Use test data in shared environments and keep private keys in trusted storage.
The request encodes subject identity fields and a freshly generated public key, then computes a digital signature over the request body. The result is a PEM text block that certificate services can inspect and accept.
Key material uses an RSA modulus with a selectable size of 2048, 3072, or 4096 bits. The signature digest can be SHA‑256, SHA‑384, or SHA‑512, with SHA‑256 as the default. A hash of the Subject Public Key Info (SPKI SHA‑256) is also computed for quick fingerprinting.
Subject Alternative Names capture additional DNS hosts or IP addresses. Optional Key Usage and Extended Key Usage flags can be requested, although many issuers ignore these hints and apply their own profiles.
Private keys are exported as PKCS #8. When encryption is enabled, the file is wrapped with PBES2 using PBKDF2‑HMAC‑SHA‑256 at 100 000 iterations and AES‑256‑CBC with a random salt and IV.
example.com
. SAN: DNS:example.com,DNS:www.example.com
. Key size: 2048
. Digest: SHA-256
.Field | Type | Min | Max | Step/Pattern | Error Text | Placeholder |
---|---|---|---|---|---|---|
Common Name | string (DNS, wildcard, IPv4, IPv6) | — | 253 chars for DNS | Labels 1–63 chars, letters/digits/hyphen, no edge hyphens; wildcard only as *.example |
Enter a valid domain, wildcard, or IP. | example.com |
Subject Alt Names | comma‑separated tokens | — | — | Each token must be a valid DNS or IP | Comma-separated valid DNS names or IPs. | example.com,www.example.com,203.0.113.10 |
Country (C) | string | 2 | 2 | A–Z only | Two-letter country code. | US |
string | — | — | ^[^\s@]+@[^\s@]+\.[^\s@]+$ |
Invalid email address. | admin@example.com |
|
Encrypt key | boolean | — | — | Passphrase length ≥ 4 and must match | Shown when enabled | Min 4 chars |
Key size | enum | 2048 | 4096 | 2048, 3072, 4096 | — | — |
Digest | enum | — | — | SHA‑256 (default), SHA‑384, SHA‑512 | — | — |
Auto‑add CN to SAN | boolean | — | — | Adds CN if SAN list is empty | — | — |
Constant | OID | Notes |
---|---|---|
subjectAltName | 2.5.29.17 | DNS and IP entries |
keyUsage | 2.5.29.15 | Marked critical when present |
extendedKeyUsage | 2.5.29.37 | serverAuth, clientAuth |
emailAddress (RDN) | 1.2.840.113549.1.9.1 | IA5String |
extensionRequest | 1.2.840.113549.1.9.14 | Carries CSR extensions |
challengePassword | 1.2.840.113549.1.9.7 | Optional |
sha256WithRSAEncryption | 1.2.840.113549.1.1.11 | Also 1.1.12, 1.1.13 for SHA‑384/512 |
PBES2 | 1.2.840.113549.1.5.13 | Key protection scheme |
PBKDF2 | 1.2.840.113549.1.5.12 | 100 000 iterations |
HMAC‑SHA‑256 | 1.2.840.113549.2.9 | PRF for PBKDF2 |
AES‑256‑CBC | 2.16.840.1.101.3.4.1.42 | With random IV |
Input | Accepted Families | Output | Encoding/Precision | Rounding |
---|---|---|---|---|
Text fields | DNS, IPv4, IPv6, printable strings | CSR PEM | Base64, 64‑column lines | N/A |
Options | Booleans and enums | PKCS #8 key PEM | Plain or PBES2‑encrypted | N/A |
— | — | JSON summary | Inputs, CSR, key, SPKI hash | N/A |
All operations run in the browser. No network requests are made by the generator, and files are offered for local copy or download only.
*
is not a valid hostname.No data is transmitted or stored server‑side. Generated keys and requests remain on your device unless you copy or download them.
Certificate signing requests package a new public key and subject details for later issuance.
Example. CN example.com
with SAN example.com,www.example.com
yields one CSR that covers both names.
No. Generation and formatting run locally, and files are offered for copy or download only.
RSA 2048, 3072, and 4096 bits. Larger sizes increase CPU time during generation and use.
Yes. A wildcard is allowed only at the leftmost label. SAN entries accept DNS names plus IPv4 and IPv6.
When inputs barely meet format rules, an issuer may still reject them. Keep names simple and within length limits.
Inspect the PEM text and fingerprint, then submit it to your certificate authority or verify with your preferred tooling.
They are optional hints. Many issuers apply their own profiles regardless of the request.
It runs entirely in the browser once loaded. Some features, like clipboard access, depend on permissions.
CSR generation itself does not imply licensing. Any certificate issuance terms come from your chosen authority.
localhost
.