ED

SSL Certificate Decoder

Decode X.509 certificates, CSRs, and private keys. Extract all fields and verify certificate chains.

What It Decodes

Quick Start

  1. Go to SSL Decoder
  2. Paste PEM-encoded certificate (BEGIN CERTIFICATE block)
  3. Or upload .crt, .cer, .pem file
  4. Click "Decode" — see all certificate details

Extracted Information

Certificate Details

CSR Details

Use Cases

1. Verify Certificate Before Installation

Problem: CA sent you a .crt file. Is it for the right domain?

Solution: Decode → Check Subject + SANs → Ensure your domain is listed

2. Debug SSL Errors

Problem: Browser shows "Certificate name mismatch"

Solution: Decode cert → Check SANs → See if www. subdomain is missing

3. Certificate Chain Validation

Problem: SSL works in Chrome but fails in Java/Android

Solution: Decode chain → Check for missing intermediate certificate

4. Compare Certificates

Need: You have staging and production certs — are they identical?

Solution: Decode both → Compare fingerprints (SHA-256 hash)

Certificate Chain Verification

Paste full PEM chain (leaf + intermediates + root) — tool validates:

Private Key Analysis

Warning: Never paste production private keys into ANY online tool! Use for testing/learning only.

For local use, the tool can analyze:

Supported Formats

FormatExtensionDescription
PEM.pem, .crt, .cerBase64 encoded (most common)
DER.der, .cerBinary format (convert to PEM first)
PKCS#7.p7bBundle format (Windows)
PKCS#12.pfx, .p12Password-protected bundle

Example: Decoding Let's Encrypt Certificate

Issuer: Let's Encrypt R3
Subject: CN=example.com
Validity: 2026-01-10 to 2026-04-10 (90 days)
SANs: example.com, www.example.com
Public Key: ECDSA P-256 (256-bit)
Signature: ECDSA with SHA-256
Serial: 04:a1:b2:c3:d4:e5:f6:a7:b8:c9:d0:e1:f2:a3:b4:c5
Fingerprint (SHA-256): 1a2b3c4d...

Best Practices

Decode Your SSL Certificate Now

Open SSL Decoder →