SSL Certificate Decoder
Decode any SSL certificate or CSR in seconds — inspect subject, issuer, validity, SANs, fingerprints, key info and the full certificate chain. Supports PEM, DER, P7B and more. Read-only: no private key data is ever read or stored.
Paste any PEM-encoded CSR or SSL certificate (or upload a file) to decode all public fields — subject, issuer, validity, SANs, key info, fingerprints and extensions. Supports .pem .crt .cer .csr .der .p7b. No private key data is ever read or stored.
Enter any domain or HTTPS URL to fetch its live SSL certificate directly from the server. Useful for checking expiry dates, confirming the correct cert is deployed, and inspecting the full chain — no file needed. Connection timeout: 4 seconds.
If you get a timeout, your hosting server may block outbound port 443 connections.
Paste your original CSR and your server (end-entity) certificate to verify all subject fields were correctly carried over during signing, and to confirm the public key matches. Do not paste a Root CA or Intermediate CA certificate here — those will not share fields with your CSR. Use only the certificate issued directly for your domain.
Decoding certificate data…
How to Use
- Paste your PEM content — copy the full contents of your
.pem,.crt,.cer, or.csrfile, including the -----BEGIN----- and -----END----- header/footer lines, and paste it into the text area. You can also paste an entire certificate chain (multiple certs back-to-back) and all of them will be decoded at once. - Upload a file instead — click the Upload File button to open a file picker. Supported formats are
.pem,.crt,.cer,.csr,.der,.p7b, and.txt. Binary.derfiles must be uploaded; they cannot be pasted as text. - Optional — enter a hostname — type a domain name (e.g.
example.com) in the Hostname Match field. After decoding, the tool will report whether the certificate covers that domain, including wildcard matches. - Click Decode — the tool sends your PEM to the server-side decoder and instantly displays subject, issuer, validity period, a visual expiry progress bar, Subject Alternative Names, fingerprints, key info, and all extensions.
- Copy any field — hover over any result row to reveal a copy button. Click it to copy that individual value to your clipboard.
.pfx / .p12 files are not supported because they contain private keys.- Enter a domain or URL — type or paste any domain name (e.g.
example.com), a full HTTPS URL, or include a custom port (e.g.example.com:8443). Thehttps://prefix is optional. - Click Fetch & Inspect — the server connects to the remote host on port 443 (or the specified port), retrieves the live SSL certificate directly from the server, and returns the full decoded result including the complete chain.
- Review the results — you will see the same full breakdown as the Paste decoder: subject, issuer, validity dates, days remaining with a visual progress bar, SANs, fingerprints, and extensions.
- Timeout notice — the connection timeout is 4 seconds. If the check fails, your hosting server may block outbound port 443 connections, or the remote server may be unreachable.
- Paste your CSR — copy your original Certificate Signing Request (the
-----BEGIN CERTIFICATE REQUEST-----block) into the top text area. This is the file you sent to your Certificate Authority when requesting the certificate. - Paste the issued certificate — copy your server (end-entity) certificate (the
-----BEGIN CERTIFICATE-----block) into the bottom text area. This must be the certificate issued directly for your domain — not a Root CA or Intermediate CA certificate. - Click Compare — the tool compares all subject fields side by side (Common Name, Organisation, Country, State, Locality, Email) and verifies that the public key in the CSR matches the public key in the certificate.
- Review the comparison table — each field shows a green tick if the values match or a red cross if they differ. A summary badge at the top shows whether all fields match. The public key match result is highlighted separately at the top of the table.
Frequently Asked Questions
.crt, .pem, .csr, or .cer file.*.example.com) cover all subdomains at one level. Our decoder lists every SAN and highlights wildcards separately.-----BEGIN ... ----- headers, including CERTIFICATE, CERTIFICATE REQUEST, X509 CERTIFICATE, and PKCS7 blocks. Binary DER files must be uploaded using the file picker (they cannot be pasted as text). P7B/PKCS#7 files can contain multiple certificates and are fully supported — the decoder will decode all certificates in the chain. PFX/PKCS#12 files are not supported because they contain private keys.