SSL Certificate Decoder
Runs in browserPaste any PEM-encoded SSL/TLS certificate and instantly decode all X.509 fields: subject, issuer, validity, SANs, key usage, fingerprints, and more.
Last updated 08 Apr 2026
Decode any PEM certificate and view all X.509 fields: subject and issuer DN, validity dates, Subject Alternative Names (SANs), key usage, public key info, SHA-256 and SHA-1 fingerprints, and more. Supports full certificate chains. All decoding happens in your browser — nothing is sent to any server.
Paste a PEM certificate above to decode it
How to use
- 1
Get your PEM certificate
Copy the PEM certificate text from your .crt or .pem file, your server configuration, a browser's certificate viewer, or your CA's dashboard. It starts with -----BEGIN CERTIFICATE----- and ends with -----END CERTIFICATE-----.
- 2
Paste the certificate
Paste the full PEM text including the BEGIN and END header lines into the text area. You can paste an entire certificate chain (multiple certificates) and each one will be decoded separately.
- 3
Read the decoded fields
The tool instantly shows all decoded fields: subject, issuer, validity dates, SANs, key usage, public key info, and SHA-256/SHA-1 fingerprints.
- 4
Copy individual fields
Click the Copy button next to any section to copy the decoded values to your clipboard for use in scripts, configuration, or documentation.
Frequently asked questions
What is a PEM certificate?
What is the difference between this tool and an SSL checker?
What are Subject Alternative Names (SANs)?
How do I get the SHA-256 fingerprint of a certificate?
Can I decode a certificate chain?
What is Key Usage?
Is any data sent to a server?
What is the difference between a leaf, intermediate, and root certificate?
SSL Certificate Decoder parses any PEM-encoded X.509 certificate and
displays every field in a readable, structured format. Paste the certificate
text (including the BEGIN/END headers) and the tool instantly shows the
complete subject and issuer distinguished names (DN), validity period, all
Subject Alternative Names (SANs), key usage flags, extended key usage, public
key algorithm and size, and SHA-256/SHA-1 fingerprints.
This tool is different from an SSL checker that looks up a live domain —
here you paste the raw certificate PEM text and decode it entirely offline.
No network request is made. This is useful when you have a certificate file
(.crt, .pem, .cer) and need to inspect its contents before deploying it,
verify it matches a private key, check expiry, or confirm the SANs include
the right hostnames.
Certificate chains are supported: paste multiple PEM certificates concatenated
together and each one is decoded separately, with position labels showing
which is the leaf, intermediate, and root certificate.
All processing uses the browser's native Web Crypto API plus the open-source
@peculiar/x509 library. Nothing leaves your browser.
Related tools
SSL Certificate Checker
Check SSL/TLS certificate validity, issuer, expiry, and SANs for any domain via Certificate Transparency logs.
JWT Decoder
Decode and inspect JWT tokens — view header, payload, claims, and expiry status without sending data to any server.
Base64 Encoder/Decoder
Encode text or files to Base64 or decode Base64 strings back to plain text — real-time, fully in your browser.
Password Generator
Generate cryptographically secure passwords with custom length (8–128), character sets, entropy display, and exclude-ambiguous option. Runs in your browser.