SSL/PEM Certificate Decoder

Decode PEM certificates to view subject, issuer, validity, SANs, and more.

Security Warning

Only paste certificates here, never private keys. Private keys should remain on your server and never be shared with any online tool.

Examples

InputResult
PEM certificate from Let's EncryptSubject: CN=example.com, Issuer: R3, Valid until 2025-03-15, SANs: example.com, www.example.com
Self-signed certificateSubject and Issuer match, Self-Signed: Yes
Expired certificateExpired: Yes, Not After date in the past
Private key inputError: Private key detected. Content not processed.

About this tool

Paste a PEM-encoded certificate and see its details parsed out. The decoder shows the subject, issuer, validity dates, signature algorithm, Subject Alternative Names, and whether the certificate is expired or self-signed.

The tool includes a safety check that detects and rejects private keys. If you accidentally paste a private key, it will warn you and refuse to process the input. All parsing runs in your browser with no data sent to any server.

Frequently asked questions

Is it safe to paste my certificate here?

Yes. Certificates are public information and are sent to every browser that connects to your site. Only paste certificates here, never private keys. The tool detects and rejects private key input.

What fields can this tool extract?

Subject (CN, O, C), issuer, serial number, validity dates, signature algorithm, public key algorithm, version, expiration status, self-signed status, and Subject Alternative Names.

What PEM format does this tool accept?

Standard PEM format starting with -----BEGIN CERTIFICATE----- and ending with -----END CERTIFICATE-----. This is the format you get from most certificate authorities and tools like openssl.

EchoBeaver — Free browser tools