SSL certificate decoder — read PEM subject, issuer, SANs, and validity

Use this free SSL certificate decoder (and X.509 PEM certificate parser) to paste Base64 PEM blocks and inspect subject and issuer distinguished names, serial number, validity (notBefore / notAfter), Subject Alternative Names (SANs), key usage and extended key usage when present, plus a SHA-256 fingerprint for quick comparison. Processing runs entirely in your browser—ideal when you already have PEM text from a file, load balancer, or support ticket and want a structured view without uploading secrets to a backend. For certificates served live over HTTPS, pair this page with the SSL certificate checker that fetches the chain from a URL, and use the RSA key pair generator when you need matching PEM keys for labs and demos.

Privacy: certificates are decoded locally in your browser. This tool does not verify trust chains or signatures—use it to read PEM structure and metadata only.

Certificate 1

Date window overlaps the current time (local clock)—still not a trust or signature check.

Subject
CN=sample.ssldecoder.local, O=Demo
Issuer
CN=sample.ssldecoder.local, O=Demo
Serial number
01
Public key
ECDSA (P-256)
Not before (UTC)
2024-01-01T00:00:00.000Z
Not after (UTC)
2030-01-01T00:00:00.000Z
Signature algorithm
ECDSA / SHA-256

No Subject Alternative Name extension found on this certificate (some older or specialized certs omit SAN).

Why decode TLS certificates from PEM text?

Operations and engineering teams constantly exchange PEM-encoded X.509 certificates when debugging mTLS, CDN uploads, Kubernetes secrets, or corporate proxies. A dedicated certificate decoder online turns opaque Base64 into readable fields: who the certificate claims to represent (subject), which authority signed it (issuer), which hostnames are allowed (often via SAN DNS names), and the notBefore / notAfter window. That is different from proving the certificate is trusted: trust requires chain building, signature verification, and revocation checks—work your platform or the live SSL checker performs against public endpoints.

This utility is optimized for offline inspection: paste text, optionally upload a .pem file, and copy summaries into runbooks. If you are hardening HTTP responses, continue with the security headers checker and CSP builder so transport security and browser policy stay aligned.

How to use this SSL certificate decoder (step by step)

  1. Obtain PEM text: export from a server, copy from a ticket, or save from a CA portal. The textarea expects standard -----BEGIN CERTIFICATE----- wrapping.
  2. Paste the block or click Upload file for a .pem, .crt, or .cer file. Chains with multiple PEM blocks are listed as separate certificates in order.
  3. Read subject, issuer, serial, validity, algorithms, and SAN list. Compare the SHA-256 fingerprint with openssl x509 -fingerprint -sha256 output when you need byte-for-byte confirmation.
  4. Use Copy summary or Copy PEM (with the copy icon) to attach details to issues or chat. For arbitrary hex or Base64 digests of other material, the hash generator remains the right tool.

Keywords: PEM decoder, X.509 inspection, SAN viewer

Teams search for an X.509 certificate decoder, PEM certificate parser, view certificate subject and issuer online, SSL cert expiry checker from PEM, and read SAN from certificate. This page targets those intents with explicit field labels, local processing, and clear limitations (no chain validation). For token-style debugging in APIs, the JWT encoder and JWT decoder cover JSON Web Tokens instead of PKIX certificates.

Understanding subject, issuer, and the certificate chain

The subject names the entity the certificate belongs to; the issuer names the signing certificate authority. In a full TLS handshake you receive an ordered chain (leaf, intermediates, optional root). Pasting multiple PEM blocks here decodes each independently—it does not automatically verify that block n signed block n − 1. Use your platform’s trust store or openssl workflows when you need cryptographic confirmation.

Subject Alternative Name (SAN) and hostname matching

For HTTPS, clients typically evaluate allowed hostnames from SAN entries (often dns types). If SAN is empty on this page, the certificate may be legacy, specialized, or the extension might be absent—your deployment standards should still require SAN for public server authentication. IP addresses can appear as ip general names for internal or service-mesh scenarios.

Limitations and safe use

Decoding never replaces revocation checks (CRL/OCSP), CT logging policy, or your organization’s key custody rules. Treat production private keys and high-assurance certificates like credentials: avoid pasting them on untrusted shared machines. When you only need password or passphrase strength feedback, use the password strength meter instead of juggling cert material.

Related security and encryption tools

Browse the full security and encryption tools section. Highlights:

  • Password Strength MeterScore password entropy, estimate crack time, and get practical hardening tips.
  • bcrypt Hash GeneratorGenerate bcrypt hashes with configurable cost for secure password storage testing.
  • AES Encrypt & DecryptEncrypt and decrypt text with AES-256 and a passphrase—runs fully in your browser.
  • RSA Key Pair GeneratorCreate 1024–4096 bit RSA public/private key pairs locally for demos and dev workflows.
  • CSP BuilderToggle Content-Security-Policy directives and copy a header value ready for your server.
  • Security Headers CheckerAnalyze security-related HTTP headers on any URL with graded guidance to harden responses.
  • JWT EncoderBuild HS256-signed JWTs from custom header and payload for API and auth testing.
  • HMAC GeneratorCreate HMAC-SHA256 or HMAC-SHA512 signatures with a secret for webhook and API verification.
  • .htaccess GeneratorAssemble common Apache .htaccess rules for redirects, HTTPS, caching, and access control.

Frequently asked questions

What does this SSL certificate decoder show?
It parses one or more PEM-encoded X.509 certificates (the text between BEGIN CERTIFICATE and END CERTIFICATE) and displays the subject and issuer distinguished names, serial number, validity window (notBefore and notAfter), signature algorithm, public key type, Subject Alternative Name (SAN) entries when present, Basic Constraints, Key Usage, and Extended Key Usage extensions. It can also show a SHA-256 fingerprint of each certificate’s DER encoding for quick comparison with openssl or browser views.
Does this tool verify that a certificate is trusted or correctly signed?
No. Decoding reads structure and metadata from the certificate bytes; it does not build a chain to a trusted root, check revocation (CRL/OCSP), or validate signatures against issuer keys. For live HTTPS endpoints, use your browser, openssl verify, or the SSL certificate checker tool that fetches the served chain from a URL.
Is my certificate sent to your servers?
No. Parsing runs entirely in your browser with JavaScript. PEM text stays in the page unless you copy it elsewhere or use another tool that performs network requests.
What PEM formats are supported?
Standard PKIX certificates in PEM form: lines starting with -----BEGIN CERTIFICATE----- and ending with -----END CERTIFICATE-----. You can paste a full PEM chain (multiple blocks); each block is decoded separately. Private keys, CSRs, PKCS#7 bundles without PEM certificate blocks, or DER-only blobs are not the focus of this page—export or convert to PEM first.
How do Subject Alternative Names (SANs) relate to the Common Name?
Modern browsers and clients primarily match hostnames against SAN DNS names; the legacy Common Name (CN) in the subject is still shown for compatibility. If you inspect a server certificate, expect to see dns names (and sometimes IP or email entries) listed under SAN when the certificate follows current best practices.
Why does validity show expired or not yet valid when my site works?
You might be viewing a different certificate than the one the edge serves (multiple certs in a chain, old file on disk, or a staging copy). Clock skew, cached connections, or a replaced cert can also confuse quick checks. Compare serial numbers and fingerprints with what the server presents, for example using the SSL certificate checker on a live URL.
Can I use this for client certificates or code-signing certs?
Yes, if they are X.509 certificates in PEM form. The decoder shows the same fields; Extended Key Usage may list purposes such as client authentication or code signing when the extension is present. Always follow your organization’s policies for handling authentication and signing material.
Which related tools should I use next?
Inspect certificates served over HTTPS with the SSL certificate checker, review HTTP security headers with the security headers checker, generate or inspect RSA keys with the RSA key pair generator, and experiment with JWTs using the JWT encoder—all linked from the security and encryption tools section on the home page.