Drop or select a certificate, PKCS#7, PKCS#12, CSR or key file to inspect its contents. Everything runs in your browser.
Drag & drop a file here
.pem .crt .cer .der .p7m .p7s .p7c .p12 .pfx .csr .req .key
Paste PEM-encoded data below. Supports certificates, CSRs, keys and PKCS#7 bundles. Multiple PEM blocks are detected automatically.
PEM Input
Supported Formats
| Extension | Format | Description |
|---|---|---|
.pem | PEM | Base64-encoded with header/footer markers. Can contain certificates, keys, CSRs. |
.crt / .cer | PEM or DER | X.509 certificate. Auto-detected encoding. |
.der | DER (binary) | Binary-encoded X.509 certificate. |
.p7m / .p7s / .p7c | PKCS#7 / CMS | Signed data (P7M/P7S) or certificate bundle (P7C). PEM or DER. |
.p12 / .pfx | PKCS#12 | Password-protected container with certificate + private key. |
.csr / .req | PKCS#10 | Certificate Signing Request. PEM or DER. |
.key | PEM | RSA private or public key. |
What This Tool Can Do
- Display full certificate details (subject, issuer, validity, extensions)
- Compute SHA-1 and SHA-256 fingerprints
- Extract and download encapsulated content from P7M files
- Detect MIME email messages inside P7M files — parse headers, text/HTML body and extract attachments
- Open password-protected PKCS#12 containers
- Inspect Certificate Signing Requests (CSR)
- Detect and parse multiple PEM blocks in a single input
- Show key type, size and public key details
- Check validity period with color-coded status badges
- Detect self-signed certificates
- Export individual certificates as PEM
What This Tool Cannot Do
- Validate certificate chains against a CA trust store
- Perform OCSP or CRL revocation checks
- Initiate TLS handshakes or test server certificates remotely
- Decrypt password-protected private keys (only PKCS#12 passwords are supported)
- Sign or generate certificates
- Handle elliptic curve (EC) key details beyond basic detection
Tips
Export a certificate from your browser
- Click the padlock icon in the address bar
- View certificate details
- Export / download as .pem or .crt
- Drop the file here or paste the PEM text
Useful OpenSSL commands
# View a certificate
openssl x509 -in cert.pem -text -noout
# Convert DER to PEM
openssl x509 -inform der -in cert.der -out cert.pem
# Extract cert from P12
openssl pkcs12 -in file.p12 -clcerts -nokeys -out cert.pem
# View a CSR
openssl req -in request.csr -text -noout
# Extract certs from PKCS#7
openssl pkcs7 -in bundle.p7b -print_certs -out certs.pem
Common PKI File Extensions
| Extension | Standard | Encoding | Typical Content |
|---|---|---|---|
.pem | RFC 7468 | Base64 (ASCII) | Certificates, keys, CSRs, CRLs |
.der / .cer | ITU-T X.690 | Binary | Single certificate (DER-encoded) |
.crt | X.509 | PEM or DER | Certificate (encoding varies by OS) |
.key | PKCS#1 / PKCS#8 | PEM | Private or public key |
.csr / .req | PKCS#10 | PEM or DER | Certificate Signing Request |
.p7b / .p7c | PKCS#7 | PEM or DER | Certificate bundle (no private key) |
.p7m / .p7s | CMS / PKCS#7 | DER (usually) | Signed/enveloped data |
.p12 / .pfx | PKCS#12 | Binary | Certificate + private key (password-protected) |
.ca-bundle | — | PEM | Concatenated CA certificates |
.jks | Java KeyStore | Binary | Java-specific key/cert store (not supported) |
Certificate Fields Reference
Distinguished Name (DN) Components
| Abbr | OID | Field |
|---|---|---|
CN | 2.5.4.3 | Common Name |
O | 2.5.4.10 | Organization |
OU | 2.5.4.11 | Organizational Unit |
C | 2.5.4.6 | Country (2-letter ISO) |
ST | 2.5.4.8 | State / Province |
L | 2.5.4.7 | Locality (City) |
E | 1.2.840.113549.1.9.1 | Email Address |
serialNumber | 2.5.4.5 | Serial Number (DN attribute) |
Common X.509v3 Extensions
| Extension | OID | Description |
|---|---|---|
| Subject Alternative Name | 2.5.29.17 | Additional identities (DNS names, IPs, emails) |
| Key Usage | 2.5.29.15 | Permitted key operations (digitalSignature, keyEncipherment, ...) |
| Extended Key Usage | 2.5.29.37 | Purpose (serverAuth, clientAuth, codeSigning, ...) |
| Basic Constraints | 2.5.29.19 | CA flag and path length constraint |
| Authority Key Identifier | 2.5.29.35 | Identifies the issuer's public key |
| Subject Key Identifier | 2.5.29.14 | Hash of the subject's public key |
| CRL Distribution Points | 2.5.29.31 | URLs where CRLs can be retrieved |
| Authority Information Access | 1.3.6.1.5.5.7.1.1 | OCSP responder and CA issuer URLs |
| Certificate Policies | 2.5.29.32 | Policy OIDs and qualifiers |
Common OpenSSL Commands
# --- View / Inspect ---
openssl x509 -in cert.pem -text -noout # View certificate
openssl req -in request.csr -text -noout # View CSR
openssl rsa -in key.pem -text -noout # View RSA key
openssl pkcs7 -in bundle.p7b -print_certs # List certs in PKCS#7
openssl pkcs12 -in file.p12 -info # Inspect PKCS#12
# --- Convert ---
openssl x509 -inform der -in cert.der -out cert.pem # DER to PEM
openssl x509 -outform der -in cert.pem -out cert.der # PEM to DER
openssl pkcs12 -in file.p12 -clcerts -nokeys -out cert.pem # P12 to cert PEM
openssl pkcs12 -in file.p12 -nocerts -nodes -out key.pem # P12 to key PEM
openssl pkcs12 -export -in cert.pem -inkey key.pem -out file.p12 # PEM to P12
# --- Verify ---
openssl verify -CAfile ca.pem cert.pem # Verify against CA
openssl s_client -connect host:443 -showcerts # Fetch server chain
# --- Fingerprints ---
openssl x509 -in cert.pem -fingerprint -sha256 -noout # SHA-256 fingerprint
openssl x509 -in cert.pem -fingerprint -sha1 -noout # SHA-1 fingerprint
PKI Trust Model
Public Key Infrastructure (PKI) relies on a hierarchical trust model:
- Root CA — Self-signed certificate trusted by operating systems and browsers. Stored in the local trust store.
- Intermediate CA — Signed by the Root CA. Issues end-entity certificates. Adds a layer of protection (root key stays offline).
- End-entity certificate — Identifies a server, person or device. Signed by an intermediate CA.
When a TLS client connects, the server presents its certificate along with intermediate CA certificates. The client walks the chain up to a trusted root to validate the connection.