Is it safe to paste a certificate?
Yes — X.509 certificates are public by design. Every browser that connects to your site downloads them. The matching private key (PEM block labelled BEGIN PRIVATE KEY / BEGIN RSA PRIVATE KEY) is the only thing that must stay secret. Even so, this decoder runs entirely in your browser; nothing about the cert leaves the tab.
How is the fingerprint calculated?
The SHA-256 fingerprint is the SHA-256 hash of the entire DER-encoded certificate (the bytes you would get by base64-decoding the PEM body). The SHA-1 fingerprint is the same thing with SHA-1. Both are computed using the browser Web Crypto API (crypto.subtle.digest), the same primitive used by TLS internally.
What does Subject Alternative Names mean?
Subject Alternative Names is the X.509 v3 extension (OID 2.5.29.17) that lists every hostname, IP, email, or URI the certificate is valid for. Modern browsers ignore the legacy CN field and validate strictly against SAN — a cert without SAN entries fails on Chrome, Firefox, and Safari regardless of CN.
What are Key Usage extensions?
Key Usage (OID 2.5.29.15) is a bitmask declaring what the public key is allowed to do — Digital Signature, Key Encipherment, Certificate Sign, CRL Sign, and so on. A TLS server cert needs Digital Signature + Key Encipherment (RSA) or Digital Signature (ECDSA). Extended Key Usage (EKU) refines this with purpose OIDs like TLS Server Auth (1.3.6.1.5.5.7.3.1) and Client Auth.
How do I check expiry?
Decode the cert and look at the Validity section — Not Before is the issue date, Not After is the expiry. The decoder colour-codes the badge: green if more than 30 days remain, orange if expiring within 30 days, red if already expired. Set up renewal at least 21 days before expiry to leave time for issuance, deployment, and DNS propagation.
Why does my cert show issuer = self?
When the Issuer DN matches the Subject DN exactly, the certificate is self-signed — it certifies itself rather than being signed by a CA. Self-signed certs are perfect for local development and internal services but trigger browser warnings on the public internet. Use a real CA (Let’s Encrypt is free) for anything users will see.
What is the difference between issuer and subject?
Subject is who the certificate is for (the CN/SANs the cert vouches for). Issuer is the Certificate Authority that signed it — DigiCert, Let’s Encrypt R3, Sectigo, GlobalSign, etc. To validate the chain, the verifier looks up the issuer cert (typically an intermediate) and walks up to a trusted root in the OS or browser store.
Can I decode certificate chains?
This decoder reads one cert at a time. To inspect a full chain (leaf → intermediate → root), paste each PEM block separately. Most chain files concatenate three PEM blocks; copy each between BEGIN/END markers and decode in turn to confirm the issuer of the leaf matches the subject of the intermediate, and so on.