不喜欢广告? 无广告 今天

X.509 Certificate Parser

开发人员安全
广告 · 消除?

类型

财产 价值
结果将显示在这里

主题

场地 价值
结果将显示在这里

发行人

场地 价值
结果将显示在这里

有效期

场地 价值
结果将显示在这里

细节

财产 价值
结果将显示在这里

扩展

扩展 价值
结果将显示在这里

指纹

Algorithm 指纹
结果将显示在这里
广告 · 消除?

指导

X.509 Certificate Parser

X.509 Certificate Parser

Parse and inspect X.509 certificates and CSRs from PEM format. Instantly see the subject, issuer, validity dates, serial number, public key details, signature algorithm, SAN (Subject Alternative Names), key usage extensions, and full field breakdown — without uploading the certificate to any server.

如何使用

Paste your PEM-encoded certificate (beginning with -----BEGIN CERTIFICATE-----) or CSR into the input field, or use the built-in example. Click Parse to see all certificate fields displayed in a structured table.

特征

  • PEM certificate parsing – X.509 v1/v2/v3 and CSR support
  • Full field display – subject, issuer, validity, serial, public key, SAN, extensions
  • Key usage detection – identifies Digital Signature, Key Encipherment, CA flag, and more
  • Signature algorithm – shows the signing algorithm (RSA-SHA256, ECDSA, etc.)
  • Built-in example – real certificate for immediate testing
  • 仅客户端 – certificates never leave your browser

广告 · 消除?

常问问题

  1. What is an X.509 certificate and what does it contain?

    An X.509 certificate is a digitally signed document that binds a public key to an identity (domain, organisation, or person). It contains: version, serial number, signature algorithm, issuer DN, validity period (notBefore/notAfter), subject DN, public key info (algorithm + key), and extensions (SAN, key usage, basic constraints, CRL distribution points, OCSP URL). The CA signs the certificate’s TBSCertificate structure to produce the final certificate.

  2. What is the difference between DV, OV, and EV certificates?

    Domain Validation (DV) certificates verify only that the applicant controls the domain, via DNS or HTTP challenge. Organisation Validation (OV) certificates additionally verify the legal organisation identity through documentation. Extended Validation (EV) certificates require the most rigorous vetting including legal existence, physical address, and phone verification. DV is sufficient for encryption; OV/EV provide identity assurance for higher-trust scenarios.

  3. What are Subject Alternative Names (SAN) and why are they important?

    SAN (RFC 5280) is an X.509v3 extension that lists all domain names and IP addresses a certificate is valid for. Modern browsers (since 2017) only use SAN for hostname validation and ignore the Common Name (CN) field for this purpose. A certificate without SAN will be rejected even if the CN matches. Wildcard SANs (*.example.com) match one subdomain level only and do not cover the apex domain or deeper subdomains.

  4. What does certificate chain validation involve?

    Chain validation verifies that each certificate in the chain is signed by the next certificate up to a trusted root CA. The browser/OS maintains a trust store of pre-installed root CA certificates. Validation checks: signature validity at each level, validity period, key usage extensions, revocation status (CRL or OCSP), and that the issuing CA has the CA:TRUE basic constraint. A chain is valid only if all checks pass at every level.

想要享受无广告的体验吗? 立即无广告

安装我们的扩展

将 IO 工具添加到您最喜欢的浏览器,以便即时访问和更快地搜索

添加 Chrome 扩展程序 添加 边缘延伸 添加 Firefox 扩展 添加 Opera 扩展

记分板已到达!

记分板 是一种有趣的跟踪您游戏的方式,所有数据都存储在您的浏览器中。更多功能即将推出!

广告 · 消除?
广告 · 消除?
广告 · 消除?

新闻角 包含技术亮点

参与其中

帮助我们继续提供有价值的免费工具

给我买杯咖啡
广告 · 消除?