Certificate Inspector
Decode and inspect X.509 certificates. Fetch from a URL or paste PEM data. View subject, SANs, key details, extensions, and security assessment — all client-side.
About This Tool
Inspect SSL/TLS certificates by fetching them from a URL or pasting PEM-encoded data. The tool decodes the ASN.1 DER structure entirely in your browser and provides a comprehensive analysis including a security assessment.
Information Displayed
Validity status — valid, expiring soon, or expired with days remaining
Subject & Issuer — distinguished names with CN, O, C breakdown
Subject Alternative Names — all DNS names, IPs, emails, URIs
Public key — algorithm (RSA/EC/Ed25519), key size, curve, signature algorithm
Key Usage & Extended Key Usage — digital signature, server/client auth
Authority Info Access — OCSP and CA Issuer URLs
Certificate Transparency — SCT presence check
SHA-256 fingerprint — computed in-browser via Web Crypto
Security assessment — key strength, signature algorithm, validity duration, CT compliance
How to Use
Enter a URL and click Fetch to download the certificate, or paste PEM data directly
Click Inspect Certificate to decode and analyze
- Review all certificate details and security findings
Privacy
All certificate parsing and analysis happens entirely in your browser. When fetching by URL, public CT log APIs are used (certspotter, crt.sh) — no server-side proxy. For private/internal certificates, use the PEM paste option or the openssl commands below.
Linux Command Reference
You can inspect certificates from the terminal using openssl:
Download & Save Certificate
Quick Certificate Summary
View Subject Alternative Names
Full Certificate Details
Check Expiry (30 days)
TLS Handshake & Chain
Verify Certificate Chain
Monitor Expiry (cron script)
Related
See Secure Nginx with Client Certificates for a guide on mutual TLS authentication.