security validator

X.509 Certificate Inspector

Inspect PEM certificates to view subject, issuer, and validity dates—client-side.

Results

Processing…
Status
Processing...
Details
Processing...
Subject CN
Processing...
Issuer CN
Processing...
Not before
Processing...
Not after
Processing...

How to use this validator

  1. Paste the PEM certificate.
  2. Run inspect to parse subject/issuer/notBefore/notAfter.
  3. If invalid, check markers and that the body is an intact base64-encoded cert.

Rules & checks

Requires BEGIN/END CERTIFICATE markers.

Parses PEM into subject, issuer, and validity dates.

Runs client-side; nothing is persisted.

Inputs explained

  • PEM certificate

    Paste a public certificate with BEGIN/END CERTIFICATE markers. Do not paste private keys.

When to use it

  • Check expiry and issuer of pasted certs
  • Support verifying customer-provided certs
  • Quick inspection before committing TLS assets

Common errors

  • Missing BEGIN/END CERTIFICATE markers
  • Corrupted base64 body
  • Pasting private keys instead of certs

Limitations

  • Inspection only; does not verify trust chains or revocation.
  • Does not fetch OCSP/CRL or validate SANs/CNs.

Tips

  • Paste only public certs; avoid private keys here
  • For full chain validation, use openssl or a TLS checker

Examples

Valid cert

  • BEGIN/END markers present; parse to show subject/issuer/notBefore/notAfter

Missing markers

  • No BEGIN/END -> Invalid

Deep dive

This X.509 inspector parses PEM certificates in your browser to show subject, issuer, and validity dates without uploading data.

Use it to sanity-check certs from support tickets or config files; rely on full TLS tools for trust and revocation.

FAQs

Is my cert uploaded?
No. Parsing happens locally and clears on refresh.

Related validators

All parsing happens in your browser. No data is sent, logged, or stored.

Inspection only; does not verify trust chains or revocation.