{{ csr.trim() }}
Certificate Signing Requests (CSRs) bundle a public key with identifying details and a proof-of-possession signature. Certification authorities examine the request before issuing an X.509 certificate that browsers and servers can trust.
This decoder lets you drop or paste a PEM-encoded CSR and, through an in-browser reactive engine, instantly reveal the subject common-name, key details, signature algorithm, and any Subject Alternative Names. All processing occurs locally for security and speed.
Typical use: confirm that an automated build pipeline generated a 4096-bit RSA request for api.example.com
before forwarding it for signing. Always ensure you have permission to inspect third-party CSRs.
Under Public-Key Infrastructure, a CSR encapsulates an ASN.1 sequence that holds the requester’s distinguished name, public key, optional extensions, and a signature created with the corresponding private key. Verifying the signature confirms key ownership; parsing the structure exposes metadata crucial for policy checks.
BEGIN/END CERTIFICATE REQUEST
markers if missing.CertificationRequestInfo
.extensionRequest
attribute and enumerate any subjectAltName
entries.Field | Meaning |
---|---|
Subject CN | Primary hostname or identity bound to the certificate. |
Key Algorithm | Cryptosystem of the public key (e.g. RSA, ECDSA). |
Key Size (bits) | Strength indicator; higher usually means better brute-force resistance. |
Signature Alg. | Algorithm and hash used to sign the CSR. |
Subject Alt Names | Additional hostnames or IPs validated by the certificate. |
Values guide certificate policy checks and can reveal mismatches—such as a small key size on a security-critical domain.
sha256WithRSAEncryption
).Example (truncated):
subjectAltName
extension.Concept aligns with RFC 2986 (PKCS #10) and X.509 specification. Verification logic reflects commonly accepted PKI practices.
All decoding occurs in the browser; no CSR leaves the user’s device, supporting GDPR data-minimisation principles.
Follow these steps to extract CSR details quickly.
No, everything runs in your browser; the CSR never leaves your device.
Any PEM-encoded PKCS #10 CSR, with or without header lines.
The signature cannot be validated if the CSR was modified, corrupted, or created with an unsupported algorithm.
No, encrypted or password-protected requests must be decrypted first.
Compare the extracted list with the domains you intend to secure; mismatches indicate a faulty request.