PEM Viewer

Inspect and analyze PEM certificate files, private keys, and certificate signing requests.

About This Tool

How It Works

  • Parses PEM-encoded certificate files and extracts information
  • Identifies different types of PEM blocks (certificates, keys, CSRs)
  • Validates base64 encoding and structure
  • Organizes content by type for easy viewing

Common Use Cases

  • Inspecting SSL certificate files
  • Validating PEM file structure and encoding
  • Extracting specific certificates from certificate bundles
  • Verifying certificate signing requests (CSRs)

Frequently Asked Questions

What is a PEM file?

PEM (Privacy-Enhanced Mail) is a file format used to store and send cryptographic keys, certificates, and other data. It uses base64 encoding and is wrapped with "-----BEGIN" and "-----END" headers.

What types of data can this tool analyze?

The PEM Viewer can analyze SSL certificates, private keys (RSA, EC, DSA), public keys, certificate signing requests (CSRs), and other PEM-encoded data blocks.

Is my PEM data secure when using this tool?

Yes, absolutely. All PEM parsing and analysis happens entirely in your browser. No data is transmitted to any servers, ensuring your certificates and private keys remain completely private.

Can I analyze certificate bundles or chains?

Yes, you can paste multiple PEM blocks (certificate chains/bundles) and the tool will automatically separate and categorize each certificate, key, or CSR found in the data.

What information does the tool extract from certificates?

The tool provides basic information about each PEM block including the type, size, and validates the base64 encoding. For detailed certificate information like subject, issuer, and expiration dates, you may need specialized certificate analysis tools.

Why am I getting "Invalid base64 content" errors?

This error occurs when the PEM data contains invalid base64 characters or formatting. Ensure your PEM data is properly formatted with correct BEGIN/END headers and valid base64 content between them.

Can I view the raw PEM data for each block?

Yes, each analyzed PEM block includes an expandable "View Raw PEM Block" section where you can see the original PEM-formatted data and copy it to your clipboard.

What's the difference between certificates, private keys, and CSRs?

Certificates contain public keys and identity information signed by a Certificate Authority. Private keys are used for encryption/decryption and digital signing. CSRs (Certificate Signing Requests) are requests sent to CAs to obtain certificates.

Can I analyze encrypted private keys?

The tool can identify encrypted private key blocks, but it cannot decrypt them. It will show the structure and validate the PEM format, but the actual key content will remain encrypted.

What file formats are supported?

The tool supports any text containing PEM-formatted data. This includes .pem, .crt, .cer, .key, .csr files, or any text content with valid PEM blocks regardless of file extension.

How do I copy specific certificates from a bundle?

Each PEM block has a "Copy Block" button that copies just that specific certificate, key, or CSR to your clipboard. This is useful for extracting individual items from certificate bundles.

What should I do if no PEM blocks are found?

Ensure your data contains valid PEM headers like "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----". The tool looks for these markers to identify PEM blocks. Check that the data isn't corrupted or missing headers.

Share this page