Certificate Authority Generator Online - Free | 8gwifi.org

Certificate Authority Generator Online

Generate complete PKI certificate chains for testing - Root CA, Intermediate CA, and Server Certificates

By Anish Nath - Security Engineer & Cryptography Expert | @anish2good | Last Updated: January 23, 2025 | 4.8/5 (892 reviews)
Privacy-First No Data Stored 100% Free
Generate Test CA
Please enter a valid hostname.
Enter the hostname for your server certificate (alphanumeric, dots, spaces only)
Output will appear here

Enter a hostname and click "Generate CA Authority" to create your certificate chain

Certificates for:
Server Certificate
Intermediate CA
Root CA

Support This Free Tool

Every coffee helps keep the servers running. Every book sale funds the next tool I'm dreaming up. You're not just supporting a site — you're helping me build what developers actually need.

500K+ users
200+ tools
100% private
Privacy Guarantee: Private keys you enter or generate are never stored on our servers. All tools are served over HTTPS.

Understanding Public Key Infrastructure (PKI)

What is PKI?

Public Key Infrastructure (PKI) is a comprehensive framework that manages digital certificates and public-key encryption. It provides the foundation for secure communication, authentication, and data integrity across the internet. PKI enables organizations to:

Encrypt Data
Protect sensitive information in transit
Authenticate Identity
Verify users, servers, and devices
Digital Signatures
Ensure data integrity and non-repudiation

Core PKI Components

Certificate Authority (CA)

The trusted entity that issues and manages digital certificates. CAs verify the identity of certificate requesters before issuing certificates.

  • Root CA: Top of trust hierarchy, self-signed
  • Intermediate CA: Issues end-entity certificates
  • Issuing CA: Day-to-day certificate operations
Registration Authority (RA)

Acts as an intermediary between users and the CA. The RA verifies the identity of entities requesting certificates.

  • Validates identity documents
  • Approves or rejects certificate requests
  • Handles certificate revocation requests
Digital Certificate (X.509)

An electronic document that binds a public key to an identity. Contains:

  • Subject name (who the cert belongs to)
  • Public key
  • Issuer name (CA that signed it)
  • Validity period (not before/not after)
  • Serial number and extensions
Revocation Services

Mechanisms to invalidate certificates before expiration:

  • CRL: Certificate Revocation List - periodic list of revoked certs
  • OCSP: Online Certificate Status Protocol - real-time status check
  • OCSP Stapling: Server provides OCSP response with cert

Certificate Trust Hierarchy

PKI uses a hierarchical trust model where trust flows from the Root CA down to end-entity certificates:

Root CA
Self-signed | Offline | 20+ years validity
Signs
Intermediate CA
Signed by Root | Online | 10-15 years validity
Signs
Server Cert 1-2 years
Client Cert 1-2 years
Code Signing 1-3 years

How Certificate Validation Works

When a client (browser) connects to a server over HTTPS, this validation process occurs:

1
Server Sends Certificate

Server presents its certificate and the intermediate CA certificate chain

2
Chain Building

Client builds a chain from server cert up to a trusted Root CA in its trust store

3
Validation Checks

Verify signatures, validity dates, hostname match, and revocation status

4
Secure Connection

If all checks pass, TLS handshake completes and encrypted session begins


Certificate Validation Checks
CheckWhat It Verifies
SignatureCertificate was signed by the claimed issuer
Validity PeriodCurrent date is within notBefore and notAfter
Chain of TrustChain leads to a trusted Root CA
HostnameCertificate CN or SAN matches requested domain
RevocationCertificate has not been revoked (CRL/OCSP)
Key UsageCertificate is authorized for its intended use
Common Certificate Errors
ERR_CERT_AUTHORITY_INVALID
Root CA not in browser's trust store
ERR_CERT_DATE_INVALID
Certificate expired or not yet valid
ERR_CERT_COMMON_NAME_INVALID
Certificate doesn't match the domain
ERR_CERT_REVOKED
Certificate has been revoked by the CA

Types of SSL/TLS Certificates

Domain Validated (DV)

Basic validation - only proves domain ownership

  • Issued in minutes
  • Lowest cost (often free)
  • Good for: blogs, personal sites
  • Example: Let's Encrypt
Organization Validated (OV)

Verifies organization identity and domain ownership

  • Issued in 1-3 days
  • Moderate cost
  • Good for: business websites
  • Shows org name in cert details
Extended Validation (EV)

Strictest validation - thorough business verification

  • Issued in 1-2 weeks
  • Highest cost
  • Good for: e-commerce, banking
  • Highest trust level

PKI Best Practices - DO
  • Keep Root CA offline in an air-gapped system
  • Use strong key sizes (RSA 2048+ or ECC P-256+)
  • Implement certificate monitoring and alerting
  • Automate certificate renewal (ACME protocol)
  • Use Certificate Transparency logs
  • Implement HSTS and certificate pinning where appropriate
PKI Pitfalls - DON'T
  • Use self-signed certs in production
  • Share private keys between servers
  • Disable certificate validation in code
  • Use weak algorithms (MD5, SHA-1, RSA 1024)
  • Ignore certificate expiration warnings
  • Store private keys in version control

Certificate File Extensions Reference

Extension Format Description
.pem Base64 (ASCII) Privacy-Enhanced Mail format. Base64 encoded with BEGIN/END markers. Most common format.
.crt, .cer Base64 or DER Certificate files. Can be either PEM or DER encoded.
.der Binary Distinguished Encoding Rules format. Binary encoded certificates.
.key Base64 (ASCII) Private key files in PEM format.
.p12, .pfx Binary PKCS#12 format. Contains certificate and private key, password protected.
.p7b, .p7c Base64 or Binary PKCS#7 format. Contains certificates and chain, no private keys.

Useful OpenSSL Commands

View Certificate Details
openssl x509 -in certificate.crt -text -noout
Verify Certificate Chain
openssl verify -CAfile root-ca.crt -untrusted intermediate-ca.crt server.crt
Convert PEM to DER
openssl x509 -in cert.pem -outform DER -out cert.der
Create PKCS#12 Bundle
openssl pkcs12 -export -out bundle.p12 \
  -inkey server.key -in server.crt \
  -certfile intermediate-ca.crt
Check Private Key Matches Certificate
openssl x509 -noout -modulus -in server.crt | md5
openssl rsa -noout -modulus -in server.key | md5