Generate complete PKI certificate chains for testing - Root CA, Intermediate CA, and Server Certificates
Enter a hostname and click "Generate CA Authority" to create your certificate chain
Every coffee helps keep the servers running. Every book sale funds the next tool I'm dreaming up. You're not just supporting a site — you're helping me build what developers actually need.
Public Key Infrastructure (PKI) is a comprehensive framework that manages digital certificates and public-key encryption. It provides the foundation for secure communication, authentication, and data integrity across the internet. PKI enables organizations to:
The trusted entity that issues and manages digital certificates. CAs verify the identity of certificate requesters before issuing certificates.
Acts as an intermediary between users and the CA. The RA verifies the identity of entities requesting certificates.
An electronic document that binds a public key to an identity. Contains:
Mechanisms to invalidate certificates before expiration:
PKI uses a hierarchical trust model where trust flows from the Root CA down to end-entity certificates:
When a client (browser) connects to a server over HTTPS, this validation process occurs:
Server presents its certificate and the intermediate CA certificate chain
Client builds a chain from server cert up to a trusted Root CA in its trust store
Verify signatures, validity dates, hostname match, and revocation status
If all checks pass, TLS handshake completes and encrypted session begins
| Check | What It Verifies |
|---|---|
| Signature | Certificate was signed by the claimed issuer |
| Validity Period | Current date is within notBefore and notAfter |
| Chain of Trust | Chain leads to a trusted Root CA |
| Hostname | Certificate CN or SAN matches requested domain |
| Revocation | Certificate has not been revoked (CRL/OCSP) |
| Key Usage | Certificate is authorized for its intended use |
Basic validation - only proves domain ownership
Verifies organization identity and domain ownership
Strictest validation - thorough business verification
| Extension | Format | Description |
|---|---|---|
.pem |
Base64 (ASCII) | Privacy-Enhanced Mail format. Base64 encoded with BEGIN/END markers. Most common format. |
.crt, .cer |
Base64 or DER | Certificate files. Can be either PEM or DER encoded. |
.der |
Binary | Distinguished Encoding Rules format. Binary encoded certificates. |
.key |
Base64 (ASCII) | Private key files in PEM format. |
.p12, .pfx |
Binary | PKCS#12 format. Contains certificate and private key, password protected. |
.p7b, .p7c |
Base64 or Binary | PKCS#7 format. Contains certificates and chain, no private keys. |
openssl x509 -in certificate.crt -text -noout
openssl verify -CAfile root-ca.crt -untrusted intermediate-ca.crt server.crt
openssl x509 -in cert.pem -outform DER -out cert.der
openssl pkcs12 -export -out bundle.p12 \
-inkey server.key -in server.crt \
-certfile intermediate-ca.crt
openssl x509 -noout -modulus -in server.crt | md5
openssl rsa -noout -modulus -in server.key | md5