Home/Tools/Security/Certificate CSR Generator & Format Converter

Certificate CSR Generator & Format Converter

Generate CSRs, convert between PEM/DER/PFX/P7B formats, and verify certificate chains - 100% client-side

100% Private - Runs Entirely in Your Browser
No data is sent to any server. All processing happens locally on your device.
Loading Certificate CSR Generator & Format Converter...

Choose certificate operation

Loading interactive tool...

Need Professional Security Testing?

Our penetration testers find vulnerabilities before attackers do. Get a comprehensive security assessment.

What Is a Certificate Signing Request (CSR)

A Certificate Signing Request (CSR) is a block of encoded text containing the public key and identifying information (domain name, organization, location) that an organization submits to a Certificate Authority (CA) to apply for an SSL/TLS certificate. The CSR is generated on the same server where the certificate will be installed, ensuring the private key never leaves the server.

Generating a properly formatted CSR is the first step in obtaining any SSL/TLS certificate — whether from Let's Encrypt, DigiCert, Comodo, or any other CA. Incorrect CSR generation is a common source of certificate issuance delays and errors.

CSR Contents

FieldOIDRequiredExample
Common Name (CN)2.5.4.3Yeswww.example.com
Organization (O)2.5.4.10For OV/EVExample Corp
Organizational Unit (OU)2.5.4.11OptionalIT Department
Locality (L)2.5.4.7For OV/EVSan Francisco
State (ST)2.5.4.8For OV/EVCalifornia
Country (C)2.5.4.6For OV/EVUS
Email1.2.840.113549.1.9.1Optional[email protected]
SAN2.5.29.17RecommendedDNS:example.com, DNS:*.example.com

Certificate Types

TypeValidationTrust LevelIssuance Time
DV (Domain Validation)Domain ownership onlyBasic (lock icon)Minutes
OV (Organization Validation)Domain + organization verifiedMedium (org name visible)1-3 days
EV (Extended Validation)Thorough organization vettingHighest (org name in certificate)1-2 weeks

Common Use Cases

  • SSL/TLS certificate procurement: Generate the CSR required to purchase or request a certificate from any Certificate Authority
  • Certificate renewal: Generate a new CSR when renewing certificates, especially when changing key algorithms or adding SANs
  • Wildcard certificate requests: Create CSRs for wildcard certificates (*.example.com) covering all subdomains
  • Multi-SAN certificates: Generate CSRs with Subject Alternative Names to cover multiple domains in a single certificate
  • Internal PKI: Generate CSRs for internal certificate authorities used in enterprise environments

Best Practices

  1. Use RSA-2048 or ECDSA P-256 minimum — RSA-2048 is the minimum acceptable key size. ECDSA P-256 (or P-384) provides equivalent security with smaller keys and faster operations.
  2. Include all SANs — Modern browsers check the Subject Alternative Name extension, not the Common Name. Include all hostnames and domain variations in the SAN field.
  3. Generate a new key pair for each CSR — Don't reuse private keys across certificate renewals. Generate a fresh key pair each time to limit the impact of key compromise.
  4. Protect the private key — The private key generated alongside the CSR must be protected. Set appropriate file permissions (600) and never share or transmit it.
  5. Verify the CSR before submitting — Use this tool or OpenSSL (openssl req -verify -in request.csr) to confirm the CSR contains correct information before submitting to the CA.

ℹ️ Disclaimer

This tool is provided for informational and educational purposes only. All processing happens entirely in your browser - no data is sent to or stored on our servers. While we strive for accuracy, we make no warranties about the completeness or reliability of results. Use at your own discretion.