Related
breakdown I am trying to establish a TLS connection using a self signed server certificate. I generated the certificate using the following sample code : http://golang.org/src/pkg/crypto/tls/generate_cert.go My relevant client code looks like this: // server c
gngrwzrd I spent a while trying to get it to work. I have an API to connect to and I'm trying to switch to SSL with a self-signed certificate. I can control the server and the application. I generated a self-signed certificate based on this: https://kyup.com/t
gngrwzrd I spent a while trying to get it to work. I have an API to connect to and I'm trying to switch to SSL with a self-signed certificate. I can control the server and the application. I generated a self-signed certificate based on this: https://kyup.com/t
j I'm trying to get a Spring-Boot server up and running, which provides some security over SSL. I followed steps 1 and 2 of this guide to get a self-signed certificate and was able to access my website via . This looks like this:httpsapplication.properties ser
give him the cd I'm trying to setup a self-signed SSL certificate for an IOS app with a REST backend. My question is when should I use [securityPolicy setAllowInvalidCertificates:YES]; when to use self-signed certificates? No and don't have a trusted certifica
Zapp I am trying to establish a TLS connection using a self signed server certificate. I generated the certificate using the following sample code : http://golang.org/src/pkg/crypto/tls/generate_cert.go My relevant client code looks like this: // server cert i
winter soldier my machine localhost image I've created a self-signed Apache certificate for localhost, but I'm getting a red https (insecure connection). How can I make it green https. Bellagose You're using a self-signed certificate, so by default browsers wo
Jawad-Dev: I am working on a solution for file encryption via a combination of RSA and AES. RSA is basically used here for a handshake to encrypt a symmetric key and decrypt with the key pair at the receiver side. I have used Java keystore for private key and
Jawad-Dev: I am working on a solution for file encryption via a combination of RSA and AES. RSA is basically used here for a handshake to encrypt a symmetric key and decrypt with the key pair at the receiver side. I have used Java keystore for private key and
breakdown I am trying to establish a TLS connection using a self signed server certificate. I generated the certificate using the following sample code : http://golang.org/src/pkg/crypto/tls/generate_cert.go My relevant client code looks like this: // server c
Abdul Qayyum I can use a self signed certificate created with openssl. The only problem I'm having with certificates HttpsURLConnectionis the HostnameVerifier. If I provide my own HostnameVerifier it always return truelooks like this: HostnameVerifier hostname
gngrwzrd I spent a while trying to get it to work. I have an API to connect to and I'm trying to switch to SSL with a self-signed certificate. I can control the server and the application. I generated a self-signed certificate based on this: https://kyup.com/t
juncaks I am building a website with backend/frontend separation. Currently, the website is hosted on a Kubernetes cluster at my home. There is one pod in the frontend and another in the backend. These pods can be accessed through Traefic. I have internal DNS
Graham Dodgson Updated to the latest version of composer. We've been hosting our package repository on http for years without any issues, but now, composer says it needs to be connected via https. I can fix this by putting the following: "secure-http": fal
Miyamoto Usagi The following code works to download the file, but it doesn't work if the server has a self-signed certificate: DWORD errCode = 0;
HINTERNET intOpenHandle = InternetOpen("Snippet", LOCAL_INTERNET_ACCESS, NULL, 0, 0);
errCode = GetLastError();
if
gngrwzrd I spent a while trying to get it to work. I have an API to connect to and I'm trying to switch to SSL with a self-signed certificate. I can control the server and the application. I generated a self-signed certificate based on this: https://kyup.com/t
j I'm trying to get a Spring-Boot server up and running, which provides some security over SSL. I followed steps 1 and 2 of this guide to get a self-signed certificate and was able to access my website via . This looks like this:httpsapplication.properties ser
j I'm trying to get a Spring-Boot server up and running, which provides some security over SSL. I followed steps 1 and 2 of this guide to get a self-signed certificate and was able to access my website via . This looks like this:httpsapplication.properties ser
Strike08 I am using com.ibm.websphere.management.AdminClient in my program to connect to multiple DMGRs. The problem is that these servers all use self-signed certificates. Is there any way to force AdminClient to accept self-signed certificates, anyway? Barba
Duncan https://cordova.apache.org/docs/en/8.x/guide/appdev/security/index.html mentions The reason is that accepting a self-signed certificate bypasses certificate chain verification, making the device think any server certificate is valid. Does this mean that
j2abro I want to bypass certificate verification using Alamofire 5 and Swift 4 . I am using Alamofire to connect to a server with a self signed certificate. This is similar to the question Alamofire with Self-Signed Certificate/ServerTrustPolicy , but the answ
winter soldier my machine localhost image I've created a self-signed Apache certificate for localhost, but I'm getting a red https (insecure connection). How can I make it green https. Bellagose You're using a self-signed certificate, so by default browsers wo
Michael 67 I have a server with a self signed certificate. I want to connect device to server via https form. I heard I had to accept this connection. but I do not know. I have a self signed certificate as it is a test server. But I want to access it in https
Michael 67 I have a server with a self signed certificate. I want to connect device to server via https form. I heard I had to accept this connection. but I do not know. I have a self signed certificate as it is a test server. But I want to access it in https
gngrwzrd I spent a while trying to get it to work. I have an API to connect to and I'm trying to switch to SSL with a self-signed certificate. I can control the server and the application. I generated a self-signed certificate based on this: https://kyup.com/t
gngrwzrd I spent a while trying to get it to work. I have an API to connect to and I'm trying to switch to SSL with a self-signed certificate. I can control the server and the application. I generated a self-signed certificate based on this: https://kyup.com/t
Duncan https://cordova.apache.org/docs/en/8.x/guide/appdev/security/index.html mentions The reason is that accepting a self-signed certificate bypasses certificate chain verification, making the device think any server certificate is valid. Does this mean that
u Using the library asi-http-request , I have imported the certificate (.der) into the resource bundle and want to make https connections only to servers that provide a self-signed certificate. How can I do this? I don't want to just disable setValidatesSecure
Michael 67 I have a server with a self signed certificate. I want to connect device to server via https form. I heard I had to accept this connection. but I do not know. I have a self signed certificate as it is a test server. But I want to access it in https