ARTIFACTORY: Why Applications Require the Use of Trusted Certificates and How to Work with Them
Every application that needs to establish asecureconnection to your network requires acertificate check. There are several ways to approach this matter:
- Your IT administrator(s) maypusha given certificate toallthe machines in your network, thus allowing that certificate to be trusted by all of them. This is a common practice in enterprise networks. One way to do this is through the use of aGroup Policythat pushes certificates to a trustedkey storeon each machine. More information is availableHERE.
- Another option is to use certificates issued by a well-knowncertificate authority(e.g., Symantec, GoDaddy). By default, these will betrustedby most modern applications (browsers, Java, etc.). As such, these certificates won’t require you to take any manual trust action before your system will permit the use of a given application.
- You may also choose tobypassthe SSL check, which some applications allow. For example, a Docker client will permit you to do this through the use of its–insecure-registryoption. You’ll need to consult the documentation for each of your applications to see if SSL validation bypass is or isn’t an option.