Domain Pinning & Trust
Domain Pinning and Trust allows for the restricted use of certificates and public keys to be bound to specific domains. This allows for the support and use of private certificates and certificate authorities, or to validate the exact certificates matches expected from an app end point.
Configurations | Description |
---|---|
Add Domain |
|
Domain List |
|
Certificates |
|
| |
Public Keys |
|
Public Key Options
|
Pinning and Trust FAQ’s
Q. Why would I use a Public Key?
A. Using the Public Key of a certificate allows for the app to trust the identity certificate presented from the app endpoint even if it has been replaced or updated. This trust remains valid as long as the identity certificate was created from the same issuing certificate that matches the registered public key. For example, you have an identity certificate on a server that the app calls to and you have pinned it’s public key. If that server identity certificate is replaced due to expiration or for other reasons, the app will not need to be re-integrated with the new identity certificate because of pinning the certificate to itself.
Q. Why should I chain a certificate?
A. Chaining a certificate should be used if your app is leveraging a server that has identity certificates issued from non-public Certificate Authorities. For example, if your organization uses an internal Microsoft or other Certificate Authority, any connection to endpoints utilizing certificates created by those CA’s will fail due to the root certificates not being present in the mobile devices trust store.
To include the use of private CA’s root or issuing Certificate for all of the app traffic calls, add those certificates via the Global Trust Feature.
Q. Why would I choose to use the override option?
A. Using the override option will allow the app’s http(s) connection to succeed even if the certificate presented by the endpoint has failed verification. Failed verification can be caused by an expired certificate, mismatched common name, missing DNS value in the Subject Alt Name, etc.
The override feature is generally used for testing purposes or when apps need a temporarily connect to a server until the failing certificate can be replaced.
Q. When do I use Pin and Trust together?
A. Using the Trust without the Pin option is essentially used for a private issuing certificate that is adding an additional trust for that domain or subdomain. If you also include the Pin Option with Trust, then the end point must present the exact domain certificate that is pinned to pass validation.
If you pin the private issuing certificate, then the domain or subdomains MUST have this issuing private CA cert in the chain.