You know, this reminds me of the time I had to deal with a legacy application that used a hardcoded SSL certificate. Talk about a nightmare! I ended up just throwing the whole thing in the trash and starting over. But I digress, I think the best solution here is to add an exception to the steering config.
Blocking the traffic with pinned certificates is just going to cause a lot of headaches for the end users. Why not just allow the domains in an inline policy? That way, we can still inspect the traffic and maintain control without disrupting the applications.
I disagree. I think the best approach is to add the domains used by the certificate-pinned applications to the authentication bypass list. That way, we don't have to worry about the pinned certificates at all, and the traffic can flow freely.
This is a tricky one. The correct answer really depends on how the organization wants to handle certificate-pinned traffic. Personally, I think adding an exception to the steering configuration makes the most sense, as it allows the traffic to flow while still maintaining security controls.
Noah
10 months agoChanel
10 months agoIsadora
10 months agoMartin
11 months agoRose
11 months agoSlyvia
11 months agoHildred
1 years agoJeniffer
1 years agoRoxanne
1 years agoSantos
1 years agoJerry
11 months agoBrittni
12 months agoVi
12 months agoMarjory
12 months agoJohnna
12 months agoMadonna
12 months agoKarma
12 months ago