Skip to main content
Solved

httpcallser CA certificate

  • July 5, 2019
  • 3 replies
  • 112 views

Just want to confirm when the Windows version of FME Desktop 2019.0 sends https connections from httpcaller, does it use the Windows Certificate Store or the CA Root Certificates from Mozilla?

I have the impression that the Windows version is using the Windows Certificate Store. However, I saw the message "added 135 certificate(s) from CA file 'C:\\Program Files\\FME\\ssl/cacert.pem'"

 

Thanks,

 

Best answer by nampreetatsafe

Hi @jingking! This is honestly not my expertise, but I was able to put together some information from my fellow Safers to hopefully answer your question.

On Windows machines, the HTTPCaller uses Windows Certificate Store. This means that you can add your own certificates (including CA Root Certificates) to the store and HTTPCaller will use them.

CA Roots Certificates are provided by Mozilla, and libcurl checks these as well. However, we are considering disabling them on Windows as FME should probably only rely on the OS provided certificate storage.

I hope this helps.

This post is closed to further activity.
It may be an old question, an answered question, an implemented idea, or a notification-only post.
Please check post dates before relying on any information in a question or answer.
For follow-up or related questions, please post a new question or idea.
If there is a genuine update to be made, please contact us and request that the post is reopened.

3 replies

nampreetatsafe
Safer
Forum|alt.badge.img+13
  • Safer
  • 383 replies
  • Best Answer
  • July 9, 2019

Hi @jingking! This is honestly not my expertise, but I was able to put together some information from my fellow Safers to hopefully answer your question.

On Windows machines, the HTTPCaller uses Windows Certificate Store. This means that you can add your own certificates (including CA Root Certificates) to the store and HTTPCaller will use them.

CA Roots Certificates are provided by Mozilla, and libcurl checks these as well. However, we are considering disabling them on Windows as FME should probably only rely on the OS provided certificate storage.

I hope this helps.


nampreetatsafe
Safer
Forum|alt.badge.img+13

Hi @jingking! This is honestly not my expertise, but I was able to put together some information from my fellow Safers to hopefully answer your question.

On Windows machines, the HTTPCaller uses Windows Certificate Store. This means that you can add your own certificates (including CA Root Certificates) to the store and HTTPCaller will use them.

CA Roots Certificates are provided by Mozilla, and libcurl checks these as well. However, we are considering disabling them on Windows as FME should probably only rely on the OS provided certificate storage.

I hope this helps.

FYI: The Mozilla Certificate package on Windows will be disabled by about FME 2019.1.1 as it was causing other issues (i.e. https://knowledge.safe.com/questions/94899/issues-with-mitm-proxy.html).


  • Author
  • 2 replies
  • July 22, 2019

FYI: The Mozilla Certificate package on Windows will be disabled by about FME 2019.1.1 as it was causing other issues (i.e. https://knowledge.safe.com/questions/94899/issues-with-mitm-proxy.html).

Thanks! That's make sense. I have to disable the SSL certificate check when using 2019.0.