Every application that needs to establish a secure connection to your network requires a certificate check. There are several ways to approach this matter:
- Your IT administrator(s) may push a given certificate to all the machines in your network, thus allowing that certificate to be trusted by all of them. This is a common practice in enterprise networks. One way to do this is through the use of a Group Policy that pushes certificates to a trusted key store on each machine. More information is available HERE.
- Another option is to use certificates issued by a well-known certificate authority (e.g., Symantec, GoDaddy). By default, these will be trusted by most modern applications (browsers, Java, etc.). As such, these certificates won’t require you to take any manual trust action before your system will permit the use of a given application.
- You may also choose to bypass the SSL check, which some applications allow. For example, a Docker client will permit you to do this through the use of its –insecure-registry option. You’ll need to consult the documentation for each of your applications to see if SSL validation bypass is or isn’t an option.