property IgnoreServerCertificateInsecurity: boolean; default False;

 

Description

Determines whether a server certificate signature security will be checked during the TLS/SSL handshake when starting a new session.

Set IgnoreServerCertificateInsecurity to True, in order for the client to ignore the certificate signature security. Set IgnoreServerCertificateInsecurity to False, in order for the client to check the certificate signature security.

In case if a hash algorithm for signing the certificate is set to one of following algorithms: [haNone, haSHA1, haMD5, haMD4, haMD2], - signature is considered insecured, and therefore, the TLS server is considered invalid, and the session is closed.

The default value is False.

 

See also

IgnoreServerCertificateConstraints

IgnoreServerCertificateValidity

TrustServerCertificate

TScSSLClient.ClientHelloExtensions

 

SecureBridge Components, Copyright © 2007-2024 Devart. All Rights Reserved. Provide Feedback Visit Forum Request Support