property IgnoreClientCertificateInsecurity: boolean; default False;

 

Description

Determines whether the signature security of the client certificate will be verified during the TLS/SSL handshake when starting a new session.

Set IgnoreClientCertificateInsecurity to True to make the server ignore the client certificate signature security.

Set IgnoreClientCertificateInsecurity to False to make the server verify the signature security of the client certificate.

If the hash algorithm for signing the certificate is set to one of following: [haNone, haSHA1, haMD5, haMD4, haMD2],— the signature is considered insecure. Thus, the TLS client is considered invalid, and the session is closed.

The default value is False.

 

See Also

IgnoreClientCertificateConstraints

IgnoreClientCertificateValidity

IsClientCertificateRequired

 

SecureBridge Components, Copyright © 2007-2024 Devart. All Rights Reserved. Provide Feedback Visit Forum Request Support