You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
What can be improved?
I'm able to add a self-signed certificate to iOS settings, so that Safari accepts it, but the same certificate won't be accepted by KeePassium.
The solution you'd like
Any of this would work:
Accept self-signed certificates (or add a toggle for that) that are trusted by the OS.
Show the invalid certificate and allow white-listing this specific certificate.
Allow selecting a pem file that matches the one used by the WebDAV server.
Additional context
I configured a WebDAV server on a PC on my local network, and would like to configure my other devices to sync with this WebDAV server, so I don't have to rely on any cloud storage. This works fine, but I would need to have a valid certificate. Trusting any certificate would be the same as dropping the SSL (some man in the middle could use a different certificate and act as a proxy), and I would like to be able to sync my DB on networks other than my own.
The text was updated successfully, but these errors were encountered:
Unfortunately, if I understand it well, this does not import the certificate to Keepassium's keystore. Keepassium needs to have a special feature to import certificates to its keystore and provide them when a server asks for them. Of course, you can do it as described here, but to my knowledge, this only makes them available in Safari/Mail or Apple apps. So synchronisation from Keepassium does not work.
What can be improved?
I'm able to add a self-signed certificate to iOS settings, so that Safari accepts it, but the same certificate won't be accepted by KeePassium.
The solution you'd like
Any of this would work:
Additional context
I configured a WebDAV server on a PC on my local network, and would like to configure my other devices to sync with this WebDAV server, so I don't have to rely on any cloud storage. This works fine, but I would need to have a valid certificate. Trusting any certificate would be the same as dropping the SSL (some man in the middle could use a different certificate and act as a proxy), and I would like to be able to sync my DB on networks other than my own.
The text was updated successfully, but these errors were encountered: