Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

Configure Secure TLS Communication Between SCP and Cloud Proxy

You can enable server certificate validation at the Client Proxy for the TLS layer. This setup introduces two levels of authentication.

Layer Authentication (TLS connection between Client Proxy and Proxy)

The TLS termination at the Point of Presence (PoP)—using HAProxy or SWG—can be configured in two ways:

Common Server Certificate

Configure a shared server certificate for all tenants, for example, secure-mcp.example.cf.com. Skyhigh servers use predefined certificates that are trusted by major Certificate Authorities (CAs). This configuration simplifies setup and removes the need for tenant-specific certificate management. If any changes are required to certificate attributes, update them in the Unified Cloud Edge (UCE) portal.

Tenant Specific Server certificate

Configure your own certificate and private key signed by a trusted CA—for example, c123456.secure-mcp.example.cf.com.
This option gives you complete control over certificate and key management for the TLS layer. The TLS termination identifies your tenant through the Server Name Indication (SNI) extension sent by the Client Proxy.

This setup requires additional UI and back-end logic to replicate certificate access for TLS termination across all PoP clusters. If you prefer to manage your own certificates, submit the configuration as a Feature Modification Request (FMR).

Client Proxy - Server Certificate Verification and Actions

The Client Proxy validates the server certificate it receives during the TLS handshake.

To maintain compatibility with SSL inspection devices and captive portal environments, the Client Proxy supports the following validation methods:

Validation Trust Chain (Skyhigh-issued certificates)

The Client Proxy verifies the certificate using Skyhigh ’s predefined trust chain. This option provides strong data security but may cause interoperability issues in complex network environments.

Validation Against Trusted CA List

The Client Proxy validates certificates against trusted CAs in the device’s trust store, which includes common root CAs. You can use either public or private CA-signed certificates to manage traffic between devices and enterprise-managed trust stores. This approach provides a balanced and interoperable trust model that works reliably in most environments.

NOTE: Admins must ensure that the latest Sectigo root CAs are installed for the Secure Channel to function correctly.

Handling Validation Failures

When certificate validation fails, it may indicate that an intermediate proxy is intercepting the traffic. You can configure how the Client Proxy responds:

  • Allow – Establish a secure channel and continue traffic.
  • Block – Prevent the secure channel from being created until the user connects.

Configure these options in the Client Proxy Management UI to define how the system responds to certificate validation failures.


clipboard_e471b37cf6de3f21a9ca436d28a443cb4.png

  • Was this article helpful?