+ PEM formatted CA certificate
+ please check splunk doc
+
How to self-sign certificates
+ the "HTTP Input Host" field should match certificate's common name or one of the subject alternative names.
+ splunk default CA certificate is $SPLUNK_HOME/auth/cacert.pem, please only copy certificate from section
+ "-----BEGIN CERTIFICATE-----" to "-----END CERTIFICATE-----"
+ To verify CA using curl command
+
+ curl --cacert $SPLUNK_HOME/auth/cacert.pem https://host:port/services/collector/health
+
+
\ No newline at end of file
diff --git a/splunk-devops/src/main/resources/com/splunk/splunkjenkins/SplunkJenkinsInstallation/help-verifyCertificate.html b/splunk-devops/src/main/resources/com/splunk/splunkjenkins/SplunkJenkinsInstallation/help-verifyCertificate.html
new file mode 100644
index 00000000..82db69d6
--- /dev/null
+++ b/splunk-devops/src/main/resources/com/splunk/splunkjenkins/SplunkJenkinsInstallation/help-verifyCertificate.html
@@ -0,0 +1,3 @@
+
+ If checked, server certificate will be verified using system default trusted certificates and custom certificate if provided
+
\ No newline at end of file
diff --git a/splunk-devops/src/test/java/com/splunk/splunkjenkins/SplunkConfigUtil.java b/splunk-devops/src/test/java/com/splunk/splunkjenkins/SplunkConfigUtil.java
index d9856dd1..57adbfe8 100644
--- a/splunk-devops/src/test/java/com/splunk/splunkjenkins/SplunkConfigUtil.java
+++ b/splunk-devops/src/test/java/com/splunk/splunkjenkins/SplunkConfigUtil.java
@@ -124,6 +124,7 @@ public static boolean setupSender(String host, String token) {
config.setHost(host);
config.setPort(8088);
config.setUseSSL(true);
+ config.setVerifyCertificate(false);
config.setToken(token);
config.setRawEventEnabled(true);
config.setEnabled(true);
diff --git a/splunk-devops/src/test/java/com/splunk/splunkjenkins/utils/CustomSSLConnectionSocketFactoryTest.java b/splunk-devops/src/test/java/com/splunk/splunkjenkins/utils/CustomSSLConnectionSocketFactoryTest.java
new file mode 100644
index 00000000..7ba2ac5d
--- /dev/null
+++ b/splunk-devops/src/test/java/com/splunk/splunkjenkins/utils/CustomSSLConnectionSocketFactoryTest.java
@@ -0,0 +1,49 @@
+package com.splunk.splunkjenkins.utils;
+
+import junit.framework.TestCase;
+import org.junit.Assert;
+import org.junit.Test;
+
+import java.security.cert.CertificateException;
+import java.security.cert.X509Certificate;
+
+public class CustomSSLConnectionSocketFactoryTest extends TestCase {
+
+ @Test
+ public void testTextToX509Cert() throws CertificateException {
+ String testCA =
+ "-----BEGIN CERTIFICATE-----\n" +
+ "MIIFWjCCA0KgAwIBAgISEdK7udcjGJ5AXwqdLdDfJWfRMA0GCSqGSIb3DQEBDAUA\n" +
+ "MEYxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRwwGgYD\n" +
+ "VQQDExNHbG9iYWxTaWduIFJvb3QgUjQ2MB4XDTE5MDMyMDAwMDAwMFoXDTQ2MDMy\n" +
+ "MDAwMDAwMFowRjELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYt\n" +
+ "c2ExHDAaBgNVBAMTE0dsb2JhbFNpZ24gUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEB\n" +
+ "AQUAA4ICDwAwggIKAoICAQCsrHQy6LNl5brtQyYdpokNRbopiLKkHWPd08EsCVeJ\n" +
+ "OaFV6Wc0dwxu5FUdUiXSE2te4R2pt32JMl8Nnp8semNgQB+msLZ4j5lUlghYruQG\n" +
+ "vGIFAha/r6gjA7aUD7xubMLL1aa7DOn2wQL7Id5m3RerdELv8HQvJfTqa1VbkNud\n" +
+ "316HCkD7rRlr+/fKYIje2sGP1q7Vf9Q8g+7XFkyDRTNrJ9CG0Bwta/OrffGFqfUo\n" +
+ "0q3v84RLHIf8E6M6cqJaESvWJ3En7YEtbWaBkoe0G1h6zD8K+kZPTXhc+CtI4wSE\n" +
+ "y132tGqzZfxCnlEmIyDLPRT5ge1lFgBPGmSXZgjPjHvjK8Cd+RTyG/FWaha/LIWF\n" +
+ "zXg4mutCagI0GIMXTpRW+LaCtfOW3T3zvn8gdz57GSNrLNRyc0NXfeD412lPFzYE\n" +
+ "+cCQYDdF3uYM2HSNrpyibXRdQr4G9dlkbgIQrImwTDsHTUB+JMWKmIJ5jqSngiCN\n" +
+ "I/onccnfxkF0oE32kRbcRoxfKWMxWXEM2G/CtjJ9++ZdU6Z+Ffy7dXxd7Pj2Fxzs\n" +
+ "x2sZy/N78CsHpdlseVR2bJ0cpm4O6XkMqCNqo98bMDGfsVR7/mrLZqrcZdCinkqa\n" +
+ "ByFrgY/bxFn63iLABJzjqls2k+g9vXqhnQt2sQvHnf3PmKgGwvgqo6GDoLclcqUC\n" +
+ "4wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNV\n" +
+ "HQ4EFgQUA1yrc4GHqMywptWU4jaWSf8FmSwwDQYJKoZIhvcNAQEMBQADggIBAHx4\n" +
+ "7PYCLLtbfpIrXTncvtgdokIzTfnvpCo7RGkerNlFo048p9gkUbJUHJNOxO97k4Vg\n" +
+ "JuoJSOD1u8fpaNK7ajFxzHmuEajwmf3lH7wvqMxX63bEIaZHU1VNaL8FpO7XJqti\n" +
+ "2kM3S+LGteWygxk6x9PbTZ4IevPuzz5i+6zoYMzRx6Fcg0XERczzF2sUyQQCPtIk\n" +
+ "pnnpHs6i58FZFZ8d4kuaPp92CC1r2LpXFNqD6v6MVenQTqnMdzGxRBF6XLE+0xRF\n" +
+ "FRhiJBPSy03OXIPBNvIQtQ6IbbjhVp+J3pZmOUdkLG5NrmJ7v2B0GbhWrJKsFjLt\n" +
+ "rWhV/pi60zTe9Mlhww6G9kuEYO4Ne7UyWHmRVSyBQ7N0H3qqJZ4d16GLuc1CLgSk\n" +
+ "ZoNNiTW2bKg2SnkheCLQQrzRQDGQob4Ez8pn7fXwgNNgyYMqIgXQBztSvwyeqiv5\n" +
+ "u+YfjyW6hY0XHgL+XVAEV8/+LbzvXMAaq7afJMbfc2hIkCwU9D9SGuTSyxTDYWnP\n" +
+ "4vkYxboznxSjBF25cfe1lNj2M8FawTSLfJvdkzrnE6JwYZ+vj+vYxXX4M2bUdGc6\n" +
+ "N3ec592kD3ZDZopD8p/7DEJ4Y9HiD2971KE9dJeFt0g5QdYg/NA6s/rob8SKunE3\n" +
+ "vouXsXgxT7PntgMTzlSdriVZzH81Xwj3QEUxeCp6\n" +
+ "-----END CERTIFICATE-----";
+ X509Certificate cert = CustomSSLConnectionSocketFactory.textToX509Cert(testCA);
+ Assert.assertNotNull(cert.getIssuerDN().getName());
+ }
+}
\ No newline at end of file