Documentation

Go to Portal Website

Certificate Pinning

Certificate pinning restricts app traffic so protected builds trust only the certificate keys you approve for your domains. It reduces exposure to man-in-the-middle interception, mis-issued certificates, compromised certificate authorities, and unmanaged TLS inspection.

Use this guide to plan the certificate lifecycle. For the per-control reference, see Certificate Pinning.

Pinning is powerful because it narrows trust. That also means mistakes can block real users, so pair every strict pinning rollout with a tested rotation plan and clear ownership.

When To Use Pinning

Use caseRecommendation
Banking, payments, identity, healthcare, or regulated dataUse pinning for production API domains and pair it with proxy detection.
Enterprise app with managed network inspectionTest carefully. Pinning may block approved inspection proxies unless your policy and backend certificate chain are designed for it.
Apps with frequent certificate rotationUse backup pins and a planned rotation window before enforcing strict responses.
Early development or unstable backend TLSDelay enforcement until certificates, domains, and CDN behavior are stable.

Pinning Model

Pin typeWhat it protectsOperational tradeoff
Leaf certificate pinA specific server certificate.Strong binding, but requires careful rotation before the certificate changes.
Intermediate or CA pinA trusted issuing certificate in the chain.Easier renewal, but broader trust than a leaf pin.
Domain-specific pinOne or more hostnames.Best for production APIs, authentication endpoints, and regulated data flows.
Broad or wildcard domain policyA larger hostname set where supported by your configuration.Useful for consistent API estates, but requires full inventory of backend, CDN, analytics, and third-party endpoints.

Certificate pinning is configured for domains and certificate entries in AppTego. Do not rely on a broad policy until every required endpoint and certificate chain has been tested in a protected build.

  1. Inventory production domains and third-party endpoints used by the app.
  2. Upload the current production pin and at least one backup pin.
  3. Build a protected Staging app and test all login, API, payment, analytics, and support flows.
  4. Confirm CDN, certificate renewal, and disaster-recovery certificate plans with the backend team.
  5. Release a production build that contains both current and backup pins.
  6. Rotate backend certificates only after the build with backup pins has reached the required adoption threshold.
  7. Remove old pins in a later release after traffic confirms the new certificate chain is active.

User And App Impact

If pin validation fails, the protected app blocks the affected network connection. Depending on your configuration, AppTego can log the event, show a message, redirect the user, or terminate the app. Users may report that the app cannot sign in, sync, load content, or complete a transaction when a certificate chain is unexpected.

Common causes include expired certificates, unplanned backend certificate rotation, corporate TLS inspection, captive portals, incorrect domain mapping, or test environments using certificates that were not added to the configuration.

Testing Checklist

AreaWhat to verify
DomainsEvery production hostname used by the app has the intended pin policy.
Backup pinsThe app remains functional when the backend presents the next planned certificate chain.
Failure behaviorWrong certificates produce the expected log, message, redirect, or termination behavior.
Managed devicesEnterprise customers that use network inspection understand the policy impact.
Release processCertificate rotation is coordinated with protected app releases and adoption targets.

Ownership Checklist

OwnerResponsibility
Mobile release teamBuilds and validates protected apps containing the current and backup pins.
Backend or infrastructure teamOwns certificate issuance, renewal, CDN behavior, and emergency replacement.
Security teamDefines strictness, exception handling, and monitoring expectations.
Support teamHandles user reports when network policy blocks access.