x.509 SSL Client Certificate Authentication
See original GitHub issueI have several web (HTTPS) services that are served with an SSL certificate signed by a custom CA. Furthermore, access is then controlled by x.509 client certificates - in other words, the visitor is prompted to provide a client SSL certificate signed by an appropriate CA.
At the moment, it’s impossible to monitor these with uptime-kuma. Even if I provide the root CA, the connection will still be rejected as the uptime ping doesn’t send a client certificate with the request, along the lines of:
curl --cacert <ca.crt> --cert <client.cert> --key <client.key> https://secure.example.com/
A desirable solution would allow for attaching a custom root CA, client certificate and client key (or .p12 / .pfx bundle) for each monitor that would be used for HTTPS pings.
Issue Analytics
- State:
- Created 2 years ago
- Reactions:8
- Comments:7 (2 by maintainers)

Top Related StackOverflow Question
Similar feature “Ignore TLS Error” will be available in the next release.
+1 for adding this feature. It would be very beneficial for enterprise environments.