▲ | rsstack 4 days ago | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
> I've seen most of them moving to internally signed certs Isn't this a good default? No network access, no need for a public certificate, no need for a certificate that might be mistakenly trusted by a public (non-malicious) device, no need for a public log for the issued certificate. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
▲ | pavon 4 days ago | parent [-] | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Yes, but it is a lot more work to run an internal CA and distribute that CA cert to all the corporate clients. In the past getting a public wildcard cert was the path of least resistance for internal sites - no network access needed, and you aren't leaking much info into the public log. That is changing now, and like you said it is probably a change for the better. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|