Usually such systems need a custom CA installed on the end systems, or it won't be able to create valid certificate on the fly. Encryption is *always* useless unless you can verify fully the other end point.
Usually such systems need a custom CA installed on the end systems, or it won't be able to create valid certificate on the fly. Encryption is *always* useless unless you can verify fully the other end point.