SocketSslErrorSeverity
SocketSslErrorSeverity
SocketSslErrorSeverity
SocketSslErrorSeverity
Enum
Definition
The category of error that occurs on an SSL connection.
public : enum class SocketSslErrorSeveritypublic enum SocketSslErrorSeverityPublic Enum SocketSslErrorSeverity// You can use this enum in JavaScript.
- Attributes
| Device family |
Windows 10 (introduced v10.0.10240.0)
|
| API contract |
Windows.Foundation.UniversalApiContract (introduced v1)
|
Fields
| Fatal Fatal Fatal Fatal | Fatal errors indicate the SSL server’s certificate cannot be validated. Reasons for encountering this severity level include:
|
| Ignorable Ignorable Ignorable Ignorable | Ignorable errors indicate that the SSL server’s certificate cannot be properly validated. Disregarding Ignorable errors may result in the loss of privacy or integrity of the content passed over the SSL session. Reasons for encountering this severity level include:
|
| None None None None | No error occurs on the SSL connection. |
Remarks
The SocketSslErrorSeverity enumeration indicates the category of error that occurs when an SSL connection to a server is established.
SSL server errors should only be ignored in advanced scenarios. Disregarding server certificate errors classified as either Ignorable or Fatal may result in the loss of privacy or integrity of the content passed over the SSL session.
Some organizations may use self-signed certificates for private use rather than registered the certificates with a trusted certificate authority. An SSL connection to these sites might be a case where an Ignorable error might be tolerated if the server's SSL certificate can be verified by other means.
To validate self-signed certificates effectively, an app must validate the public key of the certificate (using a certificate thumbprint or hash of the public key, for example). See the Windows.Security.Cryptography.Certificates namespace for classes that support calculating certificate thumbprints and other validation operations.
If the public key cannot be validated, displaying other certificate details to users by default is not advisable. This may cause users to assume the information is valid when it may in fact be provided by an attacker.