Configure HTTPS Inspection
This guide covers the complete HTTPS inspection setup: generate or import a Root CA certificate, enable inspection in SafeSquid, deploy the certificate to clients, and configure bypass rules for sensitive domains.
Time to complete: 30-60 minutes (including client certificate deployment)
Prerequisites
SafeSquid side:
- SafeSquid installed and licensed
- Access to Self-Service Portal (for certificate generation)
- Access to SafeSquid Configuration Portal (
http://safesquid.cfg/—embedded Rest UI interface built into SafeSquid; accessible only when your client uses the proxy, but NOT resolved by SafeSquid's DNS resolver—orhttps://SERVER-IP:8443/for direct access)
Client side:
- List of domains to bypass (banking, healthcare, SSL-pinned apps)
- Method to deploy Root CA to all clients (GPO, MDM, or manual)
- Administrative access to client systems (for certificate import)
Step 1: Generate or Import Root CA Certificate
You have three options for the Root CA certificate:
| Option | When to Use | Pros | Cons |
|---|---|---|---|
| Self-Signed | Testing, small deployments | Quick, no external dependencies | Not trusted by default, harder to revoke |
| Enterprise CA (with passphrase) | Production with existing CA | Centralized trust, auditable | Requires CA infrastructure |
| Enterprise CA (without passphrase) | Production, new passphrase | Same as above | Need to set new passphrase |
Recommended: Use self-signed for testing/pilot. Use enterprise CA for production.
Generate Certificate in Self-Service Portal
-
Log in to the Self-Service Portal

-
Navigate to Certificate Management
In the dashboard → find your deployment → click Manage Certificate

Option A: Self-Signed Certificate
-
Click Generate (appears if no certificate exists yet)

-
Select "General self-signed" → Enter passphrase → Generate
Save Your PassphraseThe passphrase is non-recoverable. Save it securely—you'll need it to reuse the certificate with different activation keys.

-
Click Close to continue

Option B: Enterprise CA with Existing Passphrase
-
Click Regenerate → Upload enterprise CA files → Select "has passphrase"

-
Select CA certificate files (
.crtand.key)
-
Enter passphrase → Click "Validate private key"

-
Select "Retain password" → Upload

-
Click Close

Option C: Enterprise CA Without Passphrase (Set New One)
-
Click Regenerate → Upload enterprise CA → Select "does not have passphrase"

-
Select CA certificate files

-
Enter new passphrase → Upload
Save Your PassphraseThis new passphrase is non-recoverable. Save it securely.

-
Click Close

Download Certificate
-
Enter passphrase (if prompted) → Click Download

Save this file — you'll deploy it to all client systems.
Step 2: Enable HTTPS Inspection in SafeSquid
Access Configuration Portal
-
Open SafeSquid interface → Click "Configure"

-
Expand "Real Time Content Security" in the sidebar

-
Click "HTTPS Inspection"

Enable Global HTTPS Inspection
-
Click the "Global" tab → Click Edit (pencil icon)
Version ChangeSafeSquid versions after June 2017 have three tabs: Global, Inspection Policies, and Bypass Policies.

-
Set "Enabled" to "True" → Save Policy

Enable Inspection Policies
-
Click "Inspection Policies" tab

-
Verify default policies are enabled

-
Find "Enforce SSL scanning for all websites" → Click Edit

-
Set "Enabled" to "True" → Save Policy

Save Configuration
-
Click "Save Configuration" (floppy disk icon, bottom left)

-
Select "No" (unless deploying to a cluster) → Submit
Cloud ConfigSelect "Yes" only if:
- You're deploying the same config to multiple SafeSquid instances (cluster)
- All sections are fully configured for production
Otherwise, select "No" to save locally only.
Step 3: Deploy Root CA to Clients
All clients must trust the SafeSquid Root CA to avoid certificate warnings.
Windows (Chrome, Edge, IE)
See detailed guide: Import Certificate into Chrome/IE
Quick summary:
- Double-click the downloaded certificate
- Install Certificate → Local Machine → Next
- Browse → Trusted Root Certification Authorities → OK
- Next → Finish
For enterprise deployment: Use GPO to push the certificate to all Windows machines.
Firefox (All Platforms)
Firefox uses its own certificate store.
- Download the SafeSquid Root CA (from Step 1)
- Open Firefox → Settings → Privacy & Security → Certificates → View Certificates
- Authorities tab → Import
- Select the SafeSquid certificate file
- Check "Trust this CA to identify websites" → OK
Verify:
- Visit
https://www.google.com(via SafeSquid proxy) - Click padlock → More information → View Certificate
- Certificate chain should show SafeSquid Root CA
macOS
Via System Keychain:
- Double-click the certificate file
- Add → Enter admin password
- Open Keychain Access → System keychain
- Find SafeSquid certificate → Get Info
- Trust section → When using this certificate → Always Trust
For enterprise: Use MDM (Jamf, Intune) to deploy to all Macs.
Mobile Devices
iOS/Android:
- Deploy via MDM (Jamf, Intune, Workspace ONE)
- Manual: Email certificate → Open on device → Install
Step 4: Configure Bypass Policies
Bypass HTTPS inspection for:
- Banking and financial sites (compliance)
- Healthcare portals (HIPAA)
- SSL-pinned applications (will break otherwise)
- Government sites
Enable Default Bypass Policy
-
Click "Configure" in SafeSquid interface

-
Click Search (magnifying glass icon, top right)

-
Type "BYPASS SSL INSPECTION" → Enter

-
Click Edit on the bypass policy

-
Set "Enabled" to "True" → Save Policy

-
Review and enable related bypass policies (for banking apps, Windows Update, etc.)

Create Custom Bypass for Specific Domains
Example: Bypass HTTPS inspection for Dropbox.

Step 1: Define Request Type
-
Sidebar → Profiling Engine → Request Types → Add New

-
Comment: "Dropbox domains"
Match pattern:.*dropbox.*
Smart TLD: True

Step 2: Create Access Policy
-
Sidebar → Access Policies → Access Profiles → Add New

-
Comment: "Bypass SSL for Dropbox"
Request Type: Select "Dropbox domains" (from Step 1)
Added profiles: Select "BYPASS SSL INSPECTION"
-
Save Policy

-
Save Configuration (floppy disk icon, bottom left)
Test: Upload/download files via Dropbox to verify bypass works.
Verification
Test HTTPS Inspection is Working
On a client with SafeSquid Root CA installed:
- Browse to
https://www.google.com - Click padlock → Certificate → View
- Verify: Certificate chain shows SafeSquid Root CA as the issuer
- No certificate warnings should appear
Expected certificate chain:
www.google.com (issued by SafeSquid Root CA)
└─ SafeSquid Root CA (self-signed or your enterprise CA)
Test Bypass is Working
On the same client:
- Browse to a bypassed site (e.g., banking site you added to bypass)
- Click padlock → Certificate → View
- Verify: Certificate shows the original site's CA (not SafeSquid)
Expected: Bypassed sites show their original certificates (e.g., DigiCert, Let's Encrypt).
Check SafeSquid Logs
On SafeSquid server:
tail -f /var/log/safesquid/access/extended.log
Expected for inspected sites:
- Full URL logged (including path, not just domain)
200 OKor similar HTTP status
Expected for bypassed sites:
- Only
CONNECTmethod logged - No detailed path information
Troubleshooting
| Issue | Likely Cause | Fix |
|---|---|---|
| Certificate warnings on all HTTPS sites | Root CA not installed on client | Install SafeSquid Root CA in Trusted Root store (see Step 3) |
| Firefox shows warnings, Chrome works | Firefox uses separate cert store | Import certificate into Firefox separately (see above) |
| Banking/healthcare sites broken | HTTPS inspection enabled, no bypass | Add sites to bypass policy (Step 4) |
| Mobile apps not working | SSL pinning | Add app's domains to bypass policy |
| "NET::ERR_CERT_AUTHORITY_INVALID" | Root CA not trusted | Verify certificate installed in Trusted Root Certification Authorities (not Intermediate) |
| Inspection works, then stops | SafeSquid restart cleared config | Re-save configuration; check if config was saved to cloud |
| Some sites work, others don't | Partial bypass or incorrect policy | Review bypass policies; check logs for CONNECT vs full requests |
Still not working?
-
Verify HTTPS Inspection is enabled:
- Configuration Portal → Real-time Content Security → HTTPS Inspection → Global = True
-
Check certificate is deployed:
- Windows: Run
certmgr.msc→ Trusted Root Certification Authorities → Certificates - Firefox: Settings → Privacy & Security → Certificates → View Certificates → Authorities
- macOS: Keychain Access → System → Find SafeSquid cert
- Windows: Run
-
Test with curl:
# Should work without cert if bypass is correct:
curl --proxy http://SAFESQUID-IP:8080 https://www.google.com -
Check SafeSquid logs:
tail -50 /var/log/safesquid/safesquid.log
grep -i "ssl\|cert\|handshake" /var/log/safesquid/safesquid.log
Next Steps
- Authentication — Enable user-aware policies (SSL Inspection must be working first)
- Access Restriction — Configure URL filtering (now works on HTTPS)
- Data Leakage Prevention — Scan HTTPS uploads for sensitive data
- Troubleshooting — SSL-specific issues and diagnostics
Related:
- Self-Service Portal — Manage certificates
- Import Certificate into Chrome/IE — Detailed Windows guide