Skip to main content

Certificates

Rostyman lets you configure custom SSL/TLS certificates for connecting to servers that use self-signed certificates, mutual TLS (mTLS), or private certificate authorities. This is common when working with internal APIs, staging environments, or enterprise systems.

Open certificate settings in Settings → Certificates.

When to Use Custom Certificates

  • Self-signed servers — Your API server uses a certificate not trusted by the system. Instead of disabling SSL verification globally, add the server's CA certificate.
  • Mutual TLS (mTLS) — The server requires the client to present a certificate to authenticate. Add your client certificate and private key.
  • Internal/private CA — Your organization uses its own certificate authority. Add the CA certificate so Rostyman trusts servers signed by it.
  • Development environments — Local or staging servers with custom certificates.

Supported Formats

FormatDescription
PEM certificate + keySeparate .pem or .crt file for the certificate and .pem or .key file for the private key
PFX / PKCS#12A single .pfx or .p12 file containing both the certificate and private key
CA certificateA .pem or .crt file for a certificate authority

Adding a Certificate

  1. Go to Settings → Certificates
  2. Click Add Certificate
  3. Fill in the details:
FieldDescription
NameA descriptive name for this certificate (e.g. "Staging API", "Internal CA")
HostThe hostname pattern this certificate applies to (e.g. api.internal.com, *.staging.example.com)
Certificate (CRT)Path to the PEM certificate file
KeyPath to the private key file (for PEM format)
PassphrasePassphrase for the private key, if it is encrypted
CA CertificatePath to the CA certificate file (optional — for custom certificate authorities)
PFX FilePath to a PFX/PKCS#12 file (alternative to separate cert + key)
  1. Click Save

You can provide either a PEM certificate + key pair, or a single PFX file — not both.

Enable / Disable Certificates

Each certificate has a toggle to enable or disable it. Disabled certificates are kept in your list but are not used when making requests. This makes it easy to switch between configurations without deleting and re-adding certificates.

Host Matching

The Host field determines which servers the certificate is used for. Rostyman matches the request URL's hostname against this pattern:

  • Exact match: api.example.com — applies only to that specific host
  • Wildcard: *.example.com — applies to any subdomain of example.com

Use Cases

Connecting to a Self-Signed Server

  1. Obtain the server's CA certificate (ask your server admin or export it from a browser)
  2. Add a certificate with the server's hostname and the CA certificate path
  3. Requests to that server will now be trusted without disabling SSL verification globally

Mutual TLS Authentication

  1. Obtain your client certificate and private key from your organization
  2. Add a certificate with the server's hostname, the client certificate path, and the key path
  3. If the key is encrypted, enter the passphrase
  4. Rostyman will present your client certificate when connecting to that server

Using a PFX File

  1. If you have a .pfx or .p12 file (common in Windows environments):
  2. Add a certificate with the server's hostname and the PFX file path
  3. Enter the passphrase if the PFX file is password-protected

Troubleshooting

ProblemSolution
"Certificate not trusted" errorsAdd the server's CA certificate, or the issuing CA's certificate
"Client certificate required"Add your client certificate and key for the target host
"Passphrase required" or decryption errorEnter the correct passphrase for the private key or PFX file
Certificate not being usedCheck that the Host pattern matches the request URL and the certificate is enabled
Still getting SSL errorsAs a temporary workaround, disable SSL Verification in General Settings — but add the proper certificate for production use

Tips

  • Certificates are matched by hostname — you can have different certificates for different servers.
  • Keep your private keys secure. Rostyman reads them from disk at request time and does not copy them.
  • If you're also using a proxy, you may need certificates for both the proxy and the target server.