

MockServer achieves this by dynamically generating its X.509 Certificate using an in-memory list of hostnames and ip addresses, this is described in more detail below.

servers) and present a valid X.509 Certificates for them. MockServer is able to mock the behaviour of multiple hostnames (i.e.

TLS for outbound connections (also called forward proxy TLS) to authenticate any client sending HTTPS requests.mTLS for inbound connections (also called client authentication or two-way TLS) to authenticate any client sending HTTPS requests.TLS for inbound connections to support HTTPS for mocking, proxying and control-plane interactions (creating expectations, retrieving logs, etc).an HTTPS request) MockServer dynamically detects that the request is encrypted. This means when a request is sent over TLS (i.e. HTTP, HTTPS / SSL, SOCKS, etc) are supported on the same port. MockServer uses port unification to simplify the configuration so all protocols (i.e.
