Skip to content

Host Configuration and TLS

Host management is an advanced feature for defining network rules specific to certain domains. It is an essential tool for working in protected corporate environments, managing mTLS (Mutual TLS) certificates, or interacting with servers that require a private Certification Authority (CA).

Solo's Host settings panel with an already configured host, showing TLS details and associated cookies.Solo's Host settings panel with an already configured host, showing TLS details and associated cookies.

Creating a Host configuration is recommended in the following scenarios:

  • Client Certificates: Requires a certificate (.crt) and private key (.key) for client authentication (mTLS).
  • Private CAs: Using internal servers with certificates not recognized by the operating system.
  • Local Development: Need to ignore security errors for servers with self-signed certificates.
  • Persistent Cookies: Automatically send specific cookies with every request to a specific domain, without the need for repeated manual entry.

Configuring a Host enables the following automations:

  1. Automatic Detection: Every time a request is sent, the URL is checked against configured Hosts to immediately apply rules.
  2. Transparent Injection: Presents the client certificate during the SSL handshake and injects cookies into HTTP headers without manual intervention.
  3. Isolation: Configurations are limited to the specific host. Rules for api.sviluppo.local do not interfere with calls to other domains.

  1. Add a Host: Go to Settings > Hosts and click “Add Host”. Enter the domain (e.g., api.azienda.it).

  2. Enable TLS: Toggle “Enable Custom TLS Configuration”.

  3. Upload Files: Use the “Browse” button to select the public certificate and private key.

    The add host form with the TLS section expanded and the certificate (.crt) and key (.key) file paths entered.The add host form with the TLS section expanded and the certificate (.crt) and key (.key) file paths entered.
  4. Custom CA: Upload the Root CA file to allow Solo to verify the server.

  5. Save: Click “Save Host”. Future requests to the domain will use the saved configuration.


OptionDescriptionTypical Use
Insecure Skip VerifyIgnores server certificate validation.Local development environment.
Client Certificate.crt or .pem file provided by the administrator.mTLS Authentication.
Client Key.key file associated with the client certificate.mTLS Authentication.
Root CACertificate file of the Certification Authority.Internal corporate servers.
Host CookiesList of keys and values sent automatically.Legacy persistent sessions.