NSURLErrorServerCertificateUntrusted (code -1202) — the iOS/macOS Foundation Network layer rejected the server SSL cert. Cause: self-signed, expired, untrusted CA, empty SAN, or cert does not satisfy ATS (App Transport Security) requirements. In 2026 iOS requires TLS 1.2+, forward secrecy, SHA-256+ signature. Fix: real cert from Let's Encrypt/Sectigo, or for dev — NSAllowsArbitraryLoads (NOT production).
Below: causes, fixes, FAQ.
urlSession:didReceiveChallenge:NSAppTransportSecurity > NSExceptionDomains for a specific domain (careful)SSL/TLS is the encryption protocol that protects data between the browser and server. Our tool analyzes the certificate, chain of trust, TLS version, and knownvulnerabilities.
Issuer, validity period, signature algorithm, covered domains (SAN), and validation type (DV/OV/EV).
Full chain verification: from leaf certificate through intermediates to root CA.
Protocol version (TLS 1.2/1.3), cipher suites, Perfect Forward Secrecy (PFS) support.
Set up a monitor — get Telegram and email alerts 30/14/7 days before expiration.
SSL certificate monitoring
TLS config audit
HTTPS as ranking factor
customer trust
www and subdomains.Strict-Transport-Security header forces browsers to always use HTTPS.SSL certificate monitoring, check history and alerts 30 days before expiry.
Sign up freeInfo.plist → NSAppTransportSecurity → NSExceptionDomains → your-dev-domain → NSExceptionAllowsInsecureHTTPLoads=YES. Debug builds only.
SHA-256 cert hash or SPKI pin. Rotate with the cert, validate on every build.
Yes, Foundation by default. Needs a custom trust eval via URLSessionDelegate.
TLS 1.2+, ECDHE forward secrecy, AES-128-GCM+, SHA-256 signature. Cert with SAN (mandatory).