From e3a702493890b01f67717aa1ca171ba1e54ed1f9 Mon Sep 17 00:00:00 2001 From: Diego Perini Date: Mon, 7 Oct 2024 18:41:30 +0300 Subject: [PATCH] Network capture ssl disclaimer (#2972) * Added more info regarding network capture and SSL pinning on Android * Better formatting for readibility * Added relevant links to Apple and Google docs where applies --- docs/mobile-apps/features/network-capture.md | 15 +++++++++------ 1 file changed, 9 insertions(+), 6 deletions(-) diff --git a/docs/mobile-apps/features/network-capture.md b/docs/mobile-apps/features/network-capture.md index 60f9364c61..9d5c4e5fa3 100644 --- a/docs/mobile-apps/features/network-capture.md +++ b/docs/mobile-apps/features/network-capture.md @@ -55,10 +55,15 @@ Now you can start your live or automated testing session. Your network logs will :::note Android Only -For Android applications, a minor modification in the manifest is necessary to disable SSL pinning and accept our own certificate by your application. -In addition, we require the debug version of the application. If your application includes SecureSDK, please ensure the repackaging prevention feature is disabled. +For Android applications, a minor modification in the manifest is necessary to make your app trust our proxy certificate. We'll do this for you automatically when you upload the app to the platform. + +We require a debug build ([iOS](https://developer.apple.com/documentation/xcode/customizing-the-build-schemes-for-a-project)/[Android](https://developer.android.com/build/build-variants)) of the application and if your app includes a Secure SDK, please ensure the repackaging prevention feature is disabled. +::: + +:::note All platforms + +If your app utilizes 3rd party SDKs for networking or Secure SDKs that support network protection, make sure all runtime checks for SSL pinning ([iOS](https://developer.apple.com/news/?id=g9ejcf8y)/[Android](https://developer.android.com/privacy-and-security/security-ssl)) are also disabled otherwise your app will accidentally mark Sauce's proxy as untrustworthy and internet access for HTTPS will be limited. -For tests that run on Android devices, enabling network capture may cause issues in third-party SDKs due to SSL pinning. ::: ### Automated Testing @@ -259,9 +264,7 @@ Our network capture feature depends on the fact that these classes are not obfus #### iOS -- Network capture works if the app uses [NSURLSession](https://developer.apple.com/documentation/foundation/nsurlsession) or a library (like [Alamofire](https://github.com/Alamofire/Alamofire) or [AFNetworking](https://github.com/AFNetworking/AFNetworking)) that uses NSURLSession inside. -- Calls made by [NSURLConnection](https://developer.apple.com/documentation/foundation/nsurlconnection) (deprecated by Apple), will not be captured. - +- Network capture works if the app uses [NSURLSession](https://developer.apple.com/documentation/foundation/nsurlsession) or a library (like [Alamofire](https://github.com/Alamofire/Alamofire) or [AFNetworking](https://github.com/AFNetworking/AFNetworking)) that uses NSURLSession internally. ## More Information