Secured applications

When the mobile application to record uses a secured connection (HTTPS) to connect to the server, the mobile device sees the NeoLoad recording proxy or the NeoLoad tunnel as a man-in-the-middle attack and refuses the connection. It is necessary to authorize the connection with the proxy or the tunnel to be able to record the traffic. The NeoLoad root certificate must be imported in the device or emulator.

The root certificate is created when NeoLoad is first launched and is named NeoLoad_Root_CA.cer. It can be found in the configuration sub-directory of the user profile directory.

In Windows, the configuration directory is accessible from %appdata%, for example:

  • C:\Users\<username>\AppData\Roaming\Neotys\NeoLoad\v8.2\conf

In Unix/Linux/Mac, the configuration directory is accessible from <$HOME>, for example:

  • /home/<username>/.neotys/NeoLoad/v8.2/conf/

The root certificate must be installed on the emulator or on the mobile device.

Caution: Since Android 7.0, the recording of native secured applications requires a modification of the APK (Android Application itself).
This is required by Android 7 Nougat New Security Layer: https://android-developers.googleblog.com/2016/07/changes-to-trusted-certificate.html

Note: For Android 7.0 and above, the procedure below must be applied.

Tip: For other devices, installing the certificate often depends on the mobile vendor policy. For more information, contact your mobile vendor.

Once the certificate is installed, the secured application can be recorded in NeoLoad either:

  • As a browser-based application or a native one in proxy mode.

  • As a native application in tunnel mode.