You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/power-platform/power-automate/desktop-flows/could-not-establish-trust-relationship-ssl-tls-secure-channel.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Could Not Establish Trust Relationship for the SSL or TLS Secure Channel
3
3
description: Provides a workaround to allow users with invalid certificates to use certain actions in Power Automate for desktop.
# "Could not establish trust relationship for the SSL/TLS secure channel" error
@@ -17,7 +17,7 @@ Actions in Power Automate for desktop, like [Invoke web service](/power-automate
17
17
18
18
> System.Net.Http.HttpRequestException: An error occurred while sending the request. ---> System.Net.WebException: The underlying connection was closed: Could not establish trust relationship for the SSL/TLS secure channel.
19
19
20
-
In certain cases, a network traffic inspection tool, such as Fiddler, might be installed on the computer.
20
+
In some cases, the issue might occur when a network traffic inspection tool, such as Fiddler, is installed on the computer.
21
21
22
22
## Cause
23
23
@@ -27,8 +27,8 @@ Power Automate for desktop validates the status of HTTPS certificates to check t
27
27
28
28
2. Companies that use package inspection to audit their network infrastructure might not allow users to sign in, as their Certificate Revocation List (CRL) might not have been defined or is unreachable.
29
29
30
-
3. Tools like Fiddler might install a self-signed certificate on the system with an **Unknown** revocation status. Therefore, when the registry key is set to **Comprehensive**, the error might occur.
30
+
3. Tools like Fiddler might install a self-signed certificate on the system with an Unknown revocation status. In such cases, if the [CertificateRevocationCheck](/power-automate/desktop-flows/governance#configure-power-automate-for-desktop-to-check-for-revoked-certificates)registry key is set to **Comprehensive**, Power Automate for desktop will reject the certificate and the error will be generated.
31
31
32
32
## Workaround
33
33
34
-
Administrators can enable actions for users with invalid certificates by following the steps in [Configure Power Automate for desktop to check for revoked certificates](/power-automate/desktop-flows/governance#configure-power-automate-for-desktop-to-check-for-revoked-certificates).
34
+
Administrators can allow users with invalid certificates to use these actions by following the steps in [Configure Power Automate for desktop to check for revoked certificates](/power-automate/desktop-flows/governance#configure-power-automate-for-desktop-to-check-for-revoked-certificates).
0 commit comments