How to Block Mobile Bots with Client Certificates, Authenticate Legitimate Mobile Apps

Last updated September 4, 2022 by Appdome

This Knowledge Base article explains how to use mobile client certificates in mobile applications for the purpose of protecting the server from establishing connections with malicious bots or compromised endpoints. The application uses client certificates as a means of proving its identity to its trusted server and allowing the server to validate the legitimacy of the client certificate during the process of negotiating the SSL/TLS handshake.


Mobile apps connect to all sorts of external services. They connect to their host server to authenticate users, to download content, to connect to other mobile resources, and more. Mobile apps also connect to 3rd party services embedded in the app, such as payment providers, analytics vendors, location services, and more. As a mobile app connects with the outside world, hackers and malicious parties exploit weaknesses in the communications or transport layer to conduct network-based attacks that target the mobile application backend. For example, attackers often use techniques like session hijacking, fake or forged digital certificates, or automated malicious bots or scripts. These techniques are designed to attack infrastructure by using click fraud, credential stuffing or other large-scale automated attacks. In fact, OWASP, a leading nonprofit foundation that works to improve the security of software, lists insecure communication as one of its OWASP Mobile Top 10 risks.

Digital Certificates Explained

Before we get into the details of how Mobile Client Certificates protect servers against malicious clients, let’s take a step back and cover SSL/TLS basics starting with explaining what digital certificates are and how they work.

In cryptography (PKI), a digital certificate, or X.509 certificate is an electronic document used to prove the ownership and validity of a public key. The certificate includes information about the key, information about the identity of its owner, and the digital signature of an entity that has verified the certificate’s contents. If the signature and certificate are valid, then the two parties can communicate securely by using the TLS protocol.

Below is a screenshot describing a typical SSL/TLS Handshake:

ssl/tls handshake

There are 2 main types of SSL/TLS certificates:

  • Client Certificates – digital certificates used by a client system (in this case an Android or iOS application) to prove its identity to its backend server as part of the SSL/TLS handshake.
  • Server Certificates, which are used to protect mobile apps from connecting with malicious or fake servers.

This KB article covers client certificates; server certificates are covered in another KB article.

Client Certificates are used by the mobile application to prove its identity and authenticity to the server. The primary use for this feature is to protect the mobile application’s servers or backend from compromised endpoints, such as malicious bots, clones, malware or fake mobile apps. The trusted client certificates are stored securely (encrypted) inside the mobile app. For every connection, the application presents its certificate along with a unique password/secret to the server for inspection and validation as part of the SSL/TLS handshake. By only allowing connections to apps whose client certificates it can validate, the server is protected from connecting to malicious or compromised clients such as malicious bots.

How to Use Mobile Client Certificates to Ensure Only Valid Apps can Connect to Servers

Mobile Client Certificates –  Using Appdome’s no-code mobile app security platform you can embed the trusted, approved client certificates (client P12/PKCS) inside the application, where it is securely stored (encrypted using AES-256). For every connection, the application presents its unique certificate along with a unique password/secret to the server for inspection and validation as part of the SSL/TLS handshake. The server then inspects the certificate using its private key to ensure that it matches, in which case the server knows it can trust the client/app and establish the secure session. This protects the backend servers and infrastructure against connections originating from compromised endpoints or malicious bots. In order to use Appdome’s Mobile Client Certificates feature, the server must be configured to validate incoming connections based on client certificates.

5 Easy Steps to Use Mobile Client Certificates in Android & iOS apps

Please follow these 5 easy steps to add  Mobile Client Certificates to any iOS and Android app using Appdome.

  1. Upload an Android or iOS App to Appdome’s no code security platform (.apk, .aab, or .ipa)
  2. In the Build Tab, under Security, expand Secure Communication, Under Bot Defense, switch ON Mobile Client Certificates 
  3. Upload client’s private certificate and key (client P12/PKCS) for authentication
  4. Enter the unique Password for the P12 certificate (as shown below)
  5. Click Build My App

mobile client certificates


appdome fusion success message simulator and emulator prevention


Here’s what you need to build secured apps with Mobile Client Certificates

  • Appdome account (If you don’t have an Appdome account, create a free Appdome account here)
  • Mobile App (.ipa for iOS, or .apk or .aab for Android)
  • P12 certificate with the password included in it
  • Server must be configured to validate incoming connections based on client certificates
  • Signing Credentials (e.g., signing certificates and provisioning profile)

No Coding Dependency

Using Appdome, there are no development or coding prerequisites to build secured apps. There is no SDK and no library to manually code or implement in the app. The Appdome technology adds the relevant standards, frameworks, and logic to the app automatically, with no manual development work at all.

How to Sign & Publish Secured Mobile Apps Built on Appdome

After successfully securing your app using Appdome, there are several available options to complete your project, depending on your app lifecycle or workflow. These include:


Or, see this quick reference Releasing Secured Android & iOS Apps built on Appdome.

How To Learn More?

Read other Secure Communication Knowlege Base Articles:

Secure Certificate Pinning

How to Block Mobile Bots Using Session & Header Secrets

MitM attack prevention

Learn more about Appdome Platform or request a demo at any time.

If you have any questions, please send them our way at or via the chat window on the Appdome platform.

Thank you!

Thanks for visiting Appdome! Our mission is to secure every app on the planet by making mobile app security easy. We hope we’re living up to the mission with your project. If you don’t already have an account, you can sign up for free.


let's solve it together

JohnMaking your security project a success!
By filling out this form, you opt-in to recieve emails from us.