An ActiveX control can do the trick. But I really did not call to help with the decision, I no longer agree with the position that what you are doing is a security risk.
To be clear, you need a secure cipher (I hope AES, not DES) and already controls your endpoints, just not able to completely eliminate network sniffers in breeding mode that can capture clear text passwords or other sensitive data.
SSL is a "Secure Socket Layer", and by definition is NOT dependent on ANY certificates.
However, all effective modern ciphers require that it authenticate the endpoints of the tunnel, which is not always a necessity for each application; disappointment that I came across in many data center automation routines using web services APIs to manage nodes, where the “users” were actually processes that needed encrypted key exchange before negotiating a RESTful command.
In my case, the VLANs were protected through the ACL, so I really can "send" authentication headers with clear text. But just by typing, I made me jump a little in my mouth.
I’m sure that I’ll be flaming to print this, but I’m very fierce and would make the same comments to you in 10-15 years of my IT career. Therefore, I sympathize with their concerns and really appreciate if they are passionate enough in safety to cry. They will find out in the end.
But I agree that the idea of BAD is to “train” users to install the root certification authority on their own. On the other hand, if you use a self-signed certificate, you must train them to install. And if the user does not know how to determine whether CA Cert deserves validity, they will definitely not be able to determine the self-signed certificate from CA Cert, and thus, any of the processes will have the same effect.
If it were me, I would automate the process, rather than helping end users to make it as hidden from them as possible, just like the right PKI for the enterprise.
Speaking of this, I just thought of a potential solution. Use the Microsoft PKI model. With Server 2012 R2, you can deliver trusted keys to endpoints that are not even members of a domain using "device management" through "workspaces", and client machines can subscribe to multiple workspaces, so they are not transferred exclusively to you if they are signed . Once they do and authenticate, the AD Certificate Services role will eject all the root CA certificates that are present in the active directory or the specified LDAP server. (If you are using standalone CA servers)
In addition, I understand that this stream is like 7 years, but I am sure that it still refers to a large number of people who need such solutions, and felt obligated to share the opposite opinion. (Okay, Microsoft, where is my rollback for the fork I gave you?)
-cashman