Troubleshooting macOS Trust Certificate Issues

Updated on Nov 17, 2025

Environment

ProductFiddler Everywhere
Product Version1.0.0 and above
Supported OSmacOS
OS toolKeychain Access

Description

To capture secure (HTTPS) traffic on macOS, Fiddler Everywhere requires the installation of a root CA (certificate authority) in the macOS Keychain Access application. This process failed and I'd like to know how can I handle the "Fiddler root certificate NOT trusted successfully" error?

Solution

Test the import of the Fiddler Everywhere root certificate on macOS by using custom bash scripts and terminal commands.

  1. Create a Bash file, for example, import.sh.

  2. Save the following script in import.sh:

    Bash
    login_keychains_paths=$(security list-keychains | grep -e "\Wlogin.keychain\W");
    
    if [ -z "$login_keychains_paths" ]
        then
            echo "No login keychain found.";
            exit 10;
    fi
    security add-trusted-cert -k login.keychain ~/Desktop/Fiddler_Root_Certificate_Authority.crt;
    
    security_exit_code=$?;
    if [ $security_exit_code -ne 0 ]
        then
            echo "security add-trusted-cert failed with error code $security_exit_code";
    fi
  3. Make the import.sh file executable.

    Bash
    chmod +x import.sh
  4. Execute the created file in your Bash shell.

    Bash
    ./import.sh
  5. After successfully executing the file, you will be prompted for your macOS username and password. Enter the credentials, and the generated root CA adds in the Keychain Access application in login > Certificates as Fiddler Root Certificate Authority.

  6. Test that the certificate generated from Fiddler is successfully installed and trusted by running the following command in your Bash shell:

    Bash
    security trust-settings-export /tmp/trustSettings.xml

    As a result, the command outputs a success message:

    Bash
    ...Trust Settings exported successfully.
  7. Go to login > Certificates and confirm that the Fiddler Root Certificate Authority is present in the Keychain Access application. Double-click the CA, scroll to the bottom and note the SHA-1 value. Open the exported settings file from /tmp/trustSettings.xml and check that the SHA-1 value is present there. For example, the certificate from your Keychain Access application will be identical to the SHA-1.

    The SHA-1 key in the trustSettings.xml file will also be present in the Keychain Access application.

    XML
    <key>68E0B8FE34DF4A756B664E300B067CA9A1B9DE8</key>

    Check SHA1 signature

  8. (Optional) Delete the /tmp/trustSettings.xml file after troubleshooting the issue as it's only needed to check that the SHA-1 key is properly exported.

In this article
EnvironmentDescriptionSolution
Not finding the help you need?
Contact Support