A technique for establishing inspected secure communication includes
establishing a first secure connection between a client device and a
client-side device and a second secure connection between the client-side
device and a server device. The client-side device establishes the first
secure communication channel by providing a certificate impersonating the
server device to the client device. The first and second communication
channels enable client-side inspection of communications.