Assuming a valid SSL / TLS session can be negotiated between the server and the client, then yes. This means that the client must be ready to trust any certificate provided by the server, and that both parties can agree on a mutually acceptable set of ciphers (which algorithms to use, etc.). There are many configuration options that you can change to change what is allowed, but in a βnormalβ implementation, where you donβt go into a mess, requiring a specific, abnormal, algorithm requiring certificate authentication on the client side, etc. everything should work fine, and you will have a secure session ... and if it fails for some reason, you will know that your client will receive a message about what went wrong.
Please note that in the general case, although you can do this and the transmission will be encrypted, you usually should not. Having an unencrypted / secure page is subject to one, which makes you vulnerable to a couple of people in medium attacks. You can see the OWASP article about this, and why it is bad, here .
user121356
source share