A third party my system needs to connect to (via FTPS) is using a certificate that is not trusted by machine (unknown certificate).
If I want to avoid installing the certificates from the issuing authority on every server that my application needs to run on, could I as an alternative just get the third party to confirm the SHA-256 fingerprint of their certificate in advance, and just override my certificate validation logic to check the fingerprint?
Would that provide the same level of security as installing the certificates from the issuing authority?
I have read the answers to this question, and it makes me think that this is fine, but my question is about configuring my application with the fingerprints and using them to validate received certificates rather than manually checking fingerprints while browsing etc.