Each application that needs to establish a secure connection requires the certificate check, and there are several ways to approach the requirement.
Your IT may push the certificate to all the machines on your network, so the certificate can be trusted by all the machines. This is a common practice in an enterprise network. For example, you may use Group Policy to push certificates to a trusted key store on each machine (e.g. Deploy Certificates by Using Group Policy). For more information, please consult your IT.
Also, you may use a certificate issued by a well-known certificate authority (e.g. Symantec, Godaddy). The certificate authority certificate is trusted by most modern applications (browsers, JAVA, etc) by default; thus it does not require you to manually trust the certificate.
On the other hand, you may choose to bypass the SSL check. Some applications allow disregarding the SSL check by offering an option to bypass it. For example, Docker client allows this by using ‘–insecure-registry’ option. Please consult each application’s manual to see if the application offers the option to bypass the SSL validation.