Add "Insecure TLS" Option for Power Drivers

Currently, MAAS power drivers (e.g., for UCSM) do not have an option to bypass TLS validation. This becomes problematic in scenarios where internal environments use self-signed certificates or incomplete certificate chains.

Proposed Feature:
Introduce a flag for “insecure TLS” in the power drivers. This option would allow users to bypass TLS validation when interacting with BMCs or other components that use self-signed or non-standard certificates.

I’d be happy to collaborate on testing if needed.