In traditional TLS:
- The server sends its certificate.
- The client verifies it against a trusted Certificate Authority (CA).
- The client then trusts that the server is genuine.
- The client sends its own certificate, signed by a trusted CA.
- The server verifies this certificate and checks that the client controls the private key associated with it.
Why mTLS?
Servers that can call our APIs operate with high privilege.mTLS ensures that:
- Only systems you explicitly trust can connect to us.
- Each client environment can have its own certificate, improving auditability.
- Private keys stay entirely under your control; we never see them.