Mutual TLS
Mutual TLS
When your web browser wants to talk to a website, it first asks the
website for its badge (called a digital certificate). The website sends
back the badge, and your browser checks to make sure it’s valid and
belongs to the right website. Then your browser sends its own badge
(called a client certificate) to the website, and the website checks it
to make sure you’re allowed to access its content. Once both sides
have verified each other’s identities, they use a special code (called
encryption) to scramble their messages so nobody else can read
them.
Command to test-
curl — cert <path-to-client-certificate> — key <path-to-client-key>
— cacert <path-to-CA-certificate> <https-url>
Here’s what each parameter means:
For example, if you have the client certificate and key stored
in /path/to/client.crt and /path/to/client.key respectively, and the CA certificate
stored in /path/to/ca.crt, and you want to test the mutual TLS
connection to https://example.com, you can use the following command:
This command will initiate a mutual TLS connection with the server
at https://example.com and verify the server's certificate using the CA
certificate at /path/to/ca.crt. If the connection is successful, you should
see the response from the server.
Quick Tip:
Activation on Akamai: