mTLS
mTLS is a mechanism for ensuring that both the client and server authenticate each other over a TLS connection. It is an extension of standard TLS (which typically only authenticates the server to the client).
How mTLS Works
- Client Authentication: In addition to the server presenting its certificate, the client also presents its own certificate to the server.
- Certificate Verification: Both parties verify the certificates they receive. This ensures that both the client and server are who they claim to be, providing bidirectional authentication.
- Secure Communication: Once both parties are authenticated, a secure encrypted communication channel is established.
Benefits of mTLS
- Strong, cryptographic client authentication.
- Prevents unauthorized clients from connecting to the server.
- Ensures data integrity and confidentiality during transmission.
Setup
Setting up mTLS requires two steps. Please contact us for:
- Enabling your API Client for mTLS
- Sharing your certificates in order to be added to our PKI infrastructure
Certificate Requirements
Certificates must use either RSA or ECDSA ciphers.
For client (leaf) certificates:
- The
BasicConstraintsextension must not containCA=true - The
ExtendedKeyUsageextension must containclientAuth - The
ExtendedKeyUsageextension must not contain thecodeSigning,timeStamping, orOCSPSigningfields - The certificate must not be expired
- The client certificate cannot be a self-signed certificate
- The
For root and intermediate certificates:
- The
BasicConstraintsextension must containCA=true - The
KeyUsageextension must be set tokeyCertSign - The
ExtendedKeyUsageextension should contain theclientAuthfield - The certificate must not be expired
- The
Was this section helpful?
What made this section unhelpful for you?
On this page
- mTLS