How certifcations based auth works
Limited Time Offer!
For Less Than the Cost of a Starbucks Coffee, Access All DevOpsSchool Videos on YouTube Unlimitedly.
Master DevOps, SRE, DevSecOps Skills!
- Users Enters Private Key Password.
- Client retrieves private-key and uses it to create evidence(“digital signature”)
- Client sends certificate and evidence across network
- Server uses certificate and evidence to authenticate the users identity
- Server authorizes access for authenticated identity