Skip to content
_CORE
AI & Agentic Systems Core Information Systems Cloud & Platform Engineering Data Platform & Integration Security & Compliance QA, Testing & Observability IoT, Automation & Robotics Mobile & Digital Banking & Finance Insurance Public Administration Defense & Security Healthcare Energy & Utilities Telco & Media Manufacturing Logistics & E-commerce Retail & Loyalty
References Technologies Blog Know-how Tools
About Collaboration Careers
CS EN DE
Let's talk

mTLS in Practice

12. 05. 2018 Updated: 27. 03. 2026 1 min read advanced
This article was published in 2018. Some information may be outdated.

How It Works

Standard TLS: client verifies server. mTLS: both sides verify each other.

Certificates

CA

openssl req -x509 -nodes -days 3650 -newkey rsa:4096 -keyout ca.key -out ca.crt -subj ‘/CN=MyCA’

Server

openssl req -nodes -newkey rsa:2048 -keyout server.key -out server.csr -subj ‘/CN=server’ openssl x509 -req -in server.csr -CA ca.crt -CAkey ca.key -CAcreateserial -out server.crt

Client

openssl req -nodes -newkey rsa:2048 -keyout client.key -out client.csr -subj ‘/CN=client’ openssl x509 -req -in client.csr -CA ca.crt -CAkey ca.key -CAcreateserial -out client.crt

Nginx

ssl_client_certificate /etc/ssl/ca.crt; ssl_verify_client on;

curl

curl –cert client.crt –key client.key –cacert ca.crt https://api.example.com

mTLS = Zero Trust

Automatic in a service mesh. For your own services, use an internal CA.

mtlstlssecurityzero trust
Share:

CORE SYSTEMS team

We build core systems and AI agents that keep operations running. 15 years of experience with enterprise IT.