An example on two parties authenticating each other

Usually identity verification is handled by SSL/TLS when communicating securely over the internet or another network. It only verifies the server’s identity. Clients are authenticated at a different level by the server, in most cases on the application layer.

Photo by Bernard Hermant on Unsplash

My goal in writing this article is to introduce you to the world of mutual authentication. This tutorial walks you through the steps of configuring two-way security using a NGINX server and a simple NodeJS application.
Therefore, I assume you have some familiarity with the above technologies as well as using Bash and Docker.

Before we dig in and start with…

Judith Freiberger

technology fangirl

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store