How certifcations based auth works
- Users Enters Private Key Password.
- Client retrieves private-key and uses it to create evidence(“digital signature”)
- Client sends certificate and evidence across network
- Server uses certificate and evidence to authenticate the users identity
- Server authorizes access for authenticated identity