How certifcations based auth works

  1. Users Enters Private Key Password.
  2. Client retrieves private-key and uses it to create evidence(“digital signature”)
  3. Client sends certificate and evidence across network
  4. Server uses certificate and evidence to authenticate the users identity
  5. Server authorizes access for authenticated identity