Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 711

Mutual Authentication

What is Mutual Authentication?

Mutual AuthenticationAn authentication exchange in which both communicating parties — client and server, or two services — cryptographically prove their identities to each other before exchanging data.


Mutual authentication, sometimes called two-way authentication, requires both sides of a connection to verify the other's identity, not just the server proving itself to the client. The dominant implementation today is mutual TLS (mTLS) defined in RFC 8446 for TLS 1.3, where each side presents an X.509 certificate validated against a private CA. Other examples include Kerberos AP-REQ / AP-REP, SSH host plus key auth, IPsec IKEv2 with certificate authentication, and FIDO2/WebAuthn ceremonies that include attestation. Mutual authentication is mandatory in service-mesh deployments (Istio, Linkerd, Consul) and in zero-trust architectures such as Google BeyondCorp, where every workload-to-workload call is authenticated with short-lived SPIFFE identities. It mitigates impersonation, man-in-the-middle and rogue-service attacks.

Examples

  1. 01

    Istio service mesh enforcing mTLS between every pair of microservices in a Kubernetes cluster.

  2. 02

    Banking APIs requiring client certificates issued by the bank's private CA in addition to OAuth tokens.

Frequently asked questions

What is Mutual Authentication?

An authentication exchange in which both communicating parties — client and server, or two services — cryptographically prove their identities to each other before exchanging data. It belongs to the Identity & Access category of cybersecurity.

What does Mutual Authentication mean?

An authentication exchange in which both communicating parties — client and server, or two services — cryptographically prove their identities to each other before exchanging data.

How does Mutual Authentication work?

Mutual authentication, sometimes called two-way authentication, requires both sides of a connection to verify the other's identity, not just the server proving itself to the client. The dominant implementation today is mutual TLS (mTLS) defined in RFC 8446 for TLS 1.3, where each side presents an X.509 certificate validated against a private CA. Other examples include Kerberos AP-REQ / AP-REP, SSH host plus key auth, IPsec IKEv2 with certificate authentication, and FIDO2/WebAuthn ceremonies that include attestation. Mutual authentication is mandatory in service-mesh deployments (Istio, Linkerd, Consul) and in zero-trust architectures such as Google BeyondCorp, where every workload-to-workload call is authenticated with short-lived SPIFFE identities. It mitigates impersonation, man-in-the-middle and rogue-service attacks.

How do you defend against Mutual Authentication?

Defences for Mutual Authentication typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Mutual Authentication?

Common alternative names include: Two-way authentication, Mutual TLS, mTLS.

Related terms