According to this (great) Microsoft article, there is a cryptographic check that occurs for Client Certificate Authentication:
"The client is authenticated by using its private key to sign a hash of all the messages up to this point. The recipient verifies the signature using the public key of the signer, thus ensuring it was signed with the client’s private key."
How is this cryptographic validation completed using mTLS and Azure Functions?
I understand how to compare certificate properties as outlined in the article Configure TLS mutual authentication - Azure App Service, but how is this crypto check performed?
⚠Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.
@SeaDude Thank you for your query, our team will look into it and get back to you at the earliest.
Found out from one of my colleagues that the TLS handshake negotiated by Microsofts server (load balancer/host server for the Function) contains the cryptographic check which validates: