Sema bro .. :) Even In my eng college, No one explained clearly like this. UA-cam is not recommending this type of channels rather recommending random shit Respect videos :P .. Subscribed :) Hearty Thanks
Thanks you so much for putting these tutorials together. I have learned so much and was able to actually work with kafka now on my job as no one had a clue. I hope you make more series because your way of teaching is really good with the analogies you use. Keep up the good work and I'm sure eventually your channel will have an exponential growth! Definitely subscribing 😀
Client authenticates with Server. CA is an authority who contains its own certificate and a key to sign the certificate of client and server For mutual TLS server and client both should have a private key and certificate pair To generate - Create a private key for server and then create certificate singeing request to CA the authority . It gives a certificate signed backed to the server . Now server has its own private key and certificate. The certificate has details and a public key by which the client can validate the server The above procedure is also same while doing it for client Now server and client both have a pair of their own certificate and private key Now when the communication happens between them they also contain the authority certificate using which their own certificates were signed and created. This just make sure server and client can validate each other s certificates by a trusted source . It is like in an Indian marriage both parties talk to their common friend to make sure the bride and groom are legit . That is before the marriage Now both server and client both should have 1. Own certificate which also has public key 2. Private key 3. Authority or issuer certificate Done.
The analogy is excellent. It helps me to remember various steps in TLS/SSL mechanism
Nice explanation for SSL.
excellent
Best explanation I have seen, thanks!
Sema bro .. :) Even In my eng college, No one explained clearly like this. UA-cam is not recommending this type of channels rather recommending random shit Respect videos :P .. Subscribed :) Hearty Thanks
Thanks for your support 🙏🙏
Great job! bro Nice explanation
Very Good Explanation and Example is relatable.
Hi, Good one!!! Just made couple of my Kafka topics secured using SSL 👍
Thanks da !!
superb explanation, thank you so much and keep it up
Thanks you so much for putting these tutorials together. I have learned so much and was able to actually work with kafka now on my job as no one had a clue. I hope you make more series because your way of teaching is really good with the analogies you use. Keep up the good work and I'm sure eventually your channel will have an exponential growth! Definitely subscribing 😀
Awesome content.... I have learnt alot already... Its my first time working with Kafka... Thanks for this
Thanks a lot for your support Norbert :)
Great video!
@anshuagnihotri9489 Thanks for the support.
Simplified explanation with everything covered from roots.
Thanks for your comments :)
very easy to understand, much appreciated
Thanks for your comments 🙏🙏
Easy to understand, thank you very much!
Great tutorial !
Great explanation.
How does the client get the Trustore file to validate the sever's keystore? Do we manually download it to the client system from the server?
thank you brother, that would be great if you'll develop an end to end project with python and kafka!
this series has helped me so much! thank you :)
Thanks for your support 😊
Very nice explanation.
Thanks for your support 😊
thank you 🍻
Great content bro.. 👍
Thanks bro 🙏
Amazing
this is too good
Thanks for your support 🙏
Thanks!
super bro!
Thanks Bro 🙏🙏
Super
Client authenticates with Server.
CA is an authority who contains its own certificate and a key to sign the certificate of client and server
For mutual TLS server and client both should have a private key and certificate pair
To generate - Create a private key for server and then create certificate singeing request to CA the authority . It gives a certificate signed backed to the server . Now server has its own private key and certificate. The certificate has details and a public key by which the client can validate the server
The above procedure is also same while doing it for client
Now server and client both have a pair of their own certificate and private key
Now when the communication happens between them they also contain the authority certificate using which their own certificates were signed and created. This just make sure server and client can validate each other s certificates by a trusted source .
It is like in an Indian marriage both parties talk to their common friend to make sure the bride and groom are legit . That is before the marriage
Now both server and client both should have
1. Own certificate which also has public key
2. Private key
3. Authority or issuer certificate
Done.
seng... 🤣