Securing Ruby Applications with mTLS
Additionally, We didn’t need to make any changes to our infrastructure, except for adding the certificate and keys to the entities originating the requests from our private subnets. See below for troubleshooting techniques which can be useful when setting up mTLS..