Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
21 changes: 19 additions & 2 deletions src/content/docs/privacy-proxy/concepts/authentication.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -9,12 +9,13 @@ Privacy Proxy requires clients to authenticate before proxying traffic. This pag

## Authentication methods

Privacy Proxy supports two authentication methods:
Privacy Proxy supports three authentication methods:

| Method | Use case | Privacy level |
| -------- | ---------- | --------------- |
| Pre-shared key (PSK) | Proof of concept, testing | Lower |
| Privacy Pass tokens | Production deployments | Higher |
| Privacy Pass tokens | Client to server | High |
| mTLS | Server to server | Higher |
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This should be High to match "Privacy Pass tokens"


---

Expand Down Expand Up @@ -134,6 +135,22 @@ For production deployments using Privacy Pass:

---

## Mutual TLS (mTLS)

[Mutual TLS (mTLS) authentication](https://www.cloudflare.com/learning/access-management/what-is-mutual-tls/) ensures that traffic is both secure and trusted in both directions. The client presents a certificate to the proxy, and the proxy validates it before allowing the connection.

### How it works

The client includes a TLS client certificate during the TLS handshake. The proxy validates the certificate against a configured certificate authority (CA) and allows the connection if the certificate is trusted.

### Limitations

You must provision and manage certificates for each client or service. mTLS is designed for server-to-server communication, not for authenticating individual users. The proxy can identify the client by its certificate, which reduces privacy compared to Privacy Pass.

Use mTLS for server-to-server integrations where both parties are trusted services.

---

## Authentication in double-hop deployments

In [double-hop deployments](/privacy-proxy/concepts/deployment-models/#double-hop), authentication occurs at two levels:
Expand Down
Loading