There are two versions of this article. Select the version you wish to read:
When a service cannot authenticate itself
FULL Read this version if you are comfortable with cloud architecture, and basic concepts of cybersecurity and cryptography.
When a service cannot authenticate itself (Condensed)
CONDENSED Read this version if you are not very technical but are still interested in finding out how services can talk to each other and be sure they know who they’re talking to.