Home SecurityNetwork Security How does certificate-based authentication work?