In a previous blog post, we discussed the use of certificates for authenticating clients and servers in general. Now it's time to see how all this theory works in the real world.In this tutorial, we will see how to call a technical API exposed by an ...