Home SecurityMobile Security How does certificate-based authentication work?