Exploring mTLS
Like most apps, we have some resources that need to be protected more carefully than others. In our case, this included sensitive data that should only be available through a trusted app flow.
For a while, our protection model was mostly based around access tokens. They were required for every