Conceptly
← All Concepts
πŸ”’

TLS/SSL

ProtocolEncryption and identity verification for internet communication

TLS (Transport Layer Security) is a protocol that encrypts communication between client and server and verifies the server's identity through certificates. It's used everywhere sensitive data travels: HTTPS, email (SMTPS), database connections, and more.

β–ΆArchitecture Diagram

πŸ”„ Process

Dashed line animations indicate the flow direction of data or requests

Why do you need it?

Any network path that crosses shared infrastructure can be observed or tampered with. If credentials or session tokens travel in plaintext, eavesdropping may be enough to compromise an account, and if clients cannot verify server identity, impersonation becomes possible as well. So the real security requirement is not only to hide data, but also to prove who is on the other end and detect silent modification in transit. TLS exists to solve those problems together rather than as separate afterthoughts. It turns an ordinary application connection into one that is encrypted, authenticated, and integrity-protected.

Why did this approach emerge?

As the internet became a medium for logins, payments, and other sensitive transactions, the old assumption that a simple connection was good enough stopped working. SSL emerged to protect early web commerce, but over time weaknesses in cryptographic choices, handshake design, and deployment practices forced repeated improvements. TLS is the product of that hardening process. Modern HTTPS being the default is not a sign of excessive caution; it is a recognition that open networks are hostile by default and that plaintext application traffic is operationally unacceptable in many contexts. TLS became foundational because internet communication needed security to become normal infrastructure, not an optional add-on.

How does it work inside?

A TLS connection begins with a handshake rather than immediately sending application data. The client and server negotiate supported cryptographic parameters, the server presents a certificate claiming its identity, and the client validates that certificate against a chain of trust, the requested hostname, and validity constraints such as expiration. Once identity checks pass, both sides derive shared session keys and switch to fast symmetric encryption for the rest of the session. From that point forward, application data is encrypted and protected against tampering as it moves over the wire. The result is not just secrecy, but a higher-confidence communication channel in which both parties have stronger guarantees about who they are talking to and whether the data was altered.

What is it often confused with?

TLS and VPN both rely on encryption, but they protect different scopes of communication. TLS secures individual application connections, such as a browser talking to a web server or a service talking to a database. VPN secures a broader network path, creating a tunnel through which many kinds of traffic can flow together. That makes TLS the natural fit when the question is 'how do I protect this service interaction?' and VPN the natural fit when the question is 'how do I connect this network or remote user safely to another network?' Treating them as interchangeable because both are 'encrypted' misses the important distinction between connection security and path security.

When should you use it?

TLS is appropriate for websites, APIs, service-to-service traffic, mail protocols, and database connections -- essentially any interaction where exposed contents or spoofed identity would be a real problem. It is increasingly valuable inside private infrastructure too, because internal boundaries are rarely as trustworthy as they appear on diagrams. Operationally, though, TLS also introduces certificate issuance, renewal, trust chain management, termination design, and protocol hygiene as ongoing responsibilities. A single expired certificate can make a healthy service look completely broken to clients. Using TLS well therefore means treating encryption and identity verification as part of routine system operations, not just as a checkbox for external traffic.

HTTPS -- encrypting communication between web browsers and serversAPI security -- protecting REST and gRPC communication between servicesEmail encryption -- protecting mail content with SMTPS and IMAPSDatabase connections -- encrypting the client-to-database link