The following section contains instructions for creating and using TLS Certificates in a test environment. These instructions are not intended for use in a production environment. It is preferable you contact your IT/Network Security department to obtain instruction for the creation and use of TLS Certificates.
These steps and the certificates created from them should not be used for a production environment without approval from your company’s Security professional.
How you create your certificate chain depends on your desired security posture. There are two options:
TLS with Server Certificate Authentication
TLS with Server and Client Certificate Authentication