Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 6 Next »

The following section contains instructions for creating and using TLS Certificates in a test environment. These instructions are not intended for use in a production environment. It is preferable you contact your IT/Network Security department to obtain instruction for the creation and use of TLS Certificates.

These steps and the certificates created from them should not be used for a production environment without approval from your company’s Security professional.

How you create your certificate chain depends on your desired security posture. There are two options:

  1. TLS with Server Certificate Authentication

  2. TLS with Server and Client Certificate Authentication

  • No labels