Chapter 3. Configuring HTTPS
This chapter describes how to configure HTTPS endpoints.
Authentication Alternatives
Target-Only Authentication
Mutual Authentication
Specifying Trusted CA Certificates
When to Deploy Trusted CA Certificates
Specifying Trusted CA Certificates for HTTPS
Specifying an Application’s Own Certificate
Deploying Own Certificate for HTTPS