Steps to configure a secure data store

This section lists the steps for setting up a secure cluster where all the communications are encrypted and the clients must be authenticated. This type of configuration is typically used in production environments.

Note:

While using the configuration commands for a secure store, use the -store-security/-security option with the appropriate value, wherever applicable.

Choose a block in the diagram below to know more about the configuration step.



Description of the illustration securestore.svg

For more details, see Multiple Node Secure Deployment.