Steps to configure a secure data store
This section lists the steps for setting up a secure cluster where all the communications are encrypted and the clients must be authenticated. This type of configuration is typically used in production environments.
Note:
While using the configuration commands for a secure store, use the-store-security/-security option with the appropriate value, wherever applicable.
Choose a block in the diagram below to know more about the configuration step.
For more details, see Multiple Node Secure Deployment.