Can someone please take a look at it. Thanks
You can only use client auth for user authentication. The others are used for cluster tls management
Thanks @MB How to determine these list of auths, any references?
My doubt is regarding,
know how to decide what usages should I include, would it be mention in the exam question?
@Mohamed Ayman @Mumshad Mannambeth @Vijin Palazhi Please help me to get this doubt clear.