Securing Connections

    The client doesn’t have control over access controls, but clients do provide the configurations required to authenticate with the system, bind to an account, and to require TLS.