Replicate Data to TLS-enabled Downstream Services

    Before you begin, do the following preparations:

    1. Generate the key file required for the client to access the downstream service.

    Steps