Securing the network
Secure the network connections between the source and remote queue managers.
Use signed certificates to verify the authenticity of the source and remote queue managers. Transfer messages using a TLS network to encrypt messages.