When interfaces are developed in PI/PO, I have seen that:
>sometimes we get the Firewall opened/ The IP list is white listed. I mean the network and platform team open the firewall between PI IP's and the third party IP's.
>In some other cases, only the certificates are installed in certificate key store. The certificate handshake is done.
>In some other cases, only the keys are put in certificate key store.
Can someone let me know what is the difference between the above three and in which scenario, which one of above three has to be followed?
Thanks in advance.