The use of TLS encryption is optional.
These steps assume creating a separate key database for the certificates and keys. If you want to use an existing key database, consult the IBM documentation for creating host and client certificates and keys using an existing database.