This article mainly discusses how to prevent Intermediate attackers and how to configure cert using certificates without password login.