As we mentioned at the beginning of this chapter, when we describe bearer tokens, when you use this kind of authentication in a production environment, you have to use encrypted connections. In this section, we will describe how WildFly Swarm and OpenShift support the use of secure connections.
We will separate this section into two different cases, depending on whether we consider our cloud environment to be secured or not.