3.7.2 Secure connections