Requirements for connections through the Security Proxy include:
SSL/TLS must be enabled on the hosts to which you want to establish SSL/TLS connections. See the documentation included with the hosts for instructions.
A centralized management server with the Security Proxy Add-On installed must be available. The Security Proxy must be configured to require client authorization. (It can optionally be configured to require client authentication. For client authentication, you can use a single certificate or two separate client certificates on each server (Security Proxy and destination host).
You may need multiple digital certificates to successfully establish the SSL/TLS sessions between the client and the Security Proxy, and the client and the destination host.