13.0 Configuring Identity Applications Clustering and Permission Clustering

You can configure Identity Applications clustering and permission clustering to use TCP or UDP.