13.0
Configuring Identity Applications Clustering and Permission Clustering
You can configure Identity Applications clustering and permission clustering to use TCP or UDP