Key Usage property. Their primary purpose in this system is to verify the identity of a server so that communication can be trusted.
While you may set up a separate certificate for each protocol (Foxs, Https, Webs). While you may configure a platform and station (as server) with separate server certificates, for simplicity most systems usually use the same server certificate.
Identity verification uses multiple certificates in a trusted certificate tree Setting up identity verification may involve a third-party CA (Certificate Authority) or you may decide to serve as your own CA.

In the illustration above:
How many certificates you need depends on your configuration. At a minimum you need a unique server certificate for each server (controller) and a single root CA certificate to sign your server certificates. If your company is large, you may need an intermediate certificate for each geographical division or location. An individual server may have multiple certificates: one each to secure its Fox, Http and Niagarad (platformtls) connections. Although each platform and station usually share the same certificate, you may create a separate platform certificate and a different station certificate.
If your network is large and getting thousands of certificates signed would be difficult, you may sign a wildcard certificate. Instead of identifying a specific IP or domain (for example, server1.domain.com), a wildcard certificate uses *.domain.com.