Key Usage property. Their primary purpose in this system is to verify the identity of a server so that communication can be trusted.
While you may configure a platform and station (as server) with separate server certificates, for simplicity most systems usually use the same server certificate.
Identity verification uses multiple certificates in a trusted certificate tree Setting up identity verification may involve a third-party CA (Certificate Authority) or you may decide to serve as your own CA.

In the illustration above:
How many certificates you need depends on your configuration. At a minimum you need a unique server certificate for each server (controller) and a single root CA certificate to sign your server certificates. If your company is large, you may need an intermediate certificate for each geographical division or location. An individual server may have multiple certificates: one each to secure its Fox, Http and niagarad (platformtls) connections. Although each platform and station usually share the same certificate, you may create a separate platform certificate and a different station certificate.
If your network is large and thousands of certificates need to be signed, it is best to use the Signing Service (also see Niagara Signing Service Guide) or provisioning jobs.