This is a general to-do for secure communications. First shot at this would be implementation of key-based authentication.