diff --git a/pkg/auth/grpc.go b/pkg/auth/grpc.go
index e2b89c4f0c2c22ac7e921d78aefca70e10682142..a947a33bab75da4c55ca9575e15d915fbc480b67 100644
--- a/pkg/auth/grpc.go
+++ b/pkg/auth/grpc.go
@@ -131,6 +131,15 @@ func WithOAuth2Credentials(ctx context.Context, tokenURL, clientID, clientSecret
 
 // WithTLSCredentials возвращает опции для создания grpc-соединения с TLS-сертификатами
 func WithTLSCredentials(ctx context.Context, cert, cacert, key []byte) (grpc.DialOption, error) {
+	creds, err := TLSCredentials(ctx, cert, cacert, key)
+	if err != nil {
+		return nil, err
+	}
+	return grpc.WithTransportCredentials(creds), nil
+}
+
+// TLSCredentials возвращает TransportCredentials для создания grpc-соединения с TLS-сертификатами
+func TLSCredentials(ctx context.Context, cert, cacert, key []byte) (credentials.TransportCredentials, error) {
 	certPool := x509.NewCertPool()
 	if !certPool.AppendCertsFromPEM(cacert) {
 		return nil, errors.New("CA certificate not loaded")
@@ -139,5 +148,5 @@ func WithTLSCredentials(ctx context.Context, cert, cacert, key []byte) (grpc.Dia
 	if err != nil {
 		return nil, err
 	}
-	return grpc.WithTransportCredentials(credentials.NewTLS(&tls.Config{Certificates: []tls.Certificate{clientCert}, RootCAs: certPool})), nil
+	return credentials.NewTLS(&tls.Config{Certificates: []tls.Certificate{clientCert}, RootCAs: certPool}), nil
 }