Identifiers are set in IPsec instance configuration section.
No example documentation of such configuration is available at the moment. The guidelines above were gathered from previous testing of similar setup.
When different secrets are used, connectivity is established only over one of the tunnels.