Related pages: |
This page describes how to configure the .NET Agent to connect to the Controller with SSL.
Before you configure the agent to enable SSL, gather this information:
The .NET Agent requires that the Common Name (CN) on the Controller certificate matches the DNS name of the Controller. Additionally, certificates for the root CA that signed the Controller's SSL certificate must reside in the Windows Trusted Root Certification Authorities store for the Local Computer.
The root certificates for most publicly trusted CA signing authorities, such as DigiCert, Verisign, Thawte, and other commercial CAs, are in the Trusted Root Certification Authorities store by default.
If your organization uses internal CA to sign certificates, you may need to obtain the root CA certificate from your internal security management resource. To import the root certificate, see Adding Certificates to the Trusted Root Certification Authorities store for a Local Computer.
This example shows how to use the Certificate snap-in for the Microsoft Management Console to import a certificate for a Trusted Root Certification Authority:
If an intermediate CA signed the Controller certificate, you must import the certificate for the intermediate CA in addition to the one for the root CA that signed the intermediate CA certificate. If your Controller is publicly accessible, you can use a certificate checker to identify the certificates required to complete the trust chain. |
This example shows the Intermediate Certification Authorities store:
You can update the SSL settings for the agent by:
When you enable SSL for the .NET Agent, you automatically enable SSL for the .NET Machine Agent.
443
.8181
.ServicePointManager.SecurityProtocol
in your application.If you use automatic tier configuration, restart IIS. For example, open a command prompt and enter:
iisreset |
Upon restart, the agent connects with the Controller via SSL.
8181
. See Controller Port Attribute.true
. See Controller SSL Attribute. When you enable SSL, the agent secures communication to the Controller using the protocols set for ServicePointManager.SecurityProtocol
in your application. true
to add TLS 1.2 as the first option in the list of protocols. This affects all secure communications from your application, not just requests to the Controller.AppDynamics.Agent.Coordinator
service.If you use Automatic configuration, restart IIS. For example, open a command prompt and run:
iisreset |
Upon restart, the agent connects with the Controller via SSL.
<?xml version="1.0" encoding="utf-8"?> <appdynamics-agent xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"> <controller host="mycompany.saas.appdynamics.com" port="443" ssl="true" enable_tls12="true"> <application name="MyDotNetApplication" /> </controller> ... </appdynamics-agent> |
<?xml version="1.0" encoding="utf-8"?> <appdynamics-agent xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"> <controller host="mycontroller.mycompany.com" port="8181" ssl="true" enable_tls12="true"> <application name="MyDotNetApplication" /> </controller> ... </appdynamics-agent> |
If you verified all prerequisites and still have communication issues, verify that the default ciphers are enabled in Windows Server.
Check this Registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\ |
If subkeys exist, your operations team may have disabled certain ciphers.