This page describes the requirements, supported environments, and versions supported by the Cisco Secure Application.

All references to Google products herein are for informational purposes only and Google retains all rights in all Google product names, logos, marks, and other trademarks.

Software Requirements

The Cisco Secure Application capabilities are integrated with these APM Agents:

Java APM Agent

The Java APM Agent with Cisco Secure Application works on the following platforms:

Review Install App Server Agents for instructions and guidance. provides an Agent Installer that simplifies the agent installation process and streamlines the deployment of Java and Machine Agents. The Cisco Secure Application capabilities are integrated only with Java Agent JDK8+. The Java Agent Legacy does not support Cisco Secure Application. Ensure the following if you have installed the correct agent:

.NET APM Agent

The .NET Agent with Cisco Secure Application works on all frameworks that the .NET Agent instruments. To view the full list, see .NET Supported Environments and its Limitations

Supported:

Not supported: 

Node.js Agent

See Vulnerability Reporting on Node.js Agent

Resource Utilization and Performance Impact

Within the Java Agent, the Cisco Secure Application capabilities require:

There is a negligible resource utilization with the .NET Agent. However, this may change based on the application usage.

Browser Requirements

Currently, Google Chrome is the supported browser for accessing Cisco Secure Application dashboard.

Before You Begin 

To use Cisco Secure Application within the supported APM Agent, ensure:

Configure Properties to Use Reverse Proxy

Cisco Secure Application automatically interprets the APM agent setting for an HTTP Proxy server and uses the same server for communication between the agent and Controller. However, you must configure these settings for the APM agent to communicate with Controller through a reverse proxy:

  • The reverse proxy configuration may change based on the reverse proxy solution that you use. Ensure that you use a pass-through reverse proxy to forward any requests containing /argento-agent/v1 or auth/v1/oauth to <tenant-name>.saas.appdynamics.com.
  • These steps are not applicable for the .NET Agent because the .NET Agent does not support reverse proxy.
  1. In the JVM, configure the reverse proxy details for Cisco Secure Application:
    1. Specify the reverse proxy URL:

      -Dargento.management.server.reverse.proxy.url=http://<reverse-proxy-host>:<reverse-proxy-port>/

      Here, reverse-proxy-host and reverse-proxy-port are the hostname and port of the reverse proxy that will direct communications to the Controller.

    2. Specify the domain:

      -Dargento.management.server.add.headers=Host:<tenant-name>.saas.appdynamics.com

      Here, tenant-name is the tenant name of the Controller.

  2. In the JVM, configure these Cisco Secure Application system properties to use the reverse proxy:

    1. Dargento.management.server.authentication.access.key

      -Dargento.management.server.authentication.access.key=<access-key>

      Here, access-key is the access key specific to the tenant.

    2. Dargento.management.server.authentication.user

      -Dargento.management.server.authentication.user=singularity-agent@<tenant-name>

      Here, tenant-name is the tenant name of the Controller.