This page describes the requirements, supported environments, and versions supported by the Cisco Secure Application.
All references to Google products herein are for informational purposes only and Google retains all rights in all Google product names, logos, marks, and other trademarks. |
The Cisco Secure Application capabilities are integrated with these APM Agents:
The Java APM Agent with Cisco Secure Application works on the following platforms:
<JAVA_AGENT_HOME>/ver<VERSION>/external-services/argentoDynamicService/
. See Install the Java Agent.Review Install App Server Agents for instructions and guidance. provides an Agent Installer that simplifies the agent installation process and streamlines the deployment of Java and Machine Agents. The Cisco Secure Application capabilities are integrated only with Java Agent JDK8+. The Java Agent Legacy does not support Cisco Secure Application. Ensure the following if you have installed the correct agent:
1.8
in the directory name, for example, AppServerAagent-1.8-22.6.0
. argentoDynamicService
folder is listed under external-services
.The .NET Agent with Cisco Secure Application works on all frameworks that the .NET Agent instruments. To view the full list, see .NET Supported Environments and its Limitations.
Supported:
Reporting of vulnerability for .NET, and beta support for .NET Framework.
Reporting of Command Execution events. Only process filtering policies are supported for this feature.
Azure Site Extension for Reporting of Command Execution events, and Vulnerability Reporting.
Not supported:
Stack filtering for Command Execution events feature.
See Vulnerability Reporting on Node.js Agent.
Within the Java Agent, the Cisco Secure Application capabilities require:
There is a negligible resource utilization with the .NET Agent. However, this may change based on the application usage.
Currently, Google Chrome is the supported browser for accessing Cisco Secure Application dashboard.
To use Cisco Secure Application within the supported APM Agent, ensure:
Controller >= 22.8. These versions reflect recommended minimum versions. We continually update our technology, so it's optimal to use the most recent agent version when possible.
Java Agent: Ensure that Java APM Agent >= 22.8 is installed and licensed. If you are using reverse proxy, ensure you configure properties to communicate from the APM Agent to the Controller. See Configure Properties to Use Reverse Proxy.
Cisco Secure Application automatically interprets the APM agent setting for an HTTP Proxy server and uses the same server for communication between the agent and Controller. However, you must configure these settings for the APM agent to communicate with Controller through a reverse proxy:
|
Specify the reverse proxy URL:
-Dargento.management.server.reverse.proxy.url=http://<reverse-proxy-host>:<reverse-proxy-port>/ |
Here, reverse-proxy-host and reverse-proxy-port are the hostname and port of the reverse proxy that will direct communications to the Controller.
Specify the domain:
-Dargento.management.server.add.headers=Host:<tenant-name>.saas.appdynamics.com |
Here, tenant-name is the tenant name of the Controller.
In the JVM, configure these Cisco Secure Application system properties to use the reverse proxy:
Dargento.management.server.authentication.access.key
-Dargento.management.server.authentication.access.key=<access-key> |
Here, access-key is the access key specific to the tenant.
Dargento.management.server.authentication.user
-Dargento.management.server.authentication.user=singularity-agent@<tenant-name> |
Here, tenant-name is the tenant name of the Controller.