Agents are authenticated by the following things:
If all of these authentication tests succeed, the agent’s claimed name is accepted.
Each agent that wishes to connect to the manager must have
a corresponding entry in agents.yml
which defines agent-specific parameters.
Each entry must include the following items:
secret_hash: the SHA256 hash of the pre-shared secret associated with the agentallowed_ips: an IP range (or a list of them) in CIDR notation specifying the allowed IP address ranges for the agentClient certificate validation is controlled by the tls_* settings in manager.yml.
You can set up your own private Certificate Authority using Smallstep CA for a fairly simple and reliable agent certificate provisioning process. See Installation for how to do this.