Agents are authenticated by the following things:
If all of these authentication tests succeed, the agent’s claimed name is accepted.
Each agent that wishes to connect to the manager must have
a corresponding entry in agents.yml
which defines agent-specific parameters.
Each entry must include the following items:
secret_hash
: the SHA256 hash of the pre-shared secret associated with the agentallowed_ips
: an IP range (or a list of them) in CIDR notation specifying the allowed IP address ranges for the agentClient certificate validation is controlled by the tls_*
settings in manager.yml
.
You can set up your own private Certificate Authority using Smallstep CA for a fairly simple and reliable agent certificate provisioning process. See Installation for how to do this.