- Agents >
- Automation Agent >
- Configure Automation Agent for Access Control >
- Configure the Automation Agent for x.509 Client Certificate Authentication
Configure the Automation Agent for x.509 Client Certificate Authentication¶
On this page
Ops Manager enables you to configure the Authentication Mechanisms that all clients, including the Ops Manager Agents, use to connect to your MongoDB deployments. You can enable multiple authentication mechanisms for each of your projects, but you must choose only one mechanism for the Agents.
MongoDB supports x.509 certificate authentication for use with a secure TLS/SSL connection. The x.509 client authentication allows clients to authenticate to servers with certificates rather than with a username and password.
Note
Ops Manager can manage agent authentication for you if you use Automation to manage the agents. With Automation, Ops Manager creates the users for each agent and configures the agent appropriately. To learn more about authentication, see Enable x.509 Authentication for your Ops Manager Project.
Considerations¶
A full description of Transport Layer Security, public key infrastructure, X.509 certificates, and Certificate Authorities is beyond the scope of this tutorial. This tutorial assumes prior knowledge of TLS/SSL and access to valid X.509 certificates.
Prerequisites¶
To enable x.509 Authentication for Ops Manager, you must obtain valid certificates generated and signed by a single certificate authority. Refer to the Client x.509 Certificate in the MongoDB Manual for more about the certificate requirements.
x.509 Client Certificate Authentication requires you to enable and configure TLS/SSL for the deployment.
Procedures¶
This tutorial assumes that you have already configured your MongoDB deployment to use x.509 certificate authentication and SSL. If you have not done so, refer to the Use x.509 Certificates to Authenticate Clients and Configure mongod and mognos for TLS/SSL tutorials.
Create MongoDB User for the subject
¶
For the Automation Agent to connect to your MongoDB deployment, you
must create a user for the Automation Agent in the $external
database.
For x.509 certificate authentication, use the subject
value of your
client certificate as the username.
Use the following commands to create the users from a mongo
shell
connected to your MongoDB deployment:
For more information on the required access, see Required Access for Automation Agent.
You can only associate an x.509 client certificate with a single user; each user must have its own certificate.
Edit Agent Configuration File¶
x.509 requires that you configure the agent for TLS/SSL:
Specify path to trusted CA certificate.¶
If your Ops Manager deployment uses TLS/SSL, then you must configure the Automation Agent to use TLS/SSL. To configure the agent to use TLS/SSL, you must have a trusted Certificate Authority certificate that signed the MongoDB instance’s certificate.
In the agent’s install directory, edit the configuration file to set
sslTrustedMMSServerCertificate
field to the path of a
file containing one or more certificates in PEM format.
Platform | Installation Method | Default Config File Path |
---|---|---|
RHEL, CentOS, Amazon Linux and Ubuntu | package manager | /etc/mongodb-mms/automation-agent.config |
macOS or other Linux distributions | tar |
/path/to/install/local.config |
Windows | msi |
C:\MMSData\Automation\automation-agent.config |
Example
If you would use the following command to connect through the mongo shell:
Then you would modify the configuration file, setting this key/value pair:
To learn more about these settings, see Ops Manager SSL Settings.
Restart the agent.¶
Configure Automation Agent for SSL provides more details about configuring the Automation Agent for TLS/SSL.
Once you have configured the Automation Agent, you still need to configure the x.509 Authentication mechanism in the Ops Manager interface, as described in Enable x.509 Authentication for your Ops Manager Project.