Automatic rotation of agents certificate

You can configure the agents to generate new certificates periodically by enabling agent certificate auto-rotation.

You can configure agents to generate a new key pair and certificate automatically by using any of the following methods:
  • The bulkSetAgentKeypairPolicy udclient command for generating the key pair of agents in bulk.
  • The setAgentKeypairPolicy udclient command for generating the key pair of a specific agent. Alternatively, you can add the following parameter to the agent's installed.properties file:
    agentcomm.keypair.maxAgeDays=90
    The agentcomm.keypair.maxAgeDays property defines the validity of the certificate in days. The minimum allowed value is 90 days.
    Note: You must restart the agent if you are editing the agent's installed.properties file.
After you define the agents' maxAgeDays property, the agents are configured to automatically rotate their certificates. The agents will attempt to rotate their certificate 30 days before they expire. For example, if you have set the agents' maxAgeDays property as 90, the agents will attempt to rotate their key pair after 60 days.
Important: The unupgraded agents and agents that are often offline intentionally do not rotate certificates or might not rotate certificates promptly. You must ensure that you upgrade and start such agents once before their expiry to rotate their certificates automatically.
Notes:
  • The certificate rotation does not interfere with any running deployment process.
  • You can verify that the agents have rotated the certificate as configured from the agent's Agent Security page.