﻿---
title: APM agent TLS communication
description: TLS is disabled by default. When TLS is enabled for APM Server inbound communication, agents will verify the identity of the APM Server by authenticating...
url: https://www.elastic.co/elastic/docs-builder/docs/3016/solutions/observability/apm/apm-agent-tls-communication
products:
  - APM
  - Elastic Observability
applies_to:
  - Elastic Stack: Generally available
---

# APM agent TLS communication
TLS is disabled by default. When TLS is enabled for APM Server inbound communication, agents will verify the identity of the APM Server by authenticating its certificate.
When TLS is enabled, a certificate and corresponding private key are required. The certificate and private key can either be issued by a trusted certificate authority (CA) or be [self-signed](#apm-agent-self-sign).

## Use a self-signed certificate


### Step 1: Create a self-signed certificate

The Elasticsearch distribution offers the `certutil` tool for the creation of self-signed certificates:
1. Create a CA: `./bin/elasticsearch-certutil ca --pem`. You’ll be prompted to enter the desired location of the output zip archive containing the certificate and the private key.
2. Extract the contents of the CA archive.
3. Create the self-signed certificate: `./bin/elasticsearch-certutil cert --ca-cert <path-to-ca-crt>/ca.crt --ca-key <path-to-ca-key>/ca.key --pem --name localhost`
4. Extract the certificate and key from the resulted zip archive.


### Step 2: Configure the APM Server

Enable TLS and configure the APM Server to point to the extracted certificate and key:
<tab-set>
  <tab-item title="Fleet-managed">
    Enable TLS in the APM integration settings and use the [SSL/TLS input settings](https://www.elastic.co/elastic/docs-builder/docs/3016/solutions/observability/apm/apm-server/ssl-tls-input-settings) to set the path to the server certificate and key.
  </tab-item>

  <tab-item title="APM Server binary">
    The following is a basic APM Server SSL config with secure communication enabled. This will make APM Server serve HTTPS requests instead of HTTP.
    ```yaml
    apm-server.ssl.enabled: true
    apm-server.ssl.certificate: "/path/to/apm-server.crt"
    apm-server.ssl.key: "/path/to/apm-server.key"
    ```
    A full list of configuration options is available in [SSL/TLS input settings](https://www.elastic.co/elastic/docs-builder/docs/3016/solutions/observability/apm/apm-server/ssl-tls-input-settings).
    <tip>
      If APM agents are authenticating themselves using a certificate that cannot be authenticated through known CAs (e.g. self signed certificates), use the `ssl.certificate_authorities` to set a custom CA. This will automatically modify the `ssl.client_authentication` configuration to require authentication.
    </tip>
  </tab-item>
</tab-set>


### Step 3: Configure APM agents

When the APM server uses a certificate that is not chained to a publicly-trusted certificate (e.g. self-signed), additional configuration is required in the APM agent:
- **Go agent**: certificate pinning through [`ELASTIC_APM_SERVER_CERT`](https://docs-v3-preview.elastic.dev/elastic/docs-builder/docs/3016/reference/apm/agents/go/configuration#config-server-cert)
- **Python agent**: certificate pinning through [`server_cert`](https://docs-v3-preview.elastic.dev/elastic/docs-builder/docs/3016/reference/apm/agents/python/configuration#config-server-cert)
- **Ruby agent**: certificate pinning through [`server_ca_cert`](https://docs-v3-preview.elastic.dev/elastic/docs-builder/docs/3016/reference/apm/agents/ruby/configuration#config-ssl-ca-cert)
- **.NET agent**: [`ServerCert`](https://docs-v3-preview.elastic.dev/elastic/docs-builder/docs/3016/reference/apm/agents/dotnet/config-reporter#config-server-cert)
- **Node.js agent**: custom CA setting through [`serverCaCertFile`](https://docs-v3-preview.elastic.dev/elastic/docs-builder/docs/3016/reference/apm/agents/nodejs/configuration#server-ca-cert-file)
- **Java agent**: adding the certificate to the JVM `trustStore`. See [APM Server authentication](https://docs-v3-preview.elastic.dev/elastic/docs-builder/docs/3016/reference/apm/agents/java/ssl-configuration#ssl-server-authentication) for more details.

We do not recommend disabling APM agent verification of the server’s certificate, but it is possible:
- **Go agent**: [`ELASTIC_APM_VERIFY_SERVER_CERT`](https://docs-v3-preview.elastic.dev/elastic/docs-builder/docs/3016/reference/apm/agents/go/configuration#config-verify-server-cert)
- **.NET agent**: [`VerifyServerCert`](https://docs-v3-preview.elastic.dev/elastic/docs-builder/docs/3016/reference/apm/agents/dotnet/config-reporter#config-verify-server-cert)
- **Java agent**: [`verify_server_cert`](https://docs-v3-preview.elastic.dev/elastic/docs-builder/docs/3016/reference/apm/agents/java/config-reporter#config-verify-server-cert)
- **PHP agent**: [`verify_server_cert`](https://docs-v3-preview.elastic.dev/elastic/docs-builder/docs/3016/reference/apm/agents/php/configuration-reference#config-verify-server-cert)
- **Python agent**: [`verify_server_cert`](https://docs-v3-preview.elastic.dev/elastic/docs-builder/docs/3016/reference/apm/agents/python/configuration#config-verify-server-cert)
- **Ruby agent**: [`verify_server_cert`](https://docs-v3-preview.elastic.dev/elastic/docs-builder/docs/3016/reference/apm/agents/ruby/configuration#config-verify-server-cert)
- **Node.js agent**: [`verifyServerCert`](https://docs-v3-preview.elastic.dev/elastic/docs-builder/docs/3016/reference/apm/agents/nodejs/configuration#validate-server-cert)


## Client certificate authentication

APM Server does not require agents to provide a certificate for authentication, and there is no dedicated support for SSL/TLS client certificate authentication in Elastic’s backend agents.