Configuring trusted connection with KATA Central Node
To configure trusted connection between Kaspersky Endpoint Agent and KATA Central Node, perform the following actions on Kaspersky Endpoint Agent side:
In the main Kaspersky Security Center Web Console window select Devices → Policies and profiles.
Select the policy you want to configure.
In the <Policy name> window that opens, select the Application settings tab.
In the KATA integration section select KATA integration settings.
The KATA integration settings window opens.
In the Connection settings group, select the Use pinned certificate to protect connection check box.
Click the Add new TLS certificate button.
The window for adding a new TLS certificate opens.
Perform one of the following actions to add a TLS certificate:
Add a certificate file. Click Upload, and in the window that opens, select the certificate file and click Open.
Copy and paste the contents of the certificate file to the TLS certificate data field.
Kaspersky Endpoint Agent may have only one KATA server TLS certificate. If you have added a TLS certificate before and then add a TLS certificate once again, only the last added certificate is valid.
Click OK.
Information about the added TLS certificate is shown in the TLS certificate data group of settings.
If you want to configure additional connection protection by a user certificate, do the following:
Select the Secure connection with the client certificate check box.
Click the Load Crypto-container button.
In the window that opens select the PFX archive and click Open.
In the Crypto-container password field, enter the password for the PFX archive.
Click OK.
In the upper right corner of the settings group, change the switch from Undefined to Enforce.
The default switch position is Enforce.
Click OK.
A Trusted connection to the KATA server is now configured.
The TLS certificate file must satisfy the following requirements:
The file must contain the certificate itself and a private encryption key for the connection.
The file must be in PEM or DER format.
The private key length must be 2048 bits or longer.
For more details about preparing TLS certificates for import, refer to OpenSSL documentation.