Connection security

The Controller and Agents

By default, the communication between the Controller and the Load Generator and Monitoring Agent only accepts trusted certificates, but you can change this if you need to. For more information, see how to manage certificates.

Note: Lowering the default level of security is potentially dangerous. Lower security can make your system vulnerable to unwanted or malicious activities, such as man-in-the-middle attacks. Please carefully consider when and where it is safe to do so.

The Load Generator that starts with the Controller is only available from the localhost by default. To change this behavior, see how to configure the Load Generator.

The Monitoring Agent that starts with the Controller only accepts tests started from a trusted Controller by default. To change this behavior, see how to configure the Monitoring Agent.

To increase the level of security of the HTTP communication to the NeoLoad Controller REST APIs, we recommend you use the SSL encryption. To secure HTTP communication, see how to enable SSL encryption.

As an additional security measure, you can also configure a firewall to limit the access to the Load Generator or Monitoring Agent. For more information, see how to configure a firewall. For details about managing the firewall and memory, see Advanced installation.

Monitors

The Monitors feature only accepts valid, secure certificates by default. To allow untrusted certificates, such as self-signed, go to your <project>.nlp file located in C:\Users\<user>\Documents\NeoLoad Projects\ and add the following line:

monitor.tls.insecure=true

NTS

NTS TLS connection only accepts secure certificates by default. To allow untrusted certificates, go to the <installationDirectory>/conf/controller_user.properties file and add the following line to the [General] section:

nts.tls.insecure=true 

Git and SVN

By default, the system always performs a TLS certificate check for connections to version control systems. To ignore any certificate errors, go to the <installationDirectory>/conf/controller_user.properties file and add the following line to the [General] section:

For Git: git.tls.insecure=true

For SVN: svn.tls.insecure=true