Administrator Guide
• As certicates expire, you must periodically perform tasks in Replacing self-signed certicates with CA-signed certicates again.
Viewing the certicates
You can view certicates in the GUI, by opening the certlm.msc snap-in on the Console VM, and targeting the snap-in at Dell Hybrid Cloud
System for Microsoft computers that are running Windows Azure Pack website services, SMA, and SPF. These VMs are <
Prex
>APT01
and <
Prex
>APA01.
Replacing self-signed certicates with CA-signed certicates
The self-signed certicates that are generated as part of Dell Hybrid Cloud System for Microsoft installation are intended to be temporary.
As a security best practice, if there are self-signed certicates still supporting Dell Hybrid Cloud System for Microsoft website services, you
should promptly replace them with certicates that are issued by a trusted certication authority (CA), such as VeriSign or Thawte. The
type of certicate you want for Dell Hybrid Cloud System for Microsoft website services is also called an SSL certicate.
You must also perform procedures in this section when you are updating expired certicates, as part of regular certicate management.
It is especially important that the following components use trusted certicates:
• Tenant portal
• Tenant public API
• Tenant authentication site
• Management portal for administrators
• SMA.
Updating self-signed certicates to CA-signed certicates involves the following tasks:
• Step 1: Export the self-signed certicates to .pfx les, and create a folder tree for the certicates
• Step 2: Obtain certicates from a trusted certication authority and copy the .cer les to a share
• Step 3: Import the trusted root and intermediate certication authority .cer les to establish the certicate chain on each VM
• Step 4: Prepare the le share with the new .pfx certicates
• Step 5: Update to the new trusted certication authority certicate on each component virtual machine
• Step 6: Secure the shares that you created.
Each of these steps is described in the sections that follow.
Step 1: Export the self-signed certicates to .pfx les, and create a folder
tree for the certicates
1 On the Console VM, create a UNC (Universal Naming Convention) le share to back up existing certicates.
a Create a folder, for example C:\WAPCerts.
b Right-click the folder, point to Share with, and then click Specic people.
c Type the user account <Prefix>-System, and then click Add.
d Under Permission Level for the <Prex>-System account, click Read, and change it to Read/Write.
e Click Share, and then click Done.
The le share path will be \\<Prex>CON01\WAPCerts.
2 Sign in to the Windows Azure Pack management portal for administrators by using an account that is a member of the <
Prex
>-Ops-
Admins group
3 Create a PowerShell Credential asset. The password for this asset is used to protect the private keys of the exported certicates.
a In the Windows Azure Pack management portal for administrators, click Automation in the navigation pane.
b On the Automation page, click Assets.
128
Security