Users Guide
Extracting thumbprint from the old certicate
You can extract the thumbprint from the old certicate and upload it to the Platform Services by using the following options:
• Extract the thumbprint by using a Certicate Viewer Tool. See Extracting the certicate thumbprint by using a Certicate Viewer
tool.
• Extract the thumbprint by using a command line on the appliance. See Extracting Thumbprint by using the command line.
Extracting the certicate thumbprint by using a Certicate Viewer tool
Perform the following steps to extract the certicate thumbprint:
1. In Windows, double-click the old_machine.txt le to open it in Windows Certicate Viewer.
2. In Windows Certicate Viewer, select the SHA1 Thumbprint eld.
3. Copy the thumbprint string into a plain text editor and replace the spaces with colons or remove the spaces from the string.
For example, the thumbprint string can appear as either of the following:
• ea87e150bb96fbbe1fa95a3c1d75b48c30db7971
• ea:87:e1:50:bb:96:fb:be:1f:a9:5a:3c:1d:75:b4:8c:30:db:79:71
Extracting Thumbprint by using the command line
You can see the following sections for extracting thumbprint by using the command line on the appliance and Windows installation.
Extracting thumbprint by using the Command Line on the vCenter server appliance
Perform the following steps:
1. Move or upload the old_machine.crt certicate to PSC in the C:\certicates\old_machine.crt location that is created in step 1
of retrieving the old certicate procedure. You can use Windows Secure Copy (WinSCP) or another SCP client to move or
upload the certicate.
2. Log in to the External Platform Services Controller appliance through Secure Shell (SSH).
3. Run the following command to enable accessing the Bash shell: shell.set --enabled true.
4. Type shell and press Enter.
5. Run the following command to extract the thumbprint: openssl x509 -in /certificates/old_machine.crt -
noout -sha1 –fingerprint
NOTE: The thumbprint appears as a sequence of numbers and letters after the equal sign, which is as follows: SHA1
Fingerprint= ea:87:e1:50:bb:96:fb:be:1f:a9:5a:3c:1d:75:b4:8c:30:db:79:71
Extracting thumbprint by using the Command Line on Windows installation
Perform the following steps:
1. Move or upload the old_machine.crt certicate to PSC in the C:\certicates\old_machine.crt location that is created in step 1
of retrieving the old certicate procedure. You can use Windows Secure Copy (WinSCP) or another SCP client to move or
upload the certicate.
2. Connect to External Platform Services Controller through remote desktop connection.
3. Open command prompt in administrative mode.
4. Run the following command to extract the thumbprint: "%VMWARE_OPENSSL_BIN%" x509 -in c:\certificates
\old_machine.crt -noout -sha1 –fingerprint
NOTE: The thumbprint appears as a sequence of numbers and letters after the equal sign, which is as follows: SHA1
Fingerprint=09:0A:B7:53:7C:D9:D2:35:1B:4D:6D:B8:37:77:E8:2E:48:CD:12:1B
Run the ls_update_certs.py with the old thumbprint. Log out and log in to the vCenter Web client after the services are updated
successfully. The Dell plug-in launches successfully.
Firmware Update Wizard shows a message mentioning that the bundles are not retrieved from
rmware repository. How can I continue with the rmware update?
In Web client, when you are running the Firmware Update wizard for a single host, the Select Components screen displays the
rmware details for the components. If you select the desired rmware updates and click Back twice to arrive at the Welcome page
115