Users Guide

Table Of Contents
5. Retrieve the old certificate by using the following command: /usr/lib/vmware-vmafd/bin/vecs-cli
entry getcert --store BACKUP_STORE --alias bkp___MACHINE_CERT --output /certificates/
old_machine.crt
6. Retrieve the old certificate thumbprint by using the following command: openssl x509 -in /certificates/
old_machine.crt -noout -sha1 -fingerprint
NOTE: The retrieved certificate thumbprint is in the following format: SHA1
Fingerprint=13:1E:60:93:E4:E6:59:31:55:EB:74:51:67:2A:99:F8:3F:04:83:88
The thumbprint is a sequence of numbers and alphabets which appears as
follows:13:1E:60:93:E4:E6:59:31:55:EB:74:51:67:2A:99:F8:3F:04:83:88
7. Retrieve the new certificate by using the following command:/usr/lib/vmware-vmafd/bin/vecs-cli
entry getcert --store MACHINE_SSL_CERT --alias __MACHINE_CERT --output /certificates/
new_machine.crt
8. Run the following command to change the directory: cd /usr/lib/vmidentity/tools/scripts/
9. Perform the following steps:
a. Run ls_update_certs.py by using the following command. python ls_update_certs.py --url
b. Replace psc.vmware.com by Lookup_Service_FQDN_of_Platform_Services_Controller and the
13:1E:60:93:E4:E6:59:31:55:EB:74:51:67:2A:99:F8:3F:04:83:88 thumbprint with the thumbprint obtained in step
6 by using the following command: https://psc.vmware.com/lookupservice/sdk --fingerprint
13:1E:60:93:E4:E6:59:31:55:EB:74:51:67:2A:99:F8:3F:04:83:88 --certfile /certificates/
new_machine.crt --user Administrator@vsphere.local --password "Password"
NOTE: Ensure to provide valid credentials.
10. Log out and log in to the vCenter Web client after all the services are updated successfully.
OMIVV now launches successfully.
Retrieving the old certificate from Managed Object Browser-MOB
You can retrieve the old certificate for the vCenter server system by connecting to Platform Service Controller (PSC) by using
the Managed Object Browser (MOB).
To retrieve the old certificate, you should find the sslTrust field of the ArrayOfLookupServiceRegistrationInfo managed object by
performing the following steps:
NOTE: In this guide, the C:\certificates\ folder location is used to store all certificates.
1. Create the C:\certificates\ folder on PSC by using the following command: mkdir C:\certificates\.
2. Open the following link in a browser: https://<vCenter FQDN|IP address>/lookupservice/mob?
moid=ServiceRegistration&method=List
3. Log in with the administrator@vsphere.local user name and provide the password when prompted.
NOTE: If you are using a custom name for vCenter Single Sign-On (SSO) domain, use that user name and password.
4. In filterCriteria, modify the value field to show only the tags <filtercriteria></filtercriteria> and click Invoke Method.
5. Search for the following hostnames depending on the certificates that you are replacing:
Table 40. Search criteria information
Trust anchors Search criteria
vCenter server Use Ctrl+F to search, vc_hostname_or_IP.example.com on
the page
Platform Services Controller Use Ctrl+F to search, psc_hostname_or_IP.example.com on
the page
6. Locate the value of the corresponding sslTrust field. The value of the sslTrust field is Base64 encoded string of the old
certificate.
7. Use the following examples when updating the Platform Services Controller or vCenter Server trust anchors.
Frequently Asked Questions-FAQ
137