6.0.3

Table Of Contents
Procedure
1 Generate a CSR and send it to your CA.
Follow your CA's instructions.
2 Prepare a certicate le that includes the signed VMCA certicate along with the full CA chain of your
third party CA or enterprise CA, and save the le, for example, as rootca1.crt.
You can accomplish this by copying all CA certicates in PEM format into a single le. You have to start
with the VMCA certicate root and end with the root CA PEM certicate. For example:
-----BEGIN CERTIFICATE-----
<Certificate of VMCA>
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
<Certificate of intermediary CA>
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
<Certificate of Root CA>
-----END CERTIFICATE-----
3 Stop all services and start the services that handle certicate creation, propagation, and storage.
The service names dier on Windows and the vCenter Server Appliance.
Windows
service-control --stop --all
service-control --start VMWareAfdService
service-control --start VMWareDirectoryService
service-control --start VMWareCertificateService
vCenter Server
Appliance
service-control --stop --all
service-control --start vmafdd
service-control --start vmdird
service-control --start vmcad
4 Replace the existing VMCA root CA.
certool --rootca --cert=rootca1.crt --privkey=root1.key
When you run this command, it:
n
Adds the new custom root certicate to the certicate location in the le system.
n
Appends the custom root certicate to the TRUSTED_ROOTS store in VECS (after a delay).
n
Adds the custom root certicate to vmdir (after a delay).
5 (Optional) To propagate the change to all instances of vmdir (VMware Directory Service), publish the
new root certicate to vmdir, supplying the full le path for each le.
For example:
dir-cli trustedcert publish --cert rootca1.crt
Replication between vmdir nodes happens every 30 seconds. You do not have to add the root certicate
to VECS explicitly because VECS polls vmdir for new root certicate les every 5 minutes.
6 (Optional) If necessary, you can force a refresh of VECS.
vecs-cli force-refresh
7 Restart all services.
service-control --start --all
Chapter 3 vSphere Security Certificates
VMware, Inc. 103