6.0.3

Table Of Contents
Example: Replacing the Root Certificate
Replace the VMCA root certicate with the custom CA root certicate using the certool command with the
--rootca option.
C:\>"C:\Program Files\VMware\vCenter Server\vmcad\certool" --rootca --cert=C:\custom-
certs\root.pem -–privkey=C:\custom-certs\root.key
When you run this command, it:
n
Adds the new custom root certicate to the certicate location in the le system.
n
Appends the custom root certicate to the TRUSTED_ROOTS store in VECS.
n
Adds the custom root certicate to vmdir.
What to do next
You can remove the original VMCA root certicate from the certicate store if company policy requires it. If
you do, you have to refresh these internal certicates:
n
Replace the vCenter Single Sign-On Signing certicate. See “Refresh the STS Root Certicate,” on
page 50.
n
Replace the VMware Directory Service certicate. See “Replace the VMware Directory Service
Certicate,” on page 110.
Replace Machine SSL Certificates (Intermediate CA)
After you have received the signed certicate from the CA and made it the VMCA root certicate, you can
replace all machine SSL certicates.
These steps are essentially the same as the steps for replacing with a certicate that uses VMCA as the
certicate authority. However, in this case, VMCA signs all certicates with the full chain.
Each machine must have a machine SSL certicate for secure communication with other services. In a multi-
node deployment, you must run the Machine SSL certicate generation commands on each node. Use the --
server parameter to point to the Platform Services Controller from a vCenter Server with external
Platform Services Controller.
Prerequisites
For each machine SSL certicate, the SubjectAltName must contain DNS Name=<Machine FQDN>.
Procedure
1 Make one copy of certool.cfg for each machine that needs a new certicate.
You can nd certool.cfg in the following locations:
Windows
C:\Program Files\VMware\vCenter Server\vmcad
Linux
/usr/lib/vmware-vmca/share/config/
2 Edit the custom conguration le for each machine to include that machine's FDQN.
Run NSLookup against the machine’s IP address to see the DNS listing of the name, and use that name for
the Hostname eld in the le.
3 Generate a public/private key le pair and a certicate for each machine, passing in the conguration
le that you just customized.
For example:
certool --genkey --privkey=machine1.priv --pubkey=machine1.pub
certool --gencert --privkey=machine1.priv --cert machine42.crt --Name=Machine42_Cert --
config machine1.cfg
vSphere Security
104 VMware, Inc.