6.0.3

Table Of Contents
Request Certificates and Import a Custom Root Certificate
If company policy does not allow an intermediate CA, VMCA cannot generate the certicates for you. You
use custom certicates from an enterprise or third-party CA.
Prerequisites
The certicate must meet the following requirements:
n
Key size: 2048 bits or more (PEM encoded)
n
PEM format. VMware supports PKCS8 and PKCS1 (RSA keys). When keys are added to VECS, they are
converted to PKCS8
n
x509 version 3
n
For root certicates, the CA extension must be set to true, and the cert sign must be in the list of
requirements.
n
SubjectAltName must contain DNS Name=<machine_FQDN>
n
CRT format
n
Contains the following Key Usages: Digital Signature, Non Repudiation, Key Encipherment
Procedure
1 Send CSRs for the following certicates to your enterprise or third-party certicate provider.
n
A machine SSL certicate for each machine. For the machine SSL certicate, the SubjectAltName
eld must contain the fully qualied domain name (DNS NAME=machine_FQDN)
n
Optionally, four solution user certicates for each embedded system or management node. Solution
user certicates should not include IP address, host name, or email address. Each certicate must
have a dierent certicate Subject.
Typically, the result is a PEM le for the trusted chain, plus the signed SSL certicates for each
Platform Services Controller or management node.
2 List the TRUSTED_ROOTS and machine SSL stores.
vecs-cli store list
a Ensure that the current root certicate and all machine SSL certicates are signed by VMCA.
b Note down the Serial number, issuer, and Subject CN elds.
c (Optional) With a Web browser, open a HTTPS connection to a node where the certicate will be
replaced, check the certicate information, and ensure that it matches the machine SSL certicate.
3 Stop all services and start the services that handle certicate creation, propagation, and storage.
The service names dier on Windows and the vCenter Server Appliance.
Windows
service-control --stop --all
service-control --start VMWareAfdService
service-control --start VMWareDirectoryService
service-control --start VMWareCertificateService
vCenter Server
Appliance
service-control --stop --all
service-control --start vmafdd
service-control --start vmdird
service-control --start vmcad
Chapter 3 vSphere Security Certificates
VMware, Inc. 113