6.0.3

Table Of Contents
Procedure
1 Stop all services and start the services that handle certicate creation, propagation, and storage.
The service names dier on Windows and the vCenter Server Appliance.
Windows
service-control --stop --all
service-control --start VMWareAfdService
service-control --start VMWareDirectoryService
service-control --start VMWareCertificateService
vCenter Server
Appliance
service-control --stop --all
service-control --start vmafdd
service-control --start vmdird
service-control --start vmcad
2 Log in to each node and add the new machine certicates that you received from the CA to VECS.
All machines need the new certicate in the local certicate store to communicate over SSL.
vecs-cli entry delete --store MACHINE_SSL_CERT --alias __MACHINE_CERT
vecs-cli entry create --store MACHINE_SSL_CERT --alias __MACHINE_CERT --cert <cert-file-path>
--key <key-file-path>
3 Restart all services.
service-control --start --all
Example: Replace Machine SSL Certificates with Custom Certificates
You can replace the machine SSL certicate on each node the same way.
1 First, delete the existing certicate in VECS.
"C:\Program Files\VMware\vCenter Server\vmafdd\"vecs-cli entry delete --store
MACHINE_SSL_CERT --alias __MACHINE_CERT
2 Next, add the replacement certicate.
"C:\Program Files\VMware\vCenter Server\vmafdd\"vecs-cli entry create --store
MACHINE_SSL_CERT --alias __MACHINE_CERT --cert E:\custom-certs\ms-ca\signed-ssl\custom-w1-
vim-cat-dhcp-094.eng.vmware.com.crt --key E:\custom-certs\ms-ca\signed-ssl\custom-x3-vim-cat-
dhcp-1128.vmware.com.priv
What to do next
You can also replace the certicates for your ESXi hosts. See “Certicate Management for ESXi Hosts,” on
page 160.
After replacing the root certicate in a multi-node deployment, you must restart services on all
vCenter Server with external Platform Services Controller nodes.
Replace Solution User Certificates With Custom Certificates
After you replace the machine SSL certicates, you can replace the VMCA-signed solution user certicates
with third-party or enterprise certicates.
Solution users use certicates only to authenticate to vCenter Single Sign-On. If the certicate is valid,
vCenter Single Sign-On assigns a SAML token to the solution user, and the solution user uses the SAML
token to authenticate to other vCenter components.
Consider whether replacement of solution user certicates is necessary in your environment. Because
solution users are located behind a proxy server and the machine SSL certicate is used to secure SSL trac,
the solution user certicates might be less of a security concern.
Chapter 3 vSphere Security Certificates
VMware, Inc. 115