6.0.3

Table Of Contents
Host Upgrades and Certificates
If you upgrade an ESXi host to ESXi 6.0 or later, the upgrade process replaces self-signed certicates with
VMCA-signed certicates. The process retains custom certicates even if those certicates are expired or
invalid.
The recommended upgrade workow depends on the current certicates.
Host Provisioned with
Thumbprint Certificates
If your host is currently using thumbprint certicates, it is automatically
assigned VMCA certicates as part of the upgrade process.
N You cannot provision legacy hosts with VMCA certicates. You must
upgrade to ESXi 6.0 or later.
Host Provisioned with
Custom Certificates
If your host is provisioned with custom certicates, usually third-party CA-
signed certicates, those certicates remain in place. Change the certicate
mode to Custom to ensure that the certicates are not replaced accidentally.
N If your environment is in VMCA mode, and you refresh the
certicates from the vSphere Web Client, any existing certicates are
replaced with certicates that are signed by VMCA.
Going forward, vCenter Server monitors the certicates and displays
information, for example, about certicate expiration, in the
vSphere Web Client.
If you decide not to upgrade your hosts to vSphere 6.0 or later, the hosts retain the certicates that they are
currently using even if the host is managed by a vCenter Server system that uses VMCA certicates.
Hosts that are being provisioned by Auto Deploy are always assigned new certicates when they are rst
booted with ESXi 6.0 software. When you upgrade a host that is provisioned by Auto Deploy, the Auto
Deploy server generates a certicate signing request (CSR) for the host and submits it to VMCA. VMCA
stores the signed certicate for the host. When the Auto Deploy server provisions the host, it retrieves the
certicate from VMCA and includes it as part of the provisioning process.
You can use Auto Deploy with custom certicates.
ESXi Certificate Default Settings
When vCenter Server requests a Certicate Signing Request (CSR) from an ESXi host, it uses default
seings. Most of the default values are well suited for many situations, but company-specic information
can be changed.
Consider changing the organization, and location information. You can change many of the default seings
using the vSphere Web Client. See “Change Certicate Default Seings,” on page 165.
Table 53. CSR Settings
Parameter Default Value Advanced Option
Key Size 2048 N.A.
Key Algorithm RSA N.A.
Certicate Signature Algorithm sha256WithRSAEncryption N.A.
vSphere Security
162 VMware, Inc.