6.0.3

Table Of Contents
Replace the Default Certificate and Key from the ESXi Shell
You can replace the default VMCA-signed ESXi certicates from the ESXi Shell.
Prerequisites
n
If you want to use third-party CA-signed certicates, generate the certicate request, send it to the
certicate authority, and store the certicates on each ESXi host.
n
If necessary, enable the ESXi Shell or enable SSH trac from the vSphere Web Client. See “Use the
vSphere Web Client to Enable Access to the ESXi Shell,” on page 202.
n
All le transfers and other communications occur over a secure HTTPS session. The user who is used to
authenticate the session must have the privilege Host.. on the host. For more
information on assigning privileges through roles, see “Managing Permissions for vCenter
Components,” on page 141.
Procedure
1 Log in to the ESXi Shell, either directly from the DCUI or from an SSH client, as a user with
administrator privileges.
2 In the directory /etc/vmware/ssl, rename the existing certicates using the following commands.
mv rui.crt orig.rui.crt
mv rui.key orig.rui.key
3 Copy the certicates that you want to use to /etc/vmware/ssl.
4 Rename the new certicate and key to rui.crt and rui.key.
5 Restart the host after you install the new certicate.
Alternatively, you can put the host into maintenance mode, install the new certicate, use the Direct
Console User Interface (DCUI) to restart the management agents, and set the host to exit maintenance
mode.
What to do next
Update the vCenter Server TRUSTED_ROOTS store. See “Update the vCenter Server TRUSTED_ROOTS
Store (Custom Certicates),” on page 170.
Replace a Default Certificate and Key With the vifs Command
You can replace the default VMCA-signed ESXi certicates with the vifs command.
Prerequisites
n
If you want to use third-party CA-signed certicates, generate the certicate request, send it to the
certicate authority, and store the certicates on each ESXi host.
n
If necessary, enable the ESXi Shell or enable SSH trac from the vSphere Web Client. See “Use the
vSphere Web Client to Enable Access to the ESXi Shell,” on page 202.
n
All le transfers and other communications occur over a secure HTTPS session. The user who is used to
authenticate the session must have the privilege Host.. on the host. For more
information on assigning privileges through roles, see “Managing Permissions for vCenter
Components,” on page 141.
Procedure
1 Back up the existing certicates.
2 Generate a certicate request following the instructions from the certicate authority.
Chapter 5 Securing ESXi Hosts
VMware, Inc. 169