6.0.3

Table Of Contents
Procedure
1 Log in to the vCenter Server system that manages the ESXi hosts.
Log in to the Windows system on which you installed the software, or log in to the
vCenter Server Appliance shell.
2 Run vecs-cli to add the new certicates to the TRUSTED_ROOTS store, for example:
/usr/lib/vmware-vmafd/bin/vecs-cli entry create --store TRUSTED_ROOTS --alias custom1.crt --
cert /etc/vmware/ssl/custom1.crt
Option Description
Linux
/usr/lib/vmware-vmafd/bin/vecs-cli entry create --store
TRUSTED_ROOTS --alias custom1.crt --
cert /etc/vmware/ssl/custom1.crt
Windows
C:\Program Files\VMware\vCenter Server\vmafdd\vecs-cli
entry create --store TRUSTED_ROOTS --alias custom1.crt --
cert c:\ssl\custom1.crt
What to do next
Set certicate mode to Custom. If certicate mode is VMCA, the default, and you perform a certicate
refresh, your custom certicates are replaced with VMCA-signed certicates. See “Change the Certicate
Mode,” on page 167.
Use Custom Certificates with Auto Deploy
By default, the Auto Deploy server provisions each host with certicates that are signed by VMCA. You can
set up the Auto Deploy server to provision all hosts with custom certicates that are not signed by VMCA.
In that scenario, the Auto Deploy server becomes a subordinate certicate authority of your third-party CA.
Prerequisites
n
Request a certicate that meets your requirements from your CA.
n
Key size: 2048 bits or more (PEM encoded)
n
PEM format. VMware supports PKCS8 and PKCS1 (RSA keys). When keys are added to VECS,
they are converted to PKCS8
n
x509 version 3
n
For root certicates, the CA extension must be set to true, and the cert sign must be in the list of
requirements.
n
SubjectAltName must contain DNS Name=<machine_FQDN>
n
CRT format
n
Contains the following Key Usages: Digital Signature, Non Repudiation, Key Encipherment
n
Name the certicate and key les rbd-ca.crt and rbd-ca.key.
Procedure
1 Back up the default ESXi certicates.
The certicates are located at /etc/vmware-rbd/ssl/.
Chapter 5 Securing ESXi Hosts
VMware, Inc. 171