6.0.3

Table Of Contents
3 Select option 1 to generate the CSR, answer the prompts and exit Certicate Manager.
As part of the process, you have to provide a directory. Certicate Manager places the certicate and
key les in the directory.
4 If you also want to replace all solution user certicates, restart Certicate Manager.
5 Select option 5.
6 Supply the password and the Platform Services Controller IP address or host name if prompted.
7 Select option 1 to generate the CSRs, answer the prompts and exit Certicate Manager.
As part of the process, you have to provide a directory. Certicate Manager places the certicate and
key les in the directory.
On each Platform Services Controller node, Certicate Manager generates one certicate and key pair.
On each vCenter Server node, Certicate Manager generates four certicate and key pairs.
What to do next
Perform certicate replacement.
Add a Trusted Root Certificate to the Certificate Store
If you want to use third-party certicates in your environment, you must add a trusted root certicate to the
certicate store.
Prerequisites
Obtain the custom root certicate from your third-party or in-house CA.
Procedure
1 From a Web browser, connect to the Platform Services Controller by specifying the following URL:
https://psc_hostname_or_IP/psc
In an embedded deployment, the Platform Services Controller host name or IP address is the same as
the vCenter Server host name or IP address.
2 Specify the user name and password for administrator@vsphere.local or another member of the vCenter
Single Sign-On Administrators group.
If you specied a dierent domain during installation, log in as administrator@mydomain.
3 Under Certicates, select  Management and specify the IP address or host name for the
Platform Services Controller and the user name and password of the administrator of the local domain
(administrator@vsphere.local by default), and click Submit.
4 Select Trusted Root , and click Add .
5 Click Browse and select the location of the certicate chain.
You can use a le of type CER, PEM, or CRT.
What to do next
Replace the Machine SSL certicates and, optionally, the Solution User certicates with certicates that are
signed by this CA.
Chapter 3 vSphere Security Certificates
VMware, Inc. 81