6.0.3

Table Of Contents
5 In a text editor, combine the certicates to have the initial VMCA root certicate at the top and the CA
root certicate at the boom.
-----BEGIN CERTIFICATE-----
VMCA Certificate
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
CA intermediate certificates
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
Root CA certificate
-----END CERTIFICATE-----
6 Save the le as root_signing_chain.cer.
What to do next
Replace the existing root certicate with the chained root certicate. See “Replace VMCA Root Certicate
with Custom Signing Certicate and Replace All Certicates,” on page 86.
Replace VMCA Root Certificate with Custom Signing Certificate and Replace All
Certificates
You can replace the VMCA root certicate with a CA-signed certicate that includes VMCA as an
intermediate certicate in the certicate chain. Going forward, all certicates that VMCA generates include
the full chain.
You run vSphere Certicate Manager on an embedded installation or on an external
Platform Services Controller to replace the VMCA root certicate with a custom signing certicate.
vSphere Certicate Manager prompts you for the following information:
Prerequisites
n
Generate the CSR.
n
You can use vSphere Certicate Manager to create the CSR. See “Generate Certicate Signing
Requests with vSphere Certicate Manager (Intermediate CA),” on page 85
n
If you prefer to create the CSR manually, the certicate that you send to be signed must meet the
following requirements:
n
Key size: 2048 bits or more
n
PEM format. VMware supports PKCS8 and PKCS1 (RSA keys). When keys are added to VECS,
they are converted to PKCS8
n
x509 version 3
n
For root certicates CA extension must be set to true, and cert sign must be in the list of
requirements.
n
Make sure that all nodes in your environment are time synchronized.
n
No explicit limit to the length of the certicate chain. VMCA uses the OpenSSL default, which
is ten certicates.
n
VMCA does not support using certicates with wildcards or more than one DNS name.
n
You cannot create subsidiary CAs of VMCA.
n
After you receive the certicate from your third-party or enterprise CA, combine it with the initial
VMCA root certicate to generate a full chain with the VMCA root certicate at the boom. See
“Generate Certicate Signing Requests with vSphere Certicate Manager (Intermediate CA),” on
page 85.
vSphere Security
86 VMware, Inc.