6.0.3

Table Of Contents
n
On a management node (external installation):
C:\>"C:\Program Files\VMware\vCenter Server\vmcad\"certool --getrootca --server=<psc-ip-
or-fqdn>
The output looks similar to this:
output:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
cf:2d:ff:49:88:50:e5:af
...
2 (Optional) List the VECS TRUSTED_ROOTS store and compare the certicate serial number there with
the output from Step 1.
This command works on both Platform Services Controller and management nodes because VECS polls
vmdir.
"C:\Program Files\VMware\vCenter Server\vmafdd\"vecs-cli entry list --store TRUSTED_ROOTS --
text
In the simplest case with only one root certicate, the output looks like this:
Number of entries in store : 1
Alias : 960d43f31eb95211ba3a2487ac840645a02894bd
Entry type : Trusted Cert
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
cf:2d:ff:49:88:50:e5:af
3 Generate a new VMCA root certicate. The certicate is added to the TRUSTED_ROOTS store in VECS
and in vmdir (VMware Directory Service).
C:\>"C:\Program Files\VMware\vCenter Server\vmcad\"certool --selfca --config="C:\Program
Files\VMware\vCenter Server\vmcad\certool.cfg"
On Windows, --config is optional because the command uses the default certool.cfg le.
Replace Machine SSL Certificates with VMCA-Signed Certificates
After you generate a new VMCA-signed root certicate, you can replace all machine SSL certicates in your
environment.
Each machine must have a machine SSL certicate for secure communication with other services. In a multi-
node deployment, you must run the Machine SSL certicate generation commands on each node. Use the --
server parameter to point to the Platform Services Controller from a vCenter Server with external
Platform Services Controller.
Prerequisites
Be prepared to stop all services and start the services that handle certicate propagation and storage.
vSphere Security
94 VMware, Inc.