7.2

Table Of Contents
vRealize Automation Post-Installation
Tasks 5
After you install vRealize Automation, there are post-installation tasks that might need your aention.
This chapter includes the following topics:
n
“Congure Federal Information Processing Standard Compliant Encryption,” on page 121
n
“Replacing Self-Signed Certicates with Certicates Provided by an Authority,” on page 122
n
“Change the Master vRealize Automation Appliance Host Name,” on page 122
n
“Change a Replica vRealize Automation Appliance Host Name,” on page 123
n
“Installing the vRealize Log Insight Agent on IaaS Servers,” on page 124
n
“Congure Access to the Default Tenant,” on page 124
Configure Federal Information Processing Standard Compliant
Encryption
You can enable or disable Federal Information Processing Standard (FIPS) 140–2 compliant cryptography for
inbound and outbound vRealize Automation appliance network trac.
Changing the FIPS seing requires a vRealize Automation restart. FIPS is disabled by default.
Procedure
1 Log in as root to the vRealize Automation appliance management interface.
hps://vrealize-automation-appliance-FQDN:5480
2 Click vRA  > Host .
3 Near the upper right, click the buon to enable or disable FIPS.
When enabled, inbound and outbound vRealize Automation appliance network trac on port 443 uses
FIPS 140–2 compliant encryption. Regardless of the FIPS seing, vRealize Automation uses AES–256
compliant algorithms to protect secured data stored on the vRealize Automation appliance.
N This vRealize Automation release only partially enables FIPS compliance, because some internal
components do not yet use certied cryptographic modules. In cases where certied modules have not
yet been implemented, the AES–256 compliant algorithms are used.
4 Click Yes to restart vRealize Automation.
VMware, Inc.
121