7.3

Table Of Contents
Table 29. Certificate Implementations
Component
Minimal Deployment (non-
production) Distributed Deployment (production-ready)
vRealize
Automation
Appliance
Generate a self-signed certificate
during appliance configuration.
For each appliance cluster, you can use a certificate from an
internal or external certificate authority. Multi-use and wildcard
certificates are supported.
IaaS Components During installation, accept the
generated self-signed certificates or
select certificate suppression.
Obtain a multi-use certificate, such as a Subject Alternative Name
(SAN) certificate, from an internal or external certificate authority
that your Web client trusts.
Certificate Chains
If you use certificate chains, specify the certificates in the following order.
n
Client/server certificate signed by the intermediate CA certificate
n
One or more intermediate certificates
n
A root CA certificate
Include the BEGIN CERTIFICATE header and END CERTIFICATE footer for each certificate when you
import certificates.
Certificate Changes if Customizing the vRealize Automation Login
URL
If you want users to log in to a URL name other than a vRealize Automation appliance or load balancer
name, see the pre and post installation CNAME steps in Set the vRealize Automation Login URL to a
Custom Name.
Extracting Certificates and Private Keys
Certificates that you use with the virtual appliances must be in the PEM file format.
The examples in the following table use Gnu openssl commands to extract the certificate information you
need to configure the virtual appliances.
Table 210. Sample Certificate Values and Commands (openssl)
Certificate Authority Provides Command Virtual Appliance Entries
RSA Private Key openssl pkcs12 -in path _to_.pfx
certificate_file -nocerts -out key.pem
RSA Private Key
PEM File openssl pkcs12 -in path _to_.pfx
certificate_file -clcerts -nokeys -out
cert.pem
Certificate Chain
(Optional) Pass Phrase n/a Pass Phrase
Installing vRealize Automation
VMware, Inc. 34