6.7

Table Of Contents
What to do next
Set certificate mode to Custom. If certificate mode is VMCA, the default, and you perform a certificate
refresh, your custom certificates are replaced with VMCA-signed certificates. See Change the Certificate
Mode.
Use Custom Certificates With Auto Deploy
By default, the Auto Deploy server provisions each host with certificates that are signed by VMCA. You
can set up the Auto Deploy server to provision all hosts with custom certificates that are not signed by
VMCA. In that scenario, the Auto Deploy server becomes a subordinate certificate authority of your third-
party CA.
Prerequisites
n
Request a certificate from your CA. The certificate must meet these requirements.
n
Key size: 2048 bits or more (PEM encoded)
n
PEM format. VMware supports PKCS8 and PKCS1 (RSA keys). When keys are added to VECS,
they are converted to PKCS8
n
x509 version 3
n
For root certificates, the CA extension must be set to true, and the cert sign must be in the list of
requirements.
n
SubjectAltName must contain DNS Name=<machine_FQDN>
n
CRT format
n
Contains the following Key Usages: Digital Signature, Non Repudiation, Key Encipherment
n
Start time of one day before the current time
n
CN (and SubjectAltName) set to the host name (or IP address) that the ESXi host has in the
vCenter Server inventory.
n
Name the certificate and key files rbd-ca.crt and rbd-ca.key.
Procedure
1 Back up the default ESXi certificates.
The certificates are located at /etc/vmware-rbd/ssl/.
2 From the vSphere Web Client, stop the Auto Deploy service.
a Select Administration, and click System Configuration under Deployment.
b Click Services.
c Right-click the service you want to stop and select Stop.
3 On the system where the Auto Deploy service runs, replace rbd-ca.crt and rbd-ca.key
in /etc/vmware-rbd/ssl/ with your custom certificate and key files.
vSphere Security
VMware, Inc. 65