Generate CA-Signed Certificates for the SDDC Management Components in Region B
When you replace the default certificates of the SDDC management products, you can manually generate certificate files that are signed by the intermediate Certificate Authority (CA).
Before you begin
Create a Microsoft Certificate Authority Template. See Create and Add a Microsoft Certificate Authority Template in Region B.
Generate a CSR for the certificate that you want to replace. You generate the CSR on the machine where the certificate is installed. See Generate Manually Key Pairs and Certificate Signing Requests for the Management Components in Region B.
Verify that the Windows host that you use to connect to the data center is connected to the lax01.rainpole.local domain.
Procedure
- Log in to the Windows host that has access to the AD server as an administrator.
Submit a request and download the certificate chain that contains the CA-signed certificate and the CA certificate.
- Open a Web Browser and go to http://dc51lax.lax01.rainpole.local/CertSrv/ to open the Web interface of the CA server.
Log in using the following credentials.
Setting
Value
User name
AD administrator
Password
ad_admin_password
Click the Request a certificate link.
- Click advanced certificate request.
- Open the CSR file .csr in a plain text editor.
- Copy everything from
-----BEGIN CERTIFICATE REQUEST-----
to-----END CERTIFICATE REQUEST-----
to the clipboard. - On the Submit a Certificate Request or Renewal Request page, paste the contents of the CSR file into the Saved Request box.
- From the Certificate Template drop-down menu, select VMware and click Submit.
- On the Certificate issued screen, click Base 64 encoded.
- Click the Download Certificate chain link and save the certificate chain file certnew.p7b to the Downloads folder.
Export the machine certificate to the correct format.
- Double-click the certnew.p7b file to open it in the Microsoft Certificate Manager.
- Navigate to certnew.p7b > Certificates and notice the three certificates.
- Right-click the machine certificate and select All Tasks > Export.
- In the Certificate Export Wizard, click Next.
- Select Base-64 encoded X.509 (.CER) and click Next.
- Browse to C:\certs and specify the certificate name in the File name text box.
Click Next and click Finish.
The certificate file is saved to the C:\certs folder.
Export the intermediate CA certificate file to the correct format.
- Double-click the certnew.p7b file to open it in the Microsoft Certificate Manager.
- Navigate to certnew.p7b > Certificates and notice the three certificates.
- Right-click the intermediate CA certificate and select All Tasks > Export.
- In the Certificate Export Wizard, click Next.
- Select Base-64 encoded X.509 (.CER) and click Next.
- Browse to C:\certs and enter Intermediate in the File name text box.
Click Next and click Finish.
The Intermediate.cer file is saved to the C:\certs folder.
Export the root CA certificate file in the correct format.
- Right-click the root certificate and select All Tasks > Export.
- In the Certificate Export Wizard, click Next.
- Select Base-64 encoded X.509 (.CER) and click Next.
- Browse to C:\certs and enter Root64 in the File name text box.
Click Next and click Finish.
The Root64.cer file is saved to the C:\certs folder.
Move the certificate file to the following C:\manual-certs\component folder under the following file names.
Management Component
Target Folder
Certificate File Names
ESXi hosts for the management cluster
C:\manual-certs\mgmt01esx.lax01
mgmt01esx51.cer
mgmt01esx52.cer
mgmt01esx53.cer
mgmt01esx54.cer
ESXi hosts for the shared edge and compute cluster
C:\manual-certs\comp01esx.lax01
comp01esx51.cer
comp01esx52.cer
comp01esx53.cer
comp01esx54.cer
Platform Services Controller for the management cluster
C:\manual-certs\lax01psc51.lax01
lax01psc51.lax01.cer
vCenter Server for the management cluster
C:\manual-certs\ mgmt01vc51.lax01
mgmt01vc51.lax01.cer
NSX Manager for the management cluster
C:\manual-certs\mgmt01nsxm51.lax01
mgmt01nsxm51.lax01.cer
Platform Services Controller for the shared edge and compute cluster
-
vCenter Server for the shared edge and compute cluster
C:\manual-certs\comp01vc51.lax01
comp01vc51.lax01.cer
NSX Manager for the shared edge and compute cluster
C:\manual-certs\comp01nsxm51.lax01
comp01nsxm51.lax01.cer
vSphere Data Protection
C:\manual-certs\mgmt01vdp51.lax01
vdp.p7b
Site Recovery Manager
C:\manual-certs\srm
mgmt01srm01.sfo01.cer
mgmt01srm51.lax01.cer
vSphere Replication
C:\manual-certs\vr
mgmt01vrms01.sfo01.cer
mgmt01vrms51.lax01.cer
vRealize Automation
vRealize Orchestrator
vRealize Business
vRealize Operations Manager
vRealize Log Insight
C:\manual-certs\vrli.lax01
vrli.lax01.cer
Generate a certificate chain file.
- Navigate to the directory C:\manual-certs\component.
For each management component, run the following command to create the certificate chain file.
|Management Component|Certificate Chain File Name| |:-------------------|:--------------------------| |Platform Services Controller for the management cluster|lax01psc51.lax01.chain.cer| |vCenter Server for the management cluster|mgmt01vc51.lax01.chain.cer| |NSX Manager for the management cluster|mgmt01nsxm51.lax01.chain.cer| |Platform Services Controller for the shared edge and compute cluster|Not applicable| |vCenter Server for the shared edge and compute cluster|comp01vc51.lax01.chain.cer| |NSX Manager for the shared edge and compute cluster|comp01nsxm51.lax01.chain.cer| |vSphere Data Protection|Not applicable| |Site Recovery Manager|- mgmt01srm01.sfo01.cer for Region A
mgmt01srm51.lax01.cer for Region B| |vSphere Replication|- mgmt01vrms01.sfo01.p12 for Region A
mgmt01vrms51.lax01.p12 for Region B| |vRealize Automation|Not applicable| |vRealize Orchestrator|Not applicable| |vRealize Business|Not applicable| |vRealize Operations Manager|Not applicable| |vRealize Log Insight|vrli-lax01.chain.cer|
``` {#GUID-9DC7BCC2-7BC6-4A67-B4FC-2CAD32145CCB__codeblock_8F1151EFF67F4A259B87CD7EB82A83ED .pre .codeblock} copy own-certificate-file+Intermediate.cer+Root64.cer component-chain-file
For example, run the following command to generate a certificate chain file for the NSX Manager for the management cluster. ``` {#GUID-9DC7BCC2-7BC6-4A67-B4FC-2CAD32145CCB__codeblock_C1FF4FE9CE0C4260A01268CC51EC3EEC .pre .codeblock} copy mgmt01nsxm51.lax01.cer+Intermediate.cer+Root64.cer mgmt01nsxm51.lax01.chain.cer
Repeat the procedure to generate signed certificates for the other products.
For each vCenter Server instance, create a certificate chain file CACert.chain.cer that contains the certificates of the root and intermediate CA in the vCenter Server specific folder.
|vCenter Server|Folder| |:-------------|:-----| |Management vCenter Server|C:\manual-certs\mgmt01vc51.lax01| |Compute vCenter Server|C:\manual-certs\comp01vc51.lax01|
{#GUID-9DC7BCC2-7BC6-4A67-B4FC-2CAD32145CCB__codeblock_0ADAB36F14FD4CA58D41B60D27BBE740 .pre .codeblock} copy Intermediate.cer+Root64.cer CACert.chain.cer
For Site Recovery Manager, convert the signed certificate to PKCS#12 format using OpenSSL on the Windows virtual machines of Site Recovery Manager and create a chain of CA certificates.
On the virtual machine of Site Recovery Manager, open a command prompt, go to C:\manual-certs and locate the following files.
Region
Certificate File Name
Region A
mgmt01srm01.sfo01.cer
mgmt01srm01.sfo01_ssl.key
Intermediate.cer
Root64.cer
Region B
mgmt01srm51.lax01.cer
mgmt01srm51.lax01_ssl.key
Intermediate.cer
Root64.cer
Run the following command to generate the PKCS#12 certificate and CA certificate chain.
Region
Command
Region A
openssl.exe pkcs12 -export -in mgmt01srm01.sfo01.cer -inkey mgmt01srm01.sfo01_ssl.key -name "srmprotected" -passout pass:VMware1! -out mgmt01srm01.sfo01.p12
copy Intermediate.cer+Root64.cer CACert.chain.cer
Region B
openssl.exe pkcs12 -export -in mgmt01srm51.lax01.cer -inkey mgmt01srm51.lax01_ssl.key -name "srmprotected" -passout pass:VMware1! -outmgmt01srm51.lax01.p12
copy Intermediate.cer+Root64.cer CACert.chain.cer
This command sets user name
srmprotected
and passwordVMware1!
for the PKCS#12 file.Repeat the steps to generate a PKCS#12 file and CACert.chain.cer for Site Recovery Manager in the other region.
For vSphere Replication, generate a PKCS#12 file.
On the Windows host open a command prompt, navigate to the C:\manual-certs directory and run the following command to create CA certificate chain and machine certificate files in the folder for vSphere Replication.
vSphere Replication
Command
vSphere Replication in Region A
copy Intermediate.cer+Root64.cer CACert.chain.cer
copy mgmt01vrms01.sfo01.cer+CACert.chain.cer mgmt01vrms01.sfo01.chain.cer
vSphere Replication in Region B
copy Intermediate.cer+Root64.cer CACert.chain.cer
copy mgmt01vrms51.sfo01.cer+CACert.chain.cer mgmt01vrms51.lax01.chain.cer
Copy the CACert.chain.cer file and mgmt01vrms01.sfo01.chain.cer for Region A or mgmt01vrms51.lax01.chain.cer for Region B to the /tmp/ssl folder on the vSphere Replication appliance.
You can use scp, FileZilla or WinSCP.
Log in to the vSphere Replication appliance again and run the following command to convert the own certificate to PKCS#12 format.
Specify a password. You must have a password when you upload and install the certificate.
vSphere Replication
Command
vSphere Replication in Region A
openssl pkcs12 -export -in mgmt01vrms01.sfo01.chain.cer -in keymgmt01vrms01.sfo01_ssl.key -name "vrmsprotected" -passoutpass:VMware1! -out mgmt01vrms01.sfo01.p12
vSphere Replication in Region B
openssl pkcs12 -export -in mgmt01vrms51.lax01.chain.cer -in keymgmt01vrms51.lax01_ssl.key -name "vrmsprotected" -passoutpass:VMware1! -out mgmt01vrms51.lax01.p12
Get the internal HMS keystore password:
{#GUID-9DC7BCC2-7BC6-4A67-B4FC-2CAD32145CCB__codeblock_464D5759CF2E4E2AA58BF0468B99A3CF .pre .codeblock} /opt/vmware/hms/bin/hms-configtool -cmd list | grep truststore
Import the certificate into the HMS truststore:
{#GUID-9DC7BCC2-7BC6-4A67-B4FC-2CAD32145CCB__codeblock_AE0FF34E68C84AD6A458F90269A34F5C .pre .codeblock} /usr/java/default/bin/keytool -import -trustcacerts -alias root -file /tmp/ssl/CACert.cer -keystore /opt/vmware/hms/security/hms-truststore.jks -storepass keystore_password
Enter yes at the command prompt and press Enter to complete the certificate import process.
Verify that the certificate is present in the HMS truststore.
{#GUID-9DC7BCC2-7BC6-4A67-B4FC-2CAD32145CCB__codeblock_C1E725FD266B4EAAB6EA407CEF8F1E0F .pre .codeblock} /usr/java/default/bin/keytool -list -keystore /opt/vmware/hms/security/hms-truststore.jks -storepass keystore_password –v
Copy mgmt01vrms01.sfo01.p12 or mgmt01vrms51.lax01.p12 to the dedicated folder on Windows host for access to the data center.
- Repeat the steps to generate a PCKS#12 certificate for the vSphere Replication appliance in the other region.
For vRealize Log Insight, on the master node appliance generate a .pem file that contains the key file and the signer and owner certificates.
- Copy the CACert.chain.cer file to C:\manual-certs\vrli.lax01.
Generate a vrli.lax01-chain.pem file that contains the host certificate with the intermediate certificate and root certificate, and the host private key.
{#GUID-9DC7BCC2-7BC6-4A67-B4FC-2CAD32145CCB__codeblock_33A15759EAE9444296D4C38C501951A7 .pre .codeblock} cd C:\manual-certs\vrli.lax01 copy vrli.lax01.cert+CACert.chain.cer+vrli.lax01.key > vrli-lax01-chain.pem
Parent topic: Region B Certificate Replacement