Generate Manually Key Pairs and Certificate Signing Requests for the ESXi Hosts in Region B
If you plan to manually generate certificates for the ESXi management hosts in Region B, on the Management vCenter Server generate a key pair and Certificate Signing Request (CSR) for each hosts. Submit the CSR file to the certificate authority for signing.
Before you begin
Verify that the Windows that you use for access to the data center is a part of the lax01.rainpole.local domain.
About this task
You start with the hosts in the management cluster first and for to the hosts in the shared edge and compute cluster next.
You use the Management vCenter Server to generate the key pair and the CSR files because the appliance already runs the required software for CSR generation installed. You can also use another Linux OS instance that has OpenSSL installed.
Procedure
- Log in to the Windows host that has access to your data center.
- If not already created, create a folder C:\manual-certs\esxhosts.
Log in to mgmt01vc51.lax01.rainpole.local by using Secure Shell (SSH) client.
- Open an SSH connection to the virtual machine mgmt01vc51.lax01.rainpole.local.
Log in using the following credentials.
Setting
Value
User name
root
Password
vcenter_server_root_password
Enable the Bash shell by running these commands.
{#GUID-C5D06178-0978-4378-9B0F-F76ABBFF02D0__codeblock_010E3EBD848148E59875F7C6538F27FA .pre .codeblock} shell
Create a directory to save the certificate signing request and the private key to.
{#GUID-C5D06178-0978-4378-9B0F-F76ABBFF02D0__codeblock_45A1838EBA4249CE91EF77BF536C6471 .pre .codeblock} mkdir /tmp/ssl
Navigate to the temporary directory by running the following command.
{#GUID-C5D06178-0978-4378-9B0F-F76ABBFF02D0__codeblock_9F998E7F78CA46479B4BBFE0EFA73C7B .pre .codeblock} cd /tmp/ssl
Generate a private key pair and CSR file for the mgmt01esx51.lax01.rainpole.local host by running the following command.
{#GUID-C5D06178-0978-4378-9B0F-F76ABBFF02D0__codeblock_A472DE8541354230AAD1E23CF2566D6B .pre .codeblock} openssl req -nodes -newkey rsa:2048 -keyout mgmt01esx51.key -out mgmt01esx51.csr -subj "/C=US/ST=CA/L=LAX/O=Rainpole Inc./OU=Rainpole.local/CN=mgmt01esx51.lax01.rainpole.local"
Repeat 7 to create a key pair and CSR for each of the hosts in the management cluster. |Hosts Name|Key File Name|CSR File Name| |:---------|:------------|:------------| |mgmt01esx52.lax01.rainpole.local|mgmt01esx52.key|mgmt01esx52.csr| |mgmt01esx53.lax01.rainpole.local|mgmt01esx53.key|mgmt01esx53.csr| |mgmt01esx54.lax01.rainpole.local|mgmt01esx54.key|mgmt01esx54.csr| |comp01esx51.lax01.rainpole.local|comp01esx51.key|comp01esx51.csr| |comp01esx52.lax01.rainpole.local|comp01esx52.key|comp01esx52.csr| |comp01esx53.lax01.rainpole.local|comp01esx53.key|comp01esx53.csr| |comp01esx54.lax01.rainpole.local|comp01esx54.key|comp01esx54.csr|
Copy all the key and CSR files to the C:\manual-certs\esxhosts\ directory on the Windows host.
What to do next
Obtain a signed certificate from the Microsoft certificate authority. See Generate CA-Signed Certificates for the SDDC Management Components in Region B .
Parent topic: Generate Manually Key Pairs and Certificate Signing Requests for the Management Components in Region B