Manually Replacing the solution user certificate on VCSA/PSC 6.x
Note :
-- Take a snapshot of the VC or
PSC before proceeding.
-- PSC has two solution users : machine and
vsphere-webclient.
-- VC has four
solution users : machine, vpxd, vpxd-extension and vsphere-webclient.
-- VC with
embedded PSC has four
solution users : machine, vpxd, vpxd-extension and vsphere-webclient.
-- SSO admin
username and password would vary depending on the configuration.
-- Windows
Install directory may vary depending on your installation.
-- Run the
below command to get the machine ID of the node :
Appliance : /usr/lib/vmware-vmafd/bin/vmafd-cli
get-machine-id --server-name localhost
Windows :
"%VMWARE_CIS_HOME%"\vmafdd\vmafd-cli
get-machine-id --server-name localhost
0. Take a backup of the old solution user
certificates and its private keys.
Appliance :
/usr/lib/vmware-vmafd/bin/vecs-cli
entry getcert --store machine --alias machine --output
/root/certificate/machine.crt
/usr/lib/vmware-vmafd/bin/vecs-cli
entry getcert --store vpxd --alias vpxd --output /root/certificate/vpxd.crt
/usr/lib/vmware-vmafd/bin/vecs-cli
entry getcert --store vpxd-extension --alias vpxd-extension --output
/root/certificate/vpxd-extension.crt
/usr/lib/vmware-vmafd/bin/vecs-cli
entry getcert --store vsphere-webclient --alias vsphere-webclient --output
/root/certificate/vsphere-webclient.crt
/usr/lib/vmware-vmafd/bin/vecs-cli
entry getcert --store machine --alias machine --output
/root/certificate/machine.key
/usr/lib/vmware-vmafd/bin/vecs-cli
entry getcert --store vpxd --alias vpxd --output /root/certificate/vpxd.key
/usr/lib/vmware-vmafd/bin/vecs-cli
entry getcert --store vpxd-extension --alias vpxd-extension --output
/root/certificate/vpxd-extension.key
/usr/lib/vmware-vmafd/bin/vecs-cli
entry getcert --store vsphere-webclient --alias vsphere-webclient --output
/root/certificate/vsphere-webclient.key
Windows :
"%VMWARE_CIS_HOME%"\vmafdd\vecs-cli
entry getcert --store machine --alias machine --output
c:\certificate\machine.crt
"%VMWARE_CIS_HOME%"\vmafdd\vecs-cli
entry getcert --store vpxd --alias vpxd --output c:\certificate\vpxd.crt
"%VMWARE_CIS_HOME%"\vmafdd\vecs-cli
entry getcert --store vpxd-extension --alias vpxd-extension --output
c:\certificate\vpxd-extension.crt
"%VMWARE_CIS_HOME%"\vmafdd\vecs-cli
entry getcert --store vsphere-webclient --alias vsphere-webclient --output
c:\certificate\vsphere-webclient.crt
"%VMWARE_CIS_HOME%"\vmafdd\vecs-cli
entry getcert --store machine --alias machine --output
c:\certificate\machine.key
"%VMWARE_CIS_HOME%"\vmafdd\vecs-cli
entry getcert --store vpxd --alias vpxd --output c:\certificate\vpxd.key
"%VMWARE_CIS_HOME%"\vmafdd\vecs-cli
entry getcert --store vpxd-extension --alias vpxd-extension --output
c:\certificate\vpxd-extension.key
"%VMWARE_CIS_HOME%"\vmafdd\vecs-cli
entry getcert --store vsphere-webclient --alias vsphere-webclient --output
c:\certificate\vsphere-webclient.key
1. Create the configuration file for all the solution users :
a) machine.cfg :
[ req ]
distinguished_name =
req_distinguished_name
encrypt_key = no
prompt = no
string_mask = nombstr
req_extensions = v3_req
[ v3_req ]
basicConstraints = CA:false
keyUsage = nonRepudiation,
digitalSignature, keyEncipherment
subjectAltName =
DNS:vcenter-nl-1.filmlogistics.local # FQDN of VC or PSC
[ req_distinguished_name ]
countryName = NL
stateOrProvinceName = Utrecht
localityName = Zeist
0.organizationName = VMware
organizationalUnitName = mID-74453a6d-4f01-4191-a95c-d3a905c1a516
# machine ID of the VC/PSC
commonName = machine
b) vpxd.cfg :
[ req ]
distinguished_name =
req_distinguished_name
encrypt_key = no
prompt = no
string_mask = nombstr
req_extensions = v3_req
[ v3_req ]
basicConstraints = CA:false
keyUsage = nonRepudiation,
digitalSignature, keyEncipherment
subjectAltName =
DNS:vcenter-nl-1.filmlogistics.local # FQDN of VC or PSC
[ req_distinguished_name ]
countryName = NL
stateOrProvinceName = Utrecht
localityName = Zeist
0.organizationName = VMware
organizationalUnitName = mID-74453a6d-4f01-4191-a95c-d3a905c1a516
# machine ID of the VC/PSC
commonName = vpxd
c) vpxd-extension.cfg :
[ req ]
distinguished_name =
req_distinguished_name
encrypt_key = no
prompt = no
string_mask = nombstr
req_extensions = v3_req
[ v3_req ]
basicConstraints = CA:false
keyUsage = nonRepudiation,
digitalSignature, keyEncipherment
subjectAltName =
DNS:vcenter-nl-1.filmlogistics.local # FQDN of VC or PSC
[ req_distinguished_name ]
countryName = NL
stateOrProvinceName = Utrecht
localityName = Zeist
0.organizationName = VMware
organizationalUnitName = mID-74453a6d-4f01-4191-a95c-d3a905c1a516
# machine ID of the VC/PSC
commonName = vpxd-extension
d) vsphere-webclient.cfg
:
[ req ]
distinguished_name =
req_distinguished_name
encrypt_key = no
prompt = no
string_mask = nombstr
req_extensions = v3_req
[ v3_req ]
basicConstraints = CA:false
keyUsage = nonRepudiation,
digitalSignature, keyEncipherment
subjectAltName =
DNS:vcenter-nl-1.filmlogistics.local # FQDN of VC or PSC
[ req_distinguished_name ]
countryName = NL
stateOrProvinceName = Utrecht
localityName = Zeist
0.organizationName = VMware
organizationalUnitName = mID-74453a6d-4f01-4191-a95c-d3a905c1a516
# machine ID of the VC/PSC
commonName = vsphere-webclient
2. Create the certificate signing request and generate a new
certificate for all the solution certs :
Appliance :
openssl req -new -nodes -out
machine.csr -newkey rsa:2048 -keyout machine.key -config machine.cfg
openssl x509 -req -days 3650 -in
machine.csr -out machine.crt -CA /var/lib/vmware/vmca/root.cer -CAkey
/var/lib/vmware/vmca/privatekey.pem -extensions v3_req -CAcreateserial -extfile
machine.cfg
openssl req -new -nodes -out vpxd.csr
-newkey rsa:2048 -keyout vpxd.key -config vpxd.cfg
openssl x509 -req -days 3650 -in
vpxd.csr -out vpxd.crt -CA /var/lib/vmware/vmca/root.cer -CAkey
/var/lib/vmware/vmca/privatekey.pem -extensions v3_req -CAcreateserial -extfile
vpxd.cfg
openssl req -new -nodes -out
vpxd-extension.csr -newkey rsa:2048 -keyout vpxd-extension.key -config
vpxd-extension.cfg
openssl x509 -req -days 3650 -in
vpxd-extension.csr -out vpxd-extension.crt -CA /var/lib/vmware/vmca/root.cer
-CAkey /var/lib/vmware/vmca/privatekey.pem -extensions v3_req -CAcreateserial
-extfile vpxd-extension.cfg
openssl req -new -nodes -out
vsphere-webclient.csr -newkey rsa:2048 -keyout vsphere-webclient.key -config
vsphere-webclient.cfg
openssl x509 -req -days 3650 -in
vsphere-webclient.csr -out vsphere-webclient.crt -CA
/var/lib/vmware/vmca/root.cer -CAkey /var/lib/vmware/vmca/privatekey.pem
-extensions v3_req -CAcreateserial -extfile vsphere-webclient.cfg
Windows :
"%VMWARE_OPENSSL_BIN%"
req -new -nodes -out machine.csr -newkey rsa:2048 -keyout machine.key -config
machine.cfg
"%VMWARE_OPENSSL_BIN%"
x509 -req -days 3650 -in machine.csr -out machine.crt -CA
/var/lib/vmware/vmca/root.cer -CAkey /var/lib/vmware/vmca/privatekey.pem
-extensions v3_req -CAcreateserial -extfile machine.cfg
"%VMWARE_OPENSSL_BIN%"
req -new -nodes -out vpxd.csr -newkey rsa:2048 -keyout vpxd.key -config
vpxd.cfg
"%VMWARE_OPENSSL_BIN%"
x509 -req -days 3650 -in vpxd.csr -out vpxd.crt -CA
/var/lib/vmware/vmca/root.cer -CAkey /var/lib/vmware/vmca/privatekey.pem
-extensions v3_req -CAcreateserial -extfile vpxd.cfg
"%VMWARE_OPENSSL_BIN%"
req -new -nodes -out vpxd-extension.csr -newkey rsa:2048 -keyout
vpxd-extension.key -config vpxd-extension.cfg
"%VMWARE_OPENSSL_BIN%"
x509 -req -days 3650 -in vpxd-extension.csr -out vpxd-extension.crt -CA
/var/lib/vmware/vmca/root.cer -CAkey /var/lib/vmware/vmca/privatekey.pem
-extensions v3_req -CAcreateserial -extfile vpxd-extension.cfg
"%VMWARE_OPENSSL_BIN%"
req -new -nodes -out vsphere-webclient.csr -newkey rsa:2048 -keyout
vsphere-webclient.key -config vsphere-webclient.cfg
"%VMWARE_OPENSSL_BIN%"
x509 -req -days 3650 -in vsphere-webclient.csr -out vsphere-webclient.crt -CA
/var/lib/vmware/vmca/root.cer -CAkey /var/lib/vmware/vmca/privatekey.pem
-extensions v3_req -CAcreateserial -extfile vsphere-webclient.cfg
3. Delete the old certificate entries from VECS store :
Appliance :
/usr/lib/vmware-vmafd/bin/vecs-cli
entry delete --store machine --alias machine -y
/usr/lib/vmware-vmafd/bin/vecs-cli
entry delete --store vpxd --alias vpxd -y
/usr/lib/vmware-vmafd/bin/vecs-cli
entry delete --store vpxd-extension --alias vpxd-extension -y
/usr/lib/vmware-vmafd/bin/vecs-cli
entry delete --store vsphere-webclient --alias vsphere-webclient -y
Windows :
"%VMWARE_CIS_HOME%"\vmafdd\vecs-cli
entry delete --store machine --alias machine --cert machine.crt --key
machine.key
"%VMWARE_CIS_HOME%"\vmafdd\vecs-cli
entry delete --store vpxd --alias vpxd --cert vpxd.crt --key vpxd.key
"%VMWARE_CIS_HOME%"\vmafdd\vecs-cli
entry delete --store vpxd-extension --alias vpxd-extension --cert
vpxd-extension.crt --key vpxd-extension.key
"%VMWARE_CIS_HOME%"\vmafdd\vecs-cli
entry delete --store vsphere-webclient --alias vsphere-webclient --cert
vsphere-webclient.crt --key vsphere-webclient.key
4. Update the new certificates in the VECS store :
Appliance :
/usr/lib/vmware-vmafd/bin/vecs-cli
entry create --store machine --alias machine --cert machine.crt --key
machine.key
/usr/lib/vmware-vmafd/bin/vecs-cli
entry create --store vpxd --alias vpxd --cert vpxd.crt --key vpxd.key
/usr/lib/vmware-vmafd/bin/vecs-cli
entry create --store vpxd-extension --alias vpxd-extension --cert
vpxd-extension.crt --key vpxd-extension.key
/usr/lib/vmware-vmafd/bin/vecs-cli
entry create --store vsphere-webclient --alias vsphere-webclient --cert
vsphere-webclient.crt --key vsphere-webclient.key
Windows :
"%VMWARE_CIS_HOME%"\vmafdd\vecs-cli
entry create --store machine --alias machine --cert machine.crt --key
machine.key
"%VMWARE_CIS_HOME%"\vmafdd\vecs-cli
entry create --store vpxd --alias vpxd --cert vpxd.crt --key vpxd.key
"%VMWARE_CIS_HOME%"\vmafdd\vecs-cli
entry create --store vpxd-extension --alias vpxd-extension --cert
vpxd-extension.crt --key vpxd-extension.key
"%VMWARE_CIS_HOME%"\vmafdd\vecs-cli
entry create --store vsphere-webclient --alias vsphere-webclient --cert
vsphere-webclient.crt --key vsphere-webclient.key
5. List all the solution users :
/usr/lib/vmware-vmafd/bin/dir-cli
service list --login administrator@vsphere.local
--password 'YA,Bkc9ID8.)o_Sxr5t6'
1. machine-74453a6d-4f01-4191-a95c-d3a905c1a516
2.
vsphere-webclient-74453a6d-4f01-4191-a95c-d3a905c1a516
3.
vpxd-74453a6d-4f01-4191-a95c-d3a905c1a516
4.
vpxd-extension-74453a6d-4f01-4191-a95c-d3a905c1a516
6. Update all the solution users with the new certificate :
Appliance :
/usr/lib/vmware-vmafd/bin/dir-cli
service update --name machine-74453a6d-4f01-4191-a95c-d3a905c1a516 --cert
machine.crt --login administrator@vsphere.local
--password 'YA,Bkc9ID8.)o_Sxr5t6'
/usr/lib/vmware-vmafd/bin/dir-cli
service update --name vsphere-webclient-74453a6d-4f01-4191-a95c-d3a905c1a516
--cert vsphere-webclient.crt --login administrator@vsphere.local --password 'YA,Bkc9ID8.)o_Sxr5t6'
/usr/lib/vmware-vmafd/bin/dir-cli
service update --name vpxd-74453a6d-4f01-4191-a95c-d3a905c1a516 --cert vpxd.crt
--login administrator@vsphere.local
--password 'YA,Bkc9ID8.)o_Sxr5t6'
/usr/lib/vmware-vmafd/bin/dir-cli
service update --name vpxd-extension-74453a6d-4f01-4191-a95c-d3a905c1a516
--cert vpxd-extension.crt --login administrator@vsphere.local --password 'YA,Bkc9ID8.)o_Sxr5t6'
Windows :
"%VMWARE_CIS_HOME%"\vmafdd\dir-cli
service update --name machine-74453a6d-4f01-4191-a95c-d3a905c1a516 --cert
machine.crt --login administrator@vsphere.local
--password 'YA,Bkc9ID8.)o_Sxr5t6'
"%VMWARE_CIS_HOME%"\vmafdd\dir-cli
service update --name vsphere-webclient-74453a6d-4f01-4191-a95c-d3a905c1a516
--cert vsphere-webclient.crt --login administrator@vsphere.local
--password 'YA,Bkc9ID8.)o_Sxr5t6'
"%VMWARE_CIS_HOME%"\vmafdd\dir-cli
service update --name vpxd-74453a6d-4f01-4191-a95c-d3a905c1a516 --cert vpxd.crt
--login administrator@vsphere.local
--password 'YA,Bkc9ID8.)o_Sxr5t6'
"%VMWARE_CIS_HOME%"\vmafdd\dir-cli
service update --name vpxd-extension-74453a6d-4f01-4191-a95c-d3a905c1a516
--cert vpxd-extension.crt --login administrator@vsphere.local
--password 'YA,Bkc9ID8.)o_Sxr5t6'
7 . Update the auto-deploy, imagebuilder and eam service with
vpxd-extension certificate.
Appliance :
python
/usr/lib/vmware-vpx/scripts/updateExtensionCertInVC.py -e com.vmware.vim.eam -c
/certificate/vpxd-extension.crt -k /certificate/vpxd-extension.key -s
<VC_FQDN> -u <SSO_admin>
python
/usr/lib/vmware-vpx/scripts/updateExtensionCertInVC.py -e com.vmware.rbd
-c /certificate/vpxd-extension.crt -k /certificate/vpxd-extension.key -s
<VC_FQDN> -u <SSO_admin>
python
/usr/lib/vmware-vpx/scripts/updateExtensionCertInVC.py -e
com.vmware.imagebuilder -c /certificate/vpxd-extension.crt -k
/certificate/vpxd-extension.key -s <VC_FQDN> -u <SSO_admin>
Windows :
"%VMWARE_PYTHON_BIN%" C:\Program
Files\VMware\vCenter Server\vpxd\scripts\updateExtensionCertInVC.py
-e com.vmware.vim.eam -c C:\Certificates\vpxd-extension.crt -k
C:\Certificates\vpxd-extension.key -s <vcenter_FQDN> -u <SSO_admin>
"%VMWARE_PYTHON_BIN%" C:\Program
Files\VMware\vCenter Server\vpxd\scripts\updateExtensionCertInVC.py -e
com.vmware.rbd -c C:\Certificates\vpxd-extension.crt -k
C:\Certificates\vpxd-extension.key -s <vcenter_FQDN> -u <SSO_admin>
"%VMWARE_PYTHON_BIN%" C:\Program
Files\VMware\vCenter Server\vpxd\scripts\updateExtensionCertInVC.py
-e com.vmware.imagebuilder -c C:\Certificates\vpxd-extension.crt -k
C:\Certificates\vpxd-extension.key -s <vcenter_FQDN> -u <SSO_admin>
8. Restart all the services.
Reference:
https://docs.vmware.com/en/VMware-vSphere/6.0/com.vmware.vsphere.security.doc/GUID-BD70615E-BCAA-4906-8E13-67D0DBF715E4.html
This comment has been removed by the author.
ReplyDeleteThanks and keep sharing such valuable updates through your side.
ReplyDeletePALS Online UCR Riverside CA
ReplyDeleteYour Trusted Chartered Accountants in Silvassa and Vapi
Looking for a reliable CA in Silvassa or CA in Vapi?
N Kumar & Associates is a professional Chartered Accountancy firm known for its ethical practices, accuracy, and client-centric approach. We offer a comprehensive range of accounting and financial services tailored to meet the needs of individuals, startups, SMEs, and large-scale businesses.
Our Key Services Include:
Income Tax Filing & Planning
GST Registration & Compliance
Company Incorporation & ROC Filings
Statutory & Internal Audits
Business Advisory & Financial Consulting
TDS, PF, ESI Compliance
Bookkeeping & Payroll Services
With a team of experienced professionals, we deliver timely and cost-effective solutions that help our clients stay compliant and financially sound.
Why Choose N Kumar & Associates?
✔ Years of Experience
✔ Personalized Financial Guidance
✔ Transparent Fee Structure
✔ Prompt Client Support
Whether you're a growing business or an established firm, trust N Kumar & Associates to be your reliable Chartered Accountant in Silvassa and Vapi.
📞 Contact us today to schedule a consultation or visit www.nkumarassociates.co.in
https://www.nkumarassociates.co.in/