You might need to replace the VMware Cloud Director appliance management key-certificate pair for security reasons, expiration of the certificate, upgrades or changes to the appliance, or compliance requirements.
Procedure
- Log in directly or SSH to the OS of the VMware Cloud Director appliance as root.
- Create a backup copy of the original vcd_ova.crt.
cp /opt/vmware/appliance/etc/ssl/vcd_ova.crt /opt/vmware/appliance/etc/ssl/vcd_ova.crt.original
cp /opt/vmware/appliance/etc/ssl/vcd_ova.key /opt/vmware/appliance/etc/ssl/vcd_ova.key.original
- Generate self-signed certificates only for the embedded PostgreSQL database and the VMware Cloud Director appliance management UI.
/opt/vmware/appliance/bin/generate-certificates.sh <root-password> --skip-vcd-certs
The command puts into use the newly generated certificates for the embedded PostgreSQL database and the appliance management UI. The PostgreSQL and the Nginx servers restart.
- If you are using CA-signed certificates, obtain the CA-signed certificates, copy them and restart the services.
- Create a certificate signing request in the vcd_ova.csr file.
openssl req -new -key /opt/vmware/appliance/etc/ssl/vcd_ova.key -reqexts SAN -config <(cat /etc/ssl/openssl.cnf <(printf "\n[SAN]\nsubjectAltName=DNS:vcd2.example.com,DNS:vcd2,IP:10.100.101.10\n")) -out vcd_ova.csr
- Send the certificate signing request to your certificate authority.
If you must specify a web server type, use Jakarta Tomcat.
You obtain the CA-signed certificate.
- Copy the CA-signed certificate.
cp ca-signed-vcd_ova.pem /opt/vmware/appliance/etc/ssl/vcd_ova.crt
- Restart the
nginx
and postgres
services.
systemctl restart nginx.service
systemctl restart vpostgres.service