Creating and importing certificates signed by a certificate authority (CA) provides the highest level of trust for SSL communications and helps you secure the connections within your cloud.
Each VMware Cloud Director server must support two different SSL endpoints, one for HTTPS and one for console proxy communications.
In the VMware Cloud Director appliance, these two endpoints share the same IP address or hostname, but use two distinct ports - 443
for HTTPS and 8443
for console proxy communications. You can use the same certificate for both endpoints, for example, by using a wildcard certificate.
Certificates for both endpoints must include an X.500 distinguished name and X.509 Subject Alternative Name extension.
If you already have your own private key and CA-signed certificate files, follow the procedure described in Import Private Keys and CA-Signed SSL Certificates to the VMware Cloud Director Appliance.
The private key password used in this procedure is the root user password, and it is represented as root_password.
Procedure
What to do next
- If you are using wildcard certificates, see Deploy the VMware Cloud Director Appliance with Signed Wildcard Certificates for HTTPS and Console Proxy Communication .
- If you are not using wildcard certificates, repeat this procedure on all VMware Cloud Director servers in the server group.
- For more information on replacing the certificates for the embedded PostgreSQL database and for the VMware Cloud Director appliance management user interface, see Replace a Self-Signed Embedded PostgreSQL and VMware Cloud Director Appliance Management UI Certificate.