With the Certificate Generation utility, you can either create certificates signed by Microsoft Windows, or create a certificate signing request for a third-party CA.
You must have a Windows host with PowerShell installed on it.
For a Microsoft Windows signed certificate, the Windows host must be in the same domain as the Windows CA.
The account that you use to log in must have administrative privileges.
Although non-administrator users can download and launch the tool, all operations fail if you do not have the proper permissions.
You must have created a Microsoft CA template. See Microsoft Certificate Authority Template in VMware Validated Design for Software-Designed Data Center.
- Copy the file package zip file from the SDDC Manager Controller VM to the Windows host.
- Extract the contents of the zip file on the Windows host.
The CertGenVVD-*.ps1 file is included in the extracted files.
- Navigate to the directory where you extracted the contents of the zip file.
- Run one of the following commands.
To create a Microsoft Windows signed certificate, run the following command:
CertGenVVD-3.0.ps1 -MSCASigned -attrib 'CertificateTemplate:VMware' -inter
Certificate is to be signed by inter-mediate authority.
The Microsoft CA template.
To create a certificate signing request for a third-party CA, run the following command.
.\CertGenVVD-3.0.1.ps1 -CSR -extra
- Type a password for the key file.
A folder named SignedByMSCACerts is created.
- Zip the contents of the SignedByMSCACerts folder.
- Copy the SignedByMSCACerts zipped folder to the SDDC Manager Controller VM in the /opt/vmware/cert-mgmt/bin directory.
The zip folder contains highly sensitive private key files must be sent over trusted paths.
- Navigate to the /opt/vmware/cert-mgmt/bin directory and unzip the SignedByMSCACerts folder.