This topic describes how you can rotate configurable leaf certificates for your VMware Tanzu Operations Manager deployment. To rotate all certificates in your Tanzu Operations Manager deployment, see Rotating CAs and Leaf Certificates.
You can generate configurable certificates and paste them into Tanzu Operations Manager configuration panes where ever needed. Examples include certificates that stop SSL traffic into VMware Tanzu Application Service for VMs (TAS for VMs), or authenticate a Single Sign-On for VMware Tanzu service plan to an external SAML server.
To rotate SAML certificates for both TAS for VMs and the Single Sign-On for VMware Tanzu service, see Rotating identity provider SAML certificates.
This procedure does not rotate the Tanzu Operations Manager root certificate authority (CA) or other CAs in your deployment. To rotate CAs and leaf certificates, see Rotating CAs and Leaf Certificates.
Before you rotate certificates:
You must have Tanzu Operations Manager v2.10.
You must reset any certificates that were manually set in CredHub on Tanzu Operations Manager v2.6 and earlier to prevent them from being rotated with other certificates generated by CredHub. To find and reset any manually set certificates in CredHub, see Reviewing manually set certificates in CredHub.
If you use VMware Tanzu Kubernetes Grid Integrated Edition (TKGI), rotate your certificates using the instructions in the TKGI documentation. For certificates that are not rotated by the TKGI procedures, see Advanced certificate rotation with CredHub Maestro.
If you have an earlier version of a product tile listed above, use this procedure to rotate certificates managed only by Tanzu Operations Manager. Then, to rotate certificates managed in CredHub, see Advanced certificate rotation with CredHub Maestro.
You can set a value to override the duration for certificates within the BOSH Director tile. VMware recommends that you set the value before starting a certificate rotation. For more information, see Overriding duration for certificates.
To rotate configurable leaf certificates:
Go to Tanzu Operations Manager Installation Dashboard.
For each certificate you want to rotate:
product_guid
text box in the Tanzu Operations Manager API output can help identify the tile in which the certificate is configured. For example, the prefix p-bosh-
refers to the BOSH Director tile, and the prefix cf-
refers to the TAS for VMs tile.property_reference
text box in the Tanzu Operations Manager API output can help identify the configuration pane in which the certificate is configured. For example, the uaa.service_provider_key_credentials
property is configured in the UAA pane of the TAS for VMs tile.Return to Tanzu Operations Manager Installation Dashboard.
Click Review Pending Changes.
Click Apply Changes.
Some certificates are not rotated when using the standard rotation procedure. The following table lists certificates that use a separate, specialized rotation procedure and provides links to documentation and Knowledge Base articles to help you rotate these certificates.
Certificate | Tile | Procedure |
---|---|---|
.properties.saml_service_provider_cert |
BOSH Director | Checking and Rotating Tanzu Operations Manager SAML Certificate before it expires |
.uaa.service_provider_key_credentials |
TAS for VMs | Rotating Identity Provider SAML Certificates |
The Tanzu Operations Manager API invokes CredHub Maestro when rotating certificates. If a certificate rotation API command is unsafe, CredHub Maestro stops the command and returns one or more safety violations.
For example, CredHub Maestro stops a certificate rotation API command if you try to perform certificate rotation steps in the wrong order. Because performing these steps in the wrong order can make your deployment unstable or cause downtime, CredHub Maestro stops the command and returns an error message.
For information about how to troubleshoot safety violation errors that are returned when rotating certificates, see Troubleshooting CredHub Maestro Safety Violations During Certificate Rotation.