VMware Workstation Server generates a self-signed certificate. This certificate is sufficient for encryption, but it does not provide identity verification. For increased security, you should replace the default certificate with a certificate that is signed by a commercial Certificate Authority (CA).
Prerequisites
Obtain a signed certificate. Obtaining a signed certificate involves creating a certificate signing request (CSR) and sending it to a CA in accordance with the CA's enrollment process. After conducting some checks on your company, the CA signs your request, encrypts it with a private key, and sends you a validated certificate. See the instructions provided by the CA for more information.
Procedure
- On the host system, replace the default certificate text in the VMware SSL certificate file with the certificate text that you obtained from the CA.
The location of the certificate file depends on the host operating system.
Option |
Certificate File |
Windows Server 2008 R2, Windows Server 2012 R2, Windows 7, Windows 8, and Windows 10 hosts |
C:\ProgramData\VMware\SSL\rui.crt
Note: You can access the SSL directory only from an elevated command prompt.
|
Linux hosts |
/etc/vmware/ssl/rui.crt |
- On the host system, replace the default private key text in the VMware SSL key file with the private key text that you obtained from the CA.
The location of the key file depends on the host operating system.
Option |
Certificate File |
Windows Server 2008 R2, Windows Server 2012 R2, Windows 7, Windows 8, and Windows 10 hosts |
C:\ProgramData\VMware\SSL\rui.key
Note: You can access the SSL directory only from an elevated command prompt.
|
Linux hosts |
/etc/vmware/ssl/rui.key |
- Restart the host system.
The VMware Workstation Server service restarts and begins using the new certificate.