Certificate requirements depend on whether you use VMCA as an intermediate CA or you use custom certificates. Requirements are also different for machine certificates.
Before you begin, ensure that all nodes in your environment are time synchronized.
Requirements for all Imported Certificates
- Key size: 2048 bits (minimum) to 16384 bits (maximum) (PEM encoded)
- PEM format. VMware supports PKCS8 and PKCS1 (RSA keys). When you add keys to VECS, they are converted to PKCS8.
- x509 version 3
- SubjectAltName must contain DNS Name=machine_FQDN
- CRT format
- Contains the following Key Usages: Digital Signature, Key Encipherment.
- Exempting the vpxd-extension solution user certificate, Extended Key Usage can be either empty or contain Server Authentication.
- Certificates with wildcards.
- The algorithms md2WithRSAEncryption, md5WithRSAEncryption, RSASSA-PSS, dsaWithSHA1, ecdsa_with_SHA1, and sha1WithRSAEncryption are not supported.
- When creating a custom machine SSL certificate for vCenter Server, Server Authentication and Client Authentication are not supported, and must be removed when using the Microsoft Certificate Authority (CA) templates. For more information, see the VMware knowledge base article at https://kb.vmware.com/s/article/2112009.
Certificate Compliance to RFC 2253
The certificate must be in compliance with RFC 2253.
If you do not generate CSRs using Certificate Manager, ensure that the CSR includes the following fields.
String | X.500 AttributeType |
---|---|
CN | commonName |
L | localityName |
ST | stateOrProvinceName |
O | organizationName |
OU | organizationalUnitName |
C | countryName |
STREET | streetAddress |
DC | domainComponent |
UID | userid |
- The password of the [email protected] user, or for the administrator of the vCenter Single Sign-On domain that you are connecting to.
- Information that Certificate Manager stores in the certool.cfg file. For most fields, you can accept the default or provide site-specific values. The FQDN of the machine is required.
- Password for [email protected]
- Two-letter country code
- Company name
- Organization name
- Organization unit
- State
- Locality
- IP address (optional)
- Host name, that is, the fully qualified domain name of the machine for which you want to replace the certificate. If the host name does not match the FQDN, certificate replacement does not complete correctly and your environment might end up in an unstable state.
- IP address of the vCenter Server node on which you run Certificate Manager.
Note: As of vSphere 7.0 Update 3o, the OU (organizationalUnitName) field is no longer mandatory.
Requirements When Using VMCA as an Intermediate CA
Certificate Type | Certificate Requirements |
---|---|
Root certificate |
|
Machine SSL certificate | You can use the vSphere Certificate Manager to create the CSR or create the CSR manually. If you create the CSR manually, it must meet the requirements listed previously under Requirements for All Imported Certificates. You also have to specify the FQDN for the host. |
Solution user certificate | You can use vSphere Certificate Manager to create the CSR or create the CSR manually.
Note: You must use a different value for Name for each solution user. If you generate the certificate manually, this might show up as
CN under
Subject, depending on the tool you use.
If you use vSphere Certificate Manager, the tool prompts you for certificate information for each solution user. vSphere Certificate Manager stores the information in certool.cfg. See Information that Certificate Manager Prompts For. For the vpxd-extension solution user, you can either leave Extended Key Usage empty or use "TLS WWW client authentication". |
Requirements for Custom Certificates
Certificate Type | Certificate Requirements |
---|---|
Machine SSL certificate | The machine SSL certificate on each node must have a separate certificate from your third-party or enterprise CA.
|
Solution user certificate | Each solution user on each node must have a separate certificate from your third-party or enterprise CA.
When later you replace solution user certificates with custom certificates, provide the complete signing certificate chain of the third-party CA. For the vpxd-extension solution user, you can either leave Extended Key Usage empty or use "TLS WWW client authentication". |