Some key server (KMS) vendors require that you configure the trusted key provider with the client certificate and private key provided by the key server. After you configure the trusted key provider, the key server accepts traffic from the trusted key provider.
Prerequisites
- Enable the Trust Authority Administrator.
- Enable the Trust Authority State.
- Collect Information About ESXi Hosts and vCenter Server to Be Trusted.
- Import the Trusted Host Information to the Trust Authority Cluster.
- Create the Key Provider on the Trust Authority Cluster.
- Request a certificate and private key in PEM format from the key server vendor. If the certificate is returned in a format other than PEM, convert it to PEM. If the private key is protected with a password, create a PEM file with the password removed. You can use the openssl command for both operations. For example:
- To convert a certificate from CRT to PEM format:
openssl x509 -in clientcert.crt -out clientcert.pem -outform PEM
- To convert a certificate from DER to PEM format:
openssl x509 -inform DER -in clientcert.der -out clientcert.pem
- To remove the password from a private key:
openssl rsa -in key.pem -out keynopassword.pem Enter pass phrase for key.pem: writing RSA key
- To convert a certificate from CRT to PEM format:
Procedure
Results
The trusted key provider has established trust with the key server.