As a vSphere administrator, you can replace the certificate for the virtual IP address (VIP) to securely connect to the Supervisor Cluster API endpoint with a certificate signed by a CA that your hosts already trust. The certificate authenticates the Kubernetes control plane to DevOps engineers, both during login and subsequent interactions with the Supervisor Cluster.
Prerequisites
Verify that you have access to a CA that can sign CSRs. For DevOps engineers, the CA must be installed on their system as a trusted root.
Note: In vSphere 7.x, x509 certificate chains are not supported with the L4 load balancer endpoint used for the Kubernetes API server. Certificate chains that involve intermediate CAs (for example, if you bring your own CA chain) might experience certificate verification errors.