By adding a system property, you can enable the certificate path validation algorithm for your trusted certificates.
vRealize Orchestrator now uses an enhanced public-key infrastructure X.509 (PKIX) certification path when working with certificates for establishing an SSL or TLS connection with a host. vRealize Orchestrator must work uninterrupted when establishing a connection with a host with an updated certificate issued by a trusted certificate authority (CA) included in the vRealize Orchestrator trust store.
If the subject certificate or some of the intermediate certificates are renewed, the algorithm makes an informed trust decision on whether it can trust any certificate that is not already explicitly trusted.
Procedure
Results
The certificate validation algorithm is now enabled. For more information on managing vRealize Orchestrator certificates, see Manage vRealize Orchestrator Certificates.
What to do next
If your vRealize Orchestrator deployment uses vSphere as an authentication provider and you change the vCenter certificate, you must restart the vRealize Orchestrator pod so the environment can use the new certificate. To restart your pod, use the following procedure:
- Log in to the vRealize Orchestrator Appliance as root.
- Run the following commands:
kubectl -n prelude scale deployment vco-app --replicas=0 kubectl -n prelude scale deployment vco-app --replicas=1
Note: For clustered vRealize Orchestrator deployments, replace the second command with the following:kubectl -n prelude scale deployment vco-app --replicas=3