Install Third-Party CA-Signed Certificates
in VMware Cloud Foundation Using a Certificate Bundle
VMware
Cloud Foundation
supports two ways to install
third-party certificates. This procedure describes the legacy method of using a certificate
bundle. To use the legacy method, you must modify your preferences and then use this
procedure to generate CSRs, sign the CSRs with a third-party CA, and finally upload and
install the certificates.VMware
Cloud Foundation
4.5.1 introduces a new method for installing
third-party CA-signed certificates. By default, VMware
Cloud Foundation
use the new method. See Install Third-Party CA-Signed Certificates Using Server Certificate and Certificate Authority Files for information using the new method. If you
prefer to use the legacy method, you must modify your preferences.- In theSDDC Manager UI, click the logged in user and selectPreferences.
- Use the toggle to switch to legacy certificate management.
Uploading CA-signed certificates from a
third-party Certificate Authority using the legacy method requires that you collect
the relevant certificate files in the correct format and then create a single
.tar.gz file with the contents. It's important that you create the correct directory
structure within the .tar.gz file as follows:
- The name of the top-level directory must exactly match the name of the workload domain as it appears in the list on the. For example,sfo-m01.
- For example:The PEM-encoded root CA certificate chain file (must be namedrootca.crt) must reside inside this top-level directory. Therootca.crtchain file contains a root certificate authority and can havennumber of intermediate certificates.-----BEGIN CERTIFICATE----- <Intermediate1 certificate content> -----END CERTIFICATE------ -----BEGIN CERTIFICATE----- <Intermediate2 certificate content> -----END CERTIFICATE------ -----BEGIN CERTIFICATE----- <Root certificate content> -----END CERTIFICATE-----In the above example, there are two intermediate certificates,intermediate1andintermediate2, and a root certificate.Intermediate1must use the certificate issued byintermediate2and intermediate2 must use the certificate issued by Root CA.
- The root CA certificate chain file, intermediate certificates, and root certificate must contain theBasic Constraintsfield with valueCA:TRUE.
- This directory must contain one sub-directory for each component resource for which you want to replace the certificates.
- Each sub-directory must exactly match the resource hostname of a corresponding component as it appears in the Resource Hostname column in thetab.For example,nsxManager.vrack.vsphere.local,vcenter-1.vrack.vsphere.local, and so on.
- Each sub-directory must contain the corresponding .csr file, whose name must exactly match the resource as it appears in the Resource Hostname column in thetab.
- Each sub-directory must contain a corresponding .crt file, whose name must exactly match the resource as it appears in the Resource Hostname column in thetab. The content of the .crt files must end with a newline character.For example, thensxManager.vrack.vsphere.localsub-directory would contain thensxManager.vrack.vsphere.local.crtfile.
- All certificates includingrootca.crtmust be in UNIX file format.
- Additional requirements for NSX-T certificates:
- Server certificate () must contain theNSXT_FQDN.crtBasic Constraintsfield with valueCA:FALSE.
- If the NSX-T certificate contains HTTP or HTTPS based CRL Distribution Point it must be reachable from the server.
- The extended key usage (EKU) of the generated certificate must contain the EKU of the CSR generated.
All resource and hostname values can
be found in the list on the
tab.- In the navigation pane, click.
- On theWorkload Domainspage, from the table, in the domain column click the workload domain you want to view.
- On the domain summary page, click theCertificatestab.
- Generate CSR files for the target components.
- From the table, select the check box for the resource type for which you want to generate a CSR.
- ClickGenerate CSRs.TheGenerate CSRswizard opens.
- On theDetailsdialog, configure the settings and clickNext.OptionDescriptionAlgorithmSelect the key algorithm for the certificate.Key SizeSelect the key size (2048 bit, 3072 bit, or 4096 bit) from the drop-down menu.EmailOptionally, enter a contact email address.Organizational UnitUse this field to differentiate between divisions within your organization with which this certificate is associated.Organization NameType the name under which your company is known. The listed organization must be the legal registrant of the domain name in the certificate request.LocalityType the city or locality where your company is legally registered.StateType the full name (do not abbreviate) of the state, province, region, or territory where your company is legally registered.CountryType the country name where your company is legally registered. This value must use the ISO 3166 country code.
- (Optional) On theSubject Alternative Namedialog, enter the subject alternative name(s) and clickNext.You can enter multiple values separated by comma (,), semicolon (;), or space ( ). For NSX-T, you can enter the subject alternative name for each node along with the Virtual IP (primary) node.Wildcard subject alternative name, such as *.example.com are not recommended.
- On theSummarydialog, clickGenerate CSRs.
- Download and save the CSR files to the directory by clickingDownload CSR.
- Complete the following tasks outside of theSDDC Manager UI:
- Verify that the different .csr files have successfully generated and are allocated in the required directory structure.
- Request signed certificates from a Third-party Certificate authority for each .csr.
- Verify that the newly acquired .crt files are correctly named and allocated in the required directory structure.
- Create a new .tar.gz file of the directory structure ready for upload toSDDC Manager. For example:<domain name>.tar.gz.
- ClickUpload and Install.
- In theUpload and Install Certificatesdialog box, clickBrowseto locate and select the newly created<domain name>.tar.gzfile and clickOpen.
- ClickUpload.
- If the upload is successful, clickInstall Certificate. The Security tab displays a status of Certificate Installation is in progress.