This article provides instructions for using OpenSSL to configure an authentication certificate for use with VCF Operations (formerly known as Aria Operations). This certificate is commonly referred to as Web Certificate.
See VCF Operations Certificates documentation for further details.
Note: The certificate cannot be changed on the internal ports: for example port 6061, 10000 and 20000 ranges. This certificate, on the internal ports, is instead of commonly referred to as Internal certificate.
VCF Operations 9.x
VMware Aria Operations 8.x
Send the CSR (aops.csr) to your Certificate Authority and inform them of the details you have configured in the subjectAltName line of aops.cnf.
Once the Certificate Authority signs your CSR, they will return to you the signed cert based on this CSR and their root cert (along with any intermediate certs). Ensure that you download them in Base64 format if given an option.
For internal VMCA signed certificate:
=============================================================================
Note: If you have trouble applying the newly created certificate in VCF Operations, see the Troubleshooting PEM file issues section of this article. You can also see Using the Custom Certificate Tool in VCF Operations to help troubleshoot the certificate.
Disclaimer: Creating custom certificates for use in VCF Operations is out of scope for support. For additional support in creating a custom certificate for use in VCF Operations, contact your account manager or Technical account manager.
For steps on how to configure a certificate for use with VCF Operations Cloud Proxy, see Configure a Certificate For Use With VCF Operations Cloud Proxy (89583).
Impact/Risks:
Attempting to apply an invalid certificate may result in any of the following:
The finished PEM file should look similar to the following example, where the number of CERTIFICATE sections depends on the length of the issuing chain:
-----BEGIN CERTIFICATE-----
(Your Primary SSL certificate: your_domain_name.crt)
-----END CERTIFICATE-----
-----BEGIN RSA PRIVATE KEY-----
(Your Private Key: your_domain_name.key)
-----END RSA PRIVATE KEY-----
-----BEGIN CERTIFICATE-----
(Your Intermediate certificate: DigiCertCA.crt)
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
(Your Root certificate: TrustedRoot.crt)
-----END CERTIFICATE-----
Failure to comply with the above format may result in the cluster being affected or even harmed.