This article explains how to use the Fixcerts script to replace certificates on the vCenter Server Appliance.
The script is able to replace the following Certificates on vCenter Server:
Notes:
$ python fixcerts_3_2.py replace --certType expired_only
$ python fixcerts_3_2.py replace --certType all
Regenerate vSphere 6.x, 7.x, and 8.0 certificates using self-signed VMCA (318767)
Managing vCenter Server Certificates
Fixcerts additional arguments:
Restart services automatically after certificate replacement:$ python fixcerts_3_2.py replace --certType <cert> --serviceRestart True
Replace MACHINE_SSL_CERT certificate:$ python fixcerts_3_2.py replace --certType machinessl
Replace STS Signing certificate:$ python fixcerts_3_2.py replace --certType sts
Replace Solution Users certificates:$ python fixcerts_3_2.py replace --certType solutionusers
Replace data-encipherment certificate:$ python fixcerts_3_2.py replace --certType data-encipherment
Replace LookupService certificate if STS_INTERNAL_SSL_CERT store is available:$ python fixcerts_3_2.py replace --certType lookupservice
Replace expired certificates from SMS store:$ python fixcerts_3_2.py replace --certType sms
Remove Non-CA certificates from TRUSTED_ROOTS store if exists:$ python fixcerts_3_2.py remove --storeType trusted_roots --certType non-ca
Remove expired certificates from TRUSTED_ROOTS store if exists:$ python fixcerts_3_2.py remove --storeType trusted_roots --certType expired
Update thumbprint for vpxd extensions eam, rbd and imagebuilder:$ python fixcerts_3_2.py update --ExtensionType all
$ python fixcerts_3_2.py update --ExtensionType eam
$ python fixcerts_3_2.py update --ExtensionType rbd
$ python fixcerts_3_2.py update --ExtensionType imagebuilder