- If non-FIPS, use OCSP (server based revocation checking) instead of CRL
- Will be fixed in a future vSphere release.
- Ensure that the CRL or OCSP URLs are reachable from vCenter Server and not blocked by firewall
curl https://crl_ocsp_url
- Use an alternate CRL
- Set Revocation Policies for Smart Card Authentication
- Use CRL from certificate By default, vCenter Single Sign-On checks the location of the CRL that is defined in the certificate being validated. Deactivate this option if the CRL Distribution Point extension is absent from the certificate or if you want to override the default. CRL location Use this property if you deactivate Use CRL from certificate and you want to specify a location (file or HTTP URL) where the CRL is located.
Workaround:
If using FIPS mode, use OCSP and CRL.
Considerations When Using FIPS
When you activate FIPS, vCenter Server supports only cryptographic modules for federated authentication. As a result, RSA SecureID and some CAC cards no longer function.
Set Revocation Policies for Smart Card Authentication
- Both OSCP and CRL
- If the issuing CA supports both an OCSP responder and a CRL, vCenter Single Sign-On checks the OCSP responder first. If the responder returns an unknown status or is not available, vCenter Single Sign-On checks the CRL. For this case, activate both OCSP checking and CRL checking, and activate CRL as failover for OCSP.
If CRL is too large, increase memory on the two services tied to websso:
First run the command to check the current allocation:
cloudvm-ram-size -l
Note: Where there is no one size fits all memory value to set in this scenario, as a guide, double the size of currently assigned memory of the service that has an issue
cloudvm-ram-size -C XXXX vsphere-ui
Note: XXXX should be replaced by the desired amount of memory in MB.
For example, cloudvm-ram-size -C 2048 vsphere-ui would increase the memory of the vsphere-ui service from 768 MB to 2048 MB.