- Creating and Publishing a Certificate Template
- Connect to the CA server
- Open the MMC console for Certificate Templates:
- Click File and select Add/Remove Snap-in
- Select Certificate Templates in Available Snap-Ins and click Add
- Click OK
- From the right pane, right-click Web Server template
- Click Duplicate Template
In the Properties of New Template dialog box:
- Click the General tab
- Type the name of the template in Template name text box
In the Properties of New Template dialog box:
- Click the Subject Name tab
- Select the Supply in the request radio button
In the Properties of New Template dialog box:
- Click the Security tab
- Assign Full Control privileges to the domain administrator
- Assign Full Control privileges to the computer issuing this certificate
- Click OK
- Open the MMC console for Certification Authority for the domain:
- Right-click Certificate Templates
- Select New > Certificate Template to Issue
In the Enable Certificate Templates dialog box:
- Select the certificate created in the above steps
- Click OK
- Connect to the machine where OpenSSL is installed to generate the certificates.
- Create the directories needed by running these commands:
Note: Replace the short names where applicable.
mkdir c:\certs\vrava
mkdir c:\certs\vraiaasweb
mkdir c:\certs\vraiaasms
- Prepare configuration files required for the appliances
To prepare the configuration files:
Create three text files in the associated directory named:
- vra.cfg
- iaasweb.cfg
- iaasms.cfg
In these files replace the
commonName ,
subjectAltName ,
countryName ,
state ,
locality ,
org, and
OU with the correct values for your environment.
Note: For all components, the subjectAltName fields must include all the nodes where the component is installed, and the corresponding load-balancer.
Example:
- For iaas-web: subjectAltName = DNS: iaas-web-lb, DNS: iaas-web-lb.domain.local, DNS: iaas-web1, DNS: iaas-web1.domain.local, DNS: iaas-web2, DNS: iaas-web2.domain.local
- For iaas-ms: subjectAltName = DNS: iaas-ms-lb, DNS: iaas-ms-lb.domain.local, DNS: iaas-ms1, DNS: iaas-ms1.domain.local, DNS: iaas-ms2, DNS: iaas-ms2.domain.local
The contents of each file:
[ req ]
default_bits = 2048
default_keyfile = rui.key
distinguished_name = req_distinguished_name
encrypt_key = no
prompt = no
string_mask = nombstr
req_extensions = v3_req
[ v3_req ]
basicConstraints = CA:FALSE
keyUsage = digitalSignature, keyEncipherment, dataEncipherment
extendedKeyUsage = serverAuth, clientAuth
subjectAltName = DNS: vra-lb, DNS: vra-lb.domain.local, DNS: vra-va1, DNS: vra-va1.domain.local, DNS: vra-va2, DNS: vra-va2.domain.local
[ req_distinguished_name ]
countryName = YourCountry
stateOrProvinceName = YourState
localityName = YourLocal
0.organizationName = YourOrganization
organizationalUnitName = YourOU
commonName = vrava
- Creating the certificate signing requests
Run these commands to create certificate signing request:
Note: Replace the path and file names where applicable
c:\OpenSSL\bin\openssl req -new -nodes -out c:\certs\vrava\rui.csr -keyout c:\certs\vrava\rui-orig.key -config c:\certs\vrava\vra.cfg
c:\OpenSSL\bin\openssl req -new -nodes -out c:\certs\vraiaasweb\rui.csr -keyout c:\certs\vraiaasweb\rui-orig.key -config c:\certs\vraiaasweb\iaasweb.cfg
c:\OpenSSL\bin\openssl req -new -nodes -out c:\certs\vraiaasms\rui.csr -keyout c:\certs\iaasms\rui-orig.key -config c:\certs\iaasms\iaasms.cfg
c:\OpenSSL\bin\openssl rsa -in c:\certs\vrava\rui-orig.key -out c:\certs\vrava\rui.key
c:\OpenSSL\bin\openssl rsa -in c:\certs\vraiaasweb\rui-orig.key -out c:\certs\vraiaasweb\rui.key
c:\OpenSSL\bin\openssl rsa -in c:\certs\iaasms\rui-orig.key -out c:\certs\iaasms\rui.key
- Sign the certificates
To sign the certificates:
Navigate to your CA web enrolment portal at http://FQDN/certsrv , and log in with an appropriate account such as domain admin.
Submit certificate requests for all three csr certificates using the certificate template created above. Download certificate file using 'Base 64' and save each to the appropriate directory as rui.cer.
Download the root CA Certificate selecting 'Base 64' encoding and save it to c:\certs\ as root.cer.
- Generate the pfx and create the PEM files
Run these commands to generate the pfx and create the PEM files:
Note: Create or enter a password where applicable.
c:\OpenSSL\bin\openssl pkcs12 -export -in C:\certs\vrava\rui.cer -inkey C:\certs\vrava\rui.key -certfile c:\certs\root.cer -name "rui" -passout pass:CREATEPASSWORD -out C:\certs\vrava\rui.pfx
c:\OpenSSL\bin\openssl pkcs12 -export -in C:\certs\vraiaasweb\rui.cer -inkey C:\certs\vraiaasweb\rui.key -certfile c:\certs\root.cer -name "rui" -passout pass:CREATEPASSWORD -out C:\certs\vraiaasweb\rui.pfx
c:\OpenSSL\bin\openssl pkcs12 -export -in C:\certs\vraiaasms\rui.cer -inkey C:\certs\vraiaasms\rui.key -certfile c:\certs\root.cer -name "rui" -passout pass:CREATEPASSWORD -out C:\certs\vraiaasms\rui.pfx
c:\OpenSSL\bin\openssl pkcs12 -in c:\certs\vrava\rui.pfx -inkey c:\certs\vrava\rui.key -out c:\certs\vrava\rui.pem -nodes
c:\OpenSSL\bin\openssl pkcs12 -in c:\certs\vraiaasweb\rui.pfx -inkey c:\certs\vraiaasweb\rui.key -out c:\certs\vraiaasweb\rui.pem -nodes
c:\OpenSSL\bin\openssl pkcs12 -in c:\certs\vraiaasms\rui.pfx -inkey c:\certs\vraiaasms\rui.key -out c:\certs\vraiaasms\rui.pem -nodes
- Import the certificates into vRealize Automation
- In a browser open https://vra-lb:5480 and log in
- Select VRA / Certificates
- For each component:
- Select the appropriate radio button.
- Select Certificate Action: Import
- From rui.pem extract key and enter it in the 'RSA Private Key' section. It should start with ----BEGIN RSA PRIVATE KEY---- and end with ----END RSA PRIVATE KEY----
- In 'Certificate Chain' copy and paste the certificates from the same rui.pem file . CA certificate should be positioned last.