Configuring CA signed certificates for vCenter Site Recovery Manager 6.x and later versions
book
Article ID: 343880
calendar_today
Updated On:
Products
VMware Live Recovery
Issue/Introduction
This article provides steps to configure Certificate Based Authentication using CA signed certificates within your SRM server pair. This article assumes that you have already performed the steps given in Implementing CA signed SSL certificates with vSphere 5.x (2034833) to replace the certificates for vCenter Server components.
Environment
VMware vCenter Site Recovery Manager 8.x VMware vCenter Site Recovery Manager 6.5.x VMware vCenter Site Recovery Manager 6.0.x
You can generate the certificate signing request using OpenSSL. If you have already installed the SRM Server using the default certificates, OpenSSL is available on the SRM server under C:\Program Files\VMware\VMware vCenter Site Recovery Manager\bin.
If you have installed OpenSSL on a Windows machine, you can use this while replacing the vCenter Server certificates:
Create an OpenSSL configuration file for each SRM site using a text editor (change the fields in red to match your environment):
Note: All entries in the OpenSSL configuration file must be lowercase.
[ v3_req ] basicConstraints = CA:FALSE keyUsage = digitalSignature, keyEncipherment, dataEncipherment extendedKeyUsage = serverAuth, clientAuth subjectAltName = <SRM host FQDN> - must match the SRM server local host address that you specify when you install SRM
[ req_distinguished_name ] 0.organizationName = <your org name> - must not be empty and must contain fewer than 4096 characters. Not required anymore to be the same for both SRM certificates organizationalUnitName = <your org unit name> - not required anymore to be the same for both SRM certificates commonName = same name for both SRM certificates
Note: In this example, the files are called protected.cfg and recovery.cfg.