This article provides the complete process for a clean certificate replacement task for VMware Identity Manager.
Aria Suite Lifecycle Manager Locker > Certificates shows a yellow exclamation point in a triangle. Upon inspecting the current certificate, the expiration date is within four weeks. If this is the case, please schedule a maintenance window to run through this process as soon as possible.LCMVIDM71059, with a full error snippet reporting:Exception message: vIDM GET Association Ruleset failed with status code : 401. API Response : UnauthorizedAn Unexpected error has occurred. Please try again later.https://<vIDM_LB_FQDN>/hc/error, potentially displaying an error such as: Error: You do not have permission to access this page: /hc/3104/authenticate/. However, when accessing the VIDM nodes directly using their individual URLs, the UI loads correctly and the config-state.json file is not corrupted. This issue only occurs when accessing the VIDM UI through the load balancer's FQDN.pkix path validation failed: java.security.cert.certpathvalidationexception: could not validate certificate: certificate expired occurs while accessing VMware Identity Manager.VMware Identity Manager 3.3.xAria Suite Lifecycle Manager 8.xAria Automation 8.x
Note: This is the ideal process to be followed given that the certificate replacement is being conducted prior to certificate expiry.
Aria Suite Lifecycle locker with correct details and SANs..pem.Structure of .pem downloaded:
--server certificate ---
--root ca cert--
--private key--Aria Suite Lifecycle and download it.Aria Suite Lifecycle Locker.Aria Suite Lifecycle for consumption.VMware NSX. Parallel steps can be followed if other support load balancers are used in the set up instead of NSX.Partition the .pem downloaded from Aria Suite Lifecycle into two files:
root.cer: --root ca cert----server cert--- and --private key--Certificates > Import > Import CA Certificate.root.cer and ensure the check box for service certificate is checked, as this is for Load balancing for a service, and import.Certificates > Import > Import Certificate.--server cert-- in the server certificate section.--private key-- in the private key section.Networking > Load balancing > Virtual Servers and Networking > Load Balancing > Monitor. Select the virtual server for VMware Identity Manager.Edit.SSL Configuration and click Edit.Server Certificate, select the new certificate uploaded.Advanced Configurations.Trusted Root CA Certificate and select the new Aria Suite Lifecycle root ca certificate.re-trust with load balancer for VMware Identity Manager from Aria Suite Lifecycle.Aria Suite Lifecycle before expiry, select Replace Certificates.Submit. This replaces the certificates on all nodes in a clustered set up.If certificates are expired, Aria Suite Lifecycle cannot connect to the nodes.
https://vIDM_node_FQDN:8443/cfg/login as the admin user. (Note: If the page is blank or redirects to database selector, navigate to https://vIDM_node_FQDN:8443/cfg/ssl).Custom SSL Certificates.SSL Certificate Chain, paste the entire chain from the .pem file:--server certificate ---
--root ca cert--Private Key section, paste the --private key--.Apply. Repeat for all nodes in a cluster.Aria Suite Lifecycle and trigger an Inventory Sync for VMware Identity Manager, followed by a Re-trust with Load Balancer for clustered setups.This updates the Aria Automation appliances with the new Identity Manager certificates and rebuilds the services.
Inventory Sync for Aria Automation.Re-trust with VMware Identity Manager.Note: If you cannot sign into Workspace ONE using the VIDM LB with a VIDM user, please follow the steps in Troubleshooting LCMVIDM71077: Unable to trust the load balancer certificate assigned to VIDM.