When an external Key Management Server (KMS) is connected to vCenter Server, the vCenter Server also stores the KMS certificate in the vSphere Endpoint Certificate Store (VECS).
However, due to current limitations, when the KMS server certificates expires, it is not automatically being removed from VECS.
Current vCenter Server version do not have an automatic logic to remove expired KMS server certificates from the VECS store.
The expired KMS server certificate entries in VECS can however be removed manually by
The expired KMS server certificate in the VECS store doesn't influence the connection between vCenter and KMS server.
Broadcom is planning to release a fix to address the limitation of removing expired certificates from the KMS store in a future update. Engineering has acknowledged the issue and will incorporate this requirement as part of a future feature enhancement. In the meantime, as a workaround, you can use the following steps to manually remove the expired KMS certificate from the VECS store:
# /usr/lib/vmware-vmafd/bin/vecs-cli entry list --store KMS_ENCRYPTION --text | grep -E "Alias :|Not After :"
# /usr/lib/vmware-vmafd/bin/vecs-cli entry delete --store KMS_ENCRYPTION --alias <alias_name_from_step1>