Upon navigating to ESXi's IP/FQDN: https://IP_of_host, the URL display the certificate as not secure as below:
VMware vSphere ESXi
The host address is flagged as 'Not Secure' because the generated certificate lacked a Subject Alternative Name (SAN) field itself, which is essential for browsers to validate the certificate properly.
How to Verify if the SAN Field is Missing or Present in a Certificate:
1. Open the ESXi web client in a browser.
2. Click on the padlock icon/settings icon in the address bar and view the certificate details.
3. Navigate to: Certificate → Details → Look under the Extensions section.
4. Check for the "Subject Alternative Name (SAN)" field:
○ If the SAN field is missing thereby missing the short name, hostname or IP of the ESXi, the certificate is not considered secure by modern browsers.
○ The SAN field may include:
# Fully Qualified Domain Name (FQDN)
# IP address
# Short hostname (if applicable)
Common Cause for Missing SAN:
• When the CSR (Certificate Signing Request) is generated on a Linux-based system, and the openssl.cfg file is not properly configured, the SAN field may be omitted.
• The openssl.cfg must explicitly include SAN entries to ensure the certificate is recognized as secure.
Sample Output (openssl.cfg):
Field Name: subjectAltName = DNS:vcenter, IP:10.0.0.10, DNS:vcenter.domain.com
The issue occurs because the SAN (Subject Alternative Name) field is missing from the openssl.cfg file. As a result, when generating a Certificate Signing Request (CSR), the certificate does not include the necessary SAN entries such as the IP address, FQDN, or short hostname—causing browsers to mark the URL as "Not Secure."
To resolve this, you can choose one of the following approaches:
openssl.cfg on a Linux-based system[ req_ext ]subjectAltName = @alt_names
[ alt_names ]
DNS.1 = vcenter
DNS.2 = vcenter.domain.com
IP.1 = 10.0.0.10
openssl.cfg is correctly updated with SAN details.Following this, the next steps involve: