Functionality, impact, and renewal process of NSX Manager self-signed certificates
NSX 4.2.1
From NSX 4.2.1, NSX Manager, auto renews the self-signed certificates when expiry is less than 31 days (not configurable less than 31 days).
admin and switch to the root user account by running the command st en curl -X GET -H 'Content-Type: application/json' -sN -k -u admin "https://<NSX-Manager-IP>/policy/api/v1/infra/security-global-config"{ "crl_checking_enabled" : false, "ca_signed_only" : false, "eku_checking_enabled" : true, "automatic_appliance_certificate_renewal_enabled" : true, "automatic_appliance_certificate_renewal_lead_time" : 31, "id" : "########-####-####-####-#########", "_protection" : "NOT_PROTECTED", "_create_time" : 1758009379287, "_create_user" : "system", "_last_modified_time" : 1758009379287, "_last_modified_user" : "system", "_revision" : 0
}
Disabling the auto certificate renewal configuration
admin and switch to the root user account by running the command st encurl -X GET -H 'Content-Type: application/json' -H 'X-Allow-Overwrite: true' -sN -k -u admin "https://<NSX-Manager-IP>/policy/api/v1/infra/security-global-config"
automatic_appliance_certificate_renewal_enabled to false.
PUT command below with parameters highlighted after the argument -d curl -X PUT -H 'Content-Type: application/json' -d 'Output-from-the-above-command' -sN -k -u admin "https://<NSX-Manager-IP>/policy/api/v1/infra/security-global-config"
Sample Output :-
automatic_appliance_certificate_renewal_enabled option to false.curl -X PUT -H 'Content-Type: application/json' -d '{"crl_checking_enabled" : false,"ca_signed_only" : false,"eku_checking_enabled" : true,"automatic_appliance_certificate_renewal_enabled" : false,"automatic_appliance_certificate_renewal_lead_time" : 31,"id" : "########-####-####-####-#########","_protection" : "NOT_PROTECTED","_create_time" : 17558009379287,"_create_user" : "system","_last_modified_time" : 1758800581088,"_last_modified_user" : "admin","_revision" : 0}' -sN -k -u admin "https://localhost/policy/api/v1/infra/security-global-config"
Note :-
Expiry of internal self-signed certificates does not disrupt existing connected components or data plane traffic.
If NSX manager is associate with any other external components such as VRNI, VROPs etc, ensure that the new self signed certificate reflects in the corresponding components.
Self-signed certificates are only used for internal communications and do not affect VPN/IPSec or east-west/north-south traffic.
Refer to the documentation for more details :- Automatically Replacing Expiring Certificates