/var/log/vmware/vcf/operationsmanager/operationsmanager.logYYYY-MM-DDTHH:MM:SS DEBUG [vcf_om, 16#####################, ar##] [c.v.v.s. t. DynamicTrustManager, om-exec-7] Error checking certificate chainO=####, L=#####, ST=#####, C=##, CN=<vCenter-FQDN>. for validity.sun. security. validator. ValidatorException: PKIX path building failed: sun. security.provider. certpath. SunCertPathBuilderException: unable to find valid certification path to requested targetThe following scripted procedure can be used to update the SDDC Manager trust store with the new vCenter certificate.
python VcRootCaSync.pyerror state./home/vcf ]# python VcRootCaSync.pyPlease provide SSO administrator user[[email protected]]:Provide password for [email protected]:Available vCenter Servers:[1] ERROR | example.vCenter1.com[2] ACTIVE | example.vCenter2.com
Select a vCenter server by entering the corresponding number: 1 Selected vCenter: example.vCenter1.com
Session token created successfully Root certificate saved to /tmp/root.cer
vCenter example.vCenter1.com Root Certificate Found:-----BEGIN CERTIFICATE-----M#############################################b
-----END CERTIFICATE-----
vCenter Root certificate added to SDDC Manager trust stores. Refreshing certificate store Deleting root certificate from temp
active.Alternatively, The following methods can be referred to update the SDDC manager trust with the new vCenter certificate.
Manual method:
/usr/lib/vmware-vmca/bin/certool --getrootca --cert=/tmp/root.cer/usr/lib/vmware-vmafd/bin/vecs-cli entry list --store trusted_rootsvi /tmp/root.cerpass=$(cat /etc/vmware/vcf/commonsvcs/trusted_certificates.key)keytool -importcert -alias <aliasname> -file <certificate file> -keystore /etc/vmware/vcf/commonsvcs/trusted_certificates.store -storepass <trust store key>keytool -importcert -alias new_mgmt_root -file /tmp/root.cer -keystore /etc/vmware/vcf/commonsvcs/trusted_certificates.store -storepass $passkeytool -importcert -alias <aliasname> -file <certificate file> -keystore /etc/alternatives/jre/lib/security/cacerts --storepass changeitkeytool -importcert -alias new_mgmt_root -file /tmp/root.cer -keystore /etc/alternatives/jre/lib/security/cacerts --storepass changeitkeytool -list -v -keystore /etc/vmware/vcf/commonsvcs/trusted_certificates.store -storepass $pass | lesscurl -X POST localhost/appliancemanager/trustedCertificates/refreshAPI method:
awk 'NF {sub(//, ""); printf "%s\\n",$0;}' /tmp/vmca.crt
# awk 'NF {sub(//, ""); printf "%s\\n",$0;}' /tmp/vmca.crt-----BEGIN CERTIFICATE-----<certicate..............>-----END CERTIFICATE-----\nAPI Explorer > APIs for managing Trusted Certificates > POST