You may need to replace or renew NSX Manager certificates in the following situations:
The existing self-signed certificates are about to expire.
You are implementing a corporate CA-signed certificate.
VMware NSX 4.2.x
Generate a Certificate Signing Request (CSR):
Obtain a CA-Signed Certificate:
Submit the CSR to your internal or external Certificate Authority (CA).
Ensure the issued certificate includes:
The full certificate chain (Root, Intermediate (Only if provided by the CA), and CA certificates).
Import the CA-Signed Certificate:
Navigate to System > Certificates > CSR > Select the respective CSR
Click Import Certificate for CSR.
Make sure to disable the Service Certificate toggle button
Note: NSX service certificates are user-facing for services such as load balancer, VPN, and TLS Inspection.
Update the signed certificate file.
The full CA chain (if available).
-----BEGIN CERTIFICATE-----(Leaf certificate)Issued To: myserver.company.comIssued By: Intermediate CA 1-----END CERTIFICATE----------BEGIN CERTIFICATE-----(Intermediate certificate)Issued To: Intermediate CA 1 NOTE: The intermediate CA certificate may be absent if the NSX Manager Certificate was signed directly by the Root CAIssued By: Root CA-----END CERTIFICATE----------BEGIN CERTIFICATE-----(Root certificate)Issued To: Root CAIssued By: Root CA (self-signed)-----END CERTIFICATE-----
NOTE: ALL the certificates must be in the same certificate file in the order above. Many CA tools generate them in individual files. These must be concatenated without extra white space.
Confirm that the imported certificate appears in the list with the correct Subject, Issuer, and Expiration Date.
Apply the New Certificate:
Applying a single certificate to all NSX Manager nodes and the MGMT_CLUSTER VIP is only possible if the SAN entries in the CSR include all nodes and the VIP.
Apply the imported certificate to each NSX Manager node individually to ensure the API service on each node uses the new certificate.
Navigate to System > Certificates, select the node-specific certificate, click Apply Certificate, and save.
After applying the certificate to all nodes, apply the same certificate to the MGMT_CLUSTER (VIP) service so that the cluster virtual IP presents the CA-signed certificate.
Wait for the services to restart and verify that the NSX Manager UI and API are accessible using the new certificate.
Refer to the related KB articles below if issues are encountered.