Example:
-- Compliant ESXi host
ssh-rsa < Key-A > host-name-A
ssh-rsa < Key-B > host-name-B
ssh-rsa < Key-C > host-name-C
ssh-rsa < Key-D > host-name-D
ssh-rsa < Key-E > host-name-E
-- Non-compliant ESXi host
ssh-rsa < Key-D > host-name-D
ssh-rsa < Key-A > host-name-A
ssh-rsa < Key-C > host-name-C
ssh-rsa < Key-B > host-name-B
ssh-rsa < Key-E > host-name-E
VMware vSphere ESXi 8.0
When remediating an ESXi host using a host profile, the order of the keys changes, which causes a discrepancy between the contents of the authorized_keys registered in the host profile and the contents of the authorized_keys registered in the host profile, resulting in a compliance check failure.
Note: This change in the order of the keys also occurs when rebooting an ESXi host remediated with a host profile.
There is currently no workaround for this issue. It will be fixed in a future release.
You can temporarily make the non-compliant ESXi host compliant by changing the contents of the authorized_keys file to the same order as the keys registered in the host profile.