This article explains the process to replace STS_INTERNAL_SSL_CERT using vCert.
openssl s_client -connect localhost:3128 -showcertsChecking STS Server Configuration-----------------------------------------------------------------Checking VECS store configuration LEGACYVMware vCenter Server
In vCenter 6.x, the vmware-stsd service uses a legacy certificate stored in STS_INTERNAL_SSL_CERT (listening on port 3128) for identity management. Because this certificate is migrated during upgrades to ensure continuity, it often expires silently in newer versions, eventually causing certificate expiration.
Follow vCert - Scripted vCenter expired certificate replacement for the installation and script running guidelines.
Note: Executing below steps will lead to restart of vmware-stsd service.
To renew the expired certificate for the below steps,
Run the vCert script
./vCert.py
[email protected] account credentialsLEGACY as highlighted below, select Yes(y) to update STS server configuration to use MACHINE_SSL_CERT storeYes(y) to restart vmware-stsd serviceopenssl s_client -connect localhost:3128 -showcerts
Here is how vCert handles STS_INTERNAL_SSL_CERT.
./vCert.py --run ./config/check_config/sts_config/op_check_sts_config.yaml