In VMware Aria Automation, when a vCenter Cloud Account is VCF enabled, the account may enter a failure state or fail to synchronize if the stored SSL certificates are mismatched. This specific behavior occurs when the certificates for the underlying vCenter or NSX managers have been rotated or updated, but the Aria Automation provisioning service is still attempting to authenticate using stale certificate data.
Aria Automation 8.18.x
The certificate thumbprints and PEM files stored in the Aria Automation database have become outdated. Because a VCF-enabled account links multiple endpoints, a mismatch in even one certificate (vCenter or NSX) can disrupt the entire Cloud Account's functionality.
Follow these steps to manually align the certificates using the Aria Automation API.
openssl command to fetch the latest certificate from the NSX or vCenter endpoint in the correct format for an API payload:openssl s_client -connect <endpoint-fqdn>:443 2> /dev/null | openssl x509 | awk 'NF {sub(/\r/, ""); printf "%s\\n",$0;}'GET request to verify the current resource state and confirm the Resource ID.GET URL: https://{Ariaautoation-url}/provisioning/uerp/resources/endpoints/{endpoint-resource-id}PATCH request to update the certificate field in both endpointProperties and customProperties.PATCH URL: https://{Ariaautoation-url}/provisioning/uerp/resources/endpoints/{endpoint-resource-id}Body (JSON): ```json
{
"endpointProperties": {
"certificate": "-----BEGIN CERTIFICATE-----\n[Validated-Certificate-String]\n-----END CERTIFICATE-----"
},
"customProperties": {
"certificate": "-----BEGIN CERTIFICATE-----\n[Validated-Certificate-String]\n-----END CERTIFICATE-----"
}
}