This Article aims to provide the complete process for a clean certificate replacement task for VMware Identity Manager.
Exception message: vIDM GET Association Ruleset failed with status code : 401. API Response : UnauthorizedUnexpected error has occurred. Please try again later. https://<vIDM_LB_FQDN>/hc/error, potentially displaying an error like: "Error: You do not have permission to access this page: /hc/3104/authenticate/". However, when accessing the VIDM nodes directly using their individual URLs, the UI loads correctly and config-state.json file is not corrupted. This issue only occurs when accessing the VIDM UI through the load balancer's FQDNVMware Identity Manager 3.3.x
Aria Suite Lifecycle Manager 8.x
Aria Automation 8.x
VMware Identity Manager certificate replacement stages.
Note: This is the ideal process to be followed given that the certificate replacement is being conducted prior to certificate expiry.
Stage 1 : Certificate creation
Stage 2: Update Load balancer certificates
- Applicable for clustered VMware Identity Manager set up. Proceed to next stage if it is a single node set up.
- This is a critical requirement as ideally the SSL configuration for Load balancing virtual server would be set to SSL terminated for VMware Identity Manager.
- The steps below outline the procedure for certificate replacement for virtual servers configured on VMware NSX. Parallel steps can be followed if other support load balancers are used in the set up instead of NSX.
Stage 3 Replace certificates on VMware Identity Manager nodes
Stage 4 Update Aria Automation to trust VMware Identity Manager with new certificates
- This is required as Aria Automation seeks VMware Identity Manager for all permissions and currently holds old VMware Identity Manager certs. Thus, this step would update the Aria Automation appliances with the new Identity Manager certificates and rebuild the Aria Automation services.
1. Trigger inventory sync for Aria Automation.
2. Trigger re-trust with VMware Identity Manager.
Aria Automation can now connect with VMware Identity Manager successfully.
Note: If you find that you are still unable to sign into workspace one using the VIDM LB with a VIDM user please apply the steps in kb Troubleshooting LCMVIDM71077: Unable to trust the load balancer certificate assigned to VIDM