vCenter 8.0 Upgrade Fails Due to SHA1 Signature Algorithm in certificate chain when VMCA is a sub CA
search cancel

vCenter 8.0 Upgrade Fails Due to SHA1 Signature Algorithm in certificate chain when VMCA is a sub CA

book

Article ID: 399821

calendar_today

Updated On:

Products

VMware vCenter Server VMware vSphere ESXi

Issue/Introduction

In a default vCenter Server deployment, VMCA is the root certificate authority (CA). However, VMCA can be configured a subordinate CA where an outside authority is the root and VMCA uses an intermediate certificate.

  • Preparing for upgrade to vSphere 8, the pre-check reported SHA1 in certificate chain.

Cause

If VMCA is configured as a subordinate CA and the root certificate uses a weak digital signature, then the root certificate will need to be replaced and all certificates reissued.

  • vSphere 8 does not support SHA1 certificate algorithm. Any certs on the VCSA using SHA1 need to be removed before upgrade.

Resolution

Before proceeding, take snapshot and/or backup of the vCenter VM. If the VCSA is linked (ELM), take offline snapshots of all linked nodes. 

  1. Reset the VMCA certificate using one of the following methods:
  2. Reissue all ESXi TLS certificates with the new VMCA certificate if they were signed with the previous VMCA certificate.
  1. Remove the old and now unused CA root certificate and intermediate certificates from the TRUSTED_ROOTS store of VECS.
  1. Push the CA certificate changes to the ESXi hosts using "Refresh CA Certificates" in the vSphere UI.