VMware vCenter Server 6.7.x
VMware vCenter Server 7.0.x
VMware vCenter Server 8.0.x
When using an external CA, the MACHINE_SSL_CERT needs to contain all certificate starting from the root, like:
Then the Certificate Manager CLI Tool requests those two chain files, along with the key (Refer to Replace vCenter Machine SSL certificate Custom Certificate Authority Signed Certificate for Certificate Manager CLI)
Please provide a valid custom certificate for Machine SSL.
File : /tmp/ssl/machine_name_ssl.cer
Please provide a valid custom key for Machine SSL.
File : /tmp/ssl/machine_name_ssl.key
Please provide the signing certificate of the Machine SSL certificate
File : /tmp/ssl/Root64.cer
The full certificate chain is installed into the MACHINE_SSL_CERT VECS
The chain of CAs is installed in TRUSTED_ROOTS VECS
The reason for the full certificate chain in the MACHINE_SSL_CERT is so that the product/server presents the full SSL Chain when accessed via a browser/client and is required especially if a customer is using any Offline CA where an Intermediate CA is not installed in their Browser/Client OS Certificate Store.
Note: This is not recommended by VMware Engineering apart from cases where the customer uses offline CA. All TLS connections made via certificate added this way will be considered secure even if that may not be the case.