Use the workaround to unpublish and re-publish the trusted root certificates.
Workaround:
To resolve the issue, you will need to unpublish and re-publish the custom certificates from VMDIR. To unpublish the certificates from VMDIR, you need the certificate files from the TRUSTED_ROOTS VECS store.
Before proceeding, ensure the customer has a valid backup from the vCenter.
1. Connect to the vCenter per SSH
2. Review the TRUSTED_ROOTS certificates:
# /usr/lib/vmware-vmafd/bin/vecs-cli entry list --store TRUSTED_ROOTS --text | egrep "Alias|Issuer:|Not Before:|Not After :|Subject:|CA:"
3. The Output will look similar to this:
Alias : 21eb0eff363fd06c8f04132719ef3f7b29856fb0
Issuer: CN=CA, DC=vsphere, DC=local, C=US, ST=California, O=vcsa.example.org, OU=VMware Engineering
Not Before: Jul 11 14:52:55 2021 GMT
Not After : Jul 9 14:52:55 2031 GMT
Subject: CN=CA, DC=vsphere, DC=local, C=US, ST=California, O=vcsa.example.org, OU=VMware Engineering
CA:TRUE, pathlen:0
Alias : 97296d7c3d0d8ee0e0d78146a11180f3de78b592
Issuer: C=DE, O=Production GmbH, CN=Production Root CA 1
Not Before: Apr 28 07:49:22 2017 GMT
Not After : Apr 28 07:59:17 2057 GMT
Subject: C=DE, O=Production GmbH, CN=Production Root CA 1
CA:TRUE
## Usually, all certificates that do not contain "VMware Engineering" are custom certificates.
4. Export the custom certificates:
# /usr/lib/vmware-vmafd/bin/vecs-cli entry getcert --store TRUSTED_ROOTS --alias <<ALIAS>> > /tmp/<<ALIAS>>.crt
5. Once exported, unpublish the certificate and republish it:
# /usr/lib/vmware-vmafd/bin/dir-cli trustedcert unpublish --cert /tmp/<<ALIAS>>.crt --login administrator
## Confirm with local SSO admin password
6. Now, publish the same certificate again:
# /usr/lib/vmware-vmafd/bin/dir-cli trustedcert publish --cert /tmp/<<ALIAS>>.crt --login administrator
## Confirm with local SSO admin password
7. Repeat steps 4 - 6 for every custom certificate.
8. Verify if the trusted root certificates can now be viewed in vSphere Client.