Vsphere Esxi Vcenter Server 703 Authentication Guide
Vsphere Esxi Vcenter Server 703 Authentication Guide
Update 3
Modified on 01 May 2023
VMware vSphere 7.0
VMware ESXi 7.0
vCenter Server 7.0
vSphere Authentication
You can find the most up-to-date technical documentation on the VMware website at:
https://docs.vmware.com/
VMware, Inc.
3401 Hillview Ave.
Palo Alto, CA 94304
www.vmware.com
©
Copyright 2019-2023 VMware, Inc. All rights reserved. Copyright and trademark information.
VMware, Inc. 2
Contents
Updated Information 9
VMware, Inc. 3
vSphere Authentication
VMware, Inc. 4
vSphere Authentication
vCenter Server Identity Provider Federation and Enhanced Linked Mode 108
vCenter Server Identity Provider Federation Caveats and Interoperability 110
vCenter Server Identity Provider Federation Life Cycle 111
Configuring vCenter Server Identity Provider Federation 112
vCenter Server Identity Provider Federation Configuration Process Flow 112
Use the Trusted Root Certificates Store Instead of the JRE truststore 114
Configure vCenter Server Identity Provider Federation for AD FS 114
Understanding vCenter Single Sign-On 118
vCenter Single Sign-On Components 118
Using vCenter Single Sign-On with vSphere 119
Groups in the vCenter Single Sign-On Domain 121
Configuring vCenter Single Sign-On Identity Sources 123
Identity Sources for vCenter Server with vCenter Single Sign-On 124
Set the Default Domain for vCenter Single Sign-On 125
Add or Edit a vCenter Single Sign-On Identity Source 126
Active Directory over LDAP and OpenLDAP Server Identity Source Settings 127
Active Directory Identity Source Settings 129
Add or Remove an Identity Source Using the CLI 130
Use vCenter Single Sign-On with Windows Session Authentication 131
Managing the vCenter Server Security Token Service 131
Refresh a vCenter Server STS Certificate Using the vSphere Client 132
Import and Replace a vCenter Server STS Certificate Using the vSphere Client 134
Replace a vCenter Server STS Certificate Using the Command Line 135
View the Active vCenter Server STS Signing Certificate Chain 137
Determine the Expiration Date of an LDAPS SSL Certificate 137
Managing vCenter Single Sign-On Policies 138
Edit the vCenter Single Sign-On Password Policy 138
Edit the vCenter Single Sign-On Lockout Policy 139
Edit the vCenter Single Sign-On Token Policy 140
Edit Password Expiration Notification for Active Directory (Integrated Windows
Authentication) Users 142
Managing vCenter Single Sign-On Users and Groups 142
Add vCenter Single Sign-On Users 142
Disable and Enable vCenter Single Sign-On Users 143
Delete a vCenter Single Sign-On User 144
Edit a vCenter Single Sign-On User 145
Add a vCenter Single Sign-On Group 145
Add Members to a vCenter Single Sign-On Group 146
Remove Members from a vCenter Single Sign-On Group 147
Change Your vCenter Single Sign-On Password 148
Understanding Other Authentication Options 148
Smart Card Authentication Login 150
VMware, Inc. 5
vSphere Authentication
VMware, Inc. 6
About vSphere Authentication
The vSphere Authentication documentation provides information to help you perform common
tasks such as certificate management and vCenter Single Sign-On configuration.
At VMware, we value inclusion. To foster this principle within our customer, partner, and internal
community, we create content using inclusive language.
vSphere Authentication explains how you can manage certificates for vCenter Server and related
services, and set up authentication with vCenter Single Sign-On.
vSphere Authentication with vCenter Single Sign-On n Architecture of the authentication process.
n How to add identity sources so users in your domain
can authenticate.
n Two-factor authentication.
n Managing users, groups, and policies.
n vCenter Server Identity Provider Federation
VMware, Inc. 7
vSphere Authentication
As these services are now part of vCenter Server, they are no longer described as a part of
Platform Services Controller. In vSphere 7.0, the vSphere Authentication publication replaces the
Platform Services Controller Administration publication. The new publication contains complete
information about authentication and certificate management. For information about upgrading
or migrating from vSphere 6.5 and 6.7 deployments using an existing external Platform
Services Controller to vSphere 7.0 using vCenter Server appliance, see the vSphere Upgrade
documentation.
Related Documentation
A companion document, vSphere Security, describes available security features and the
measures that you can take to safeguard your environment from attack. That document also
explains how you can set up permissions, and includes a reference to privileges.
In addition to these documents, VMware publishes the vSphere Security Configuration Guide
(formerly known as the Hardening Guide) for each release of vSphere, accessible at https://
core.vmware.com/security. The vSphere Security Configuration Guide contains guidelines on
security settings that can or should be set by the customer, and security settings delivered by
VMware that should be audited by the customer to ensure that they are still set to default.
Intended Audience
This information is intended for administrators who want to configure vCenter Server
authentication and manage certificates. The information is written for experienced Linux system
administrators who are familiar with virtual machine technology and data center operations.
VMware, Inc. 8
Updated Information
This vSphere Authentication document is updated with each release of the product or when
necessary.
This table provides the update history of the vSphere Authentication documentation.
Revision Description
01 MAY 2023 n Minor update to Edit the vCenter Single Sign-On Password Policy.
n Minor update to Use the vSphere Client to Manage Smart Card Authentication.
27 FEB 2023 n Updated information about AD FS certificates in Configure vCenter Server Identity Provider
Federation for AD FS.
n Updated the descriptions for the SystemConfiguration.BashShellAdministrators,
SystemConfiguration.Administrators, and SystemConfiguration.ReadOnly groups in Groups in the
vCenter Single Sign-On Domain.
10 FEB 2023 n Minor update to Certificate Requirements for Different Solution Paths.
09 FEB 2023 n Updated Groups in the vCenter Single Sign-On Domain to include missing group information.
n Minor updates to smart card information in Configuring and Using Smart Card Authentication and
Configure the Reverse Proxy to Request Client Certificates.
10 JAN 2023 n Minor update to Configure the Reverse Proxy to Request Client Certificates.
05 JAN 2023 n Minor update to Configure the Reverse Proxy to Request Client Certificates.
22 DEC 2022 n Minor update to Active Directory over LDAP and OpenLDAP Server Identity Source Settings.
n Minor update to Configure the Reverse Proxy to Request Client Certificates.
30 NOV 2022 n Minor update to Manage vCenter Server with the Management Interface.
n Minor update to dir-cli Command Reference.
01 NOV 2022 n Minor update to Active Directory over LDAP and OpenLDAP Server Identity Source Settings.
11 OCT 2022 n Minor update to Replace Solution User Certificates with New VMCA-Signed Certificates.
27 JUL 2022 n Minor update to Certificate Requirements for Different Solution Paths.
n Added information about SMS self-signed certificates to Where vSphere Uses Certificates.
21 JAN 2022 n Updated vCenter Server Identity Provider Federation Caveats and Interoperability and Configure
vCenter Server Identity Provider Federation for AD FS with additional information.
17 DEC 2021 n Minor update to Certificate Requirements for Different Solution Paths.
n Minor update to Make VMCA an Intermediate Certificate Authority (Certificate Manager).
VMware, Inc. 9
Getting Started with Certificate
Management and Authentication 1
vCenter Server provides common infrastructure services to the vSphere environment, including
certificate management and authentication with vCenter Single Sign-On.
n Managing Certificates
Term Definition
VMware, Inc. 10
vSphere Authentication
Term Definition
Identity Source (Directory Service) Stores and manages principals. Principals consist of
a collection of attributes about a user or service
account such as name, address, email, and group
membership. Examples: Microsoft Active Directory and
VMware Directory Service (vmdir).
VMware, Inc. 11
vSphere Authentication
Managing Certificates
You manage certificates from the vSphere Client, or by using an API, scripts, or CLIs.
Interface Description
CLIs for managing certificate and directory services Set of commands for managing certificates, the VMware
Endpoint Certificate Store (VECS), and VMware Directory
Service (vmdir). See Chapter 3 Managing Services and
Certificates with CLI Commands.
Procedure
1 Log in to a vCenter Server as a user with administrator privileges in the local vCenter Single
Sign-On domain.
2 Select Administration.
4 Perform certificate tasks, such as viewing certificate details, renewing the Machine SSL
certificate, and adding a Trusted Root certificate.
For example, you can use the certool utility to generate CSRs and to replace certificates. See
Managing Certificates with the vSphere Certificate Manager Utility.
Use the CLIs for management tasks that the vSphere Client does not support, or to create
custom scripts for your environment.
VMware, Inc. 12
vSphere Authentication
sso-config Update Security Token Service (STS) Replace a vCenter Server STS
certificates. Certificate Using the Command Line
service-control Command for starting, stopping, and Run this command to stop services
listing services. before running other CLI commands.
Prerequisites
Enable SSH login to vCenter Server. See Manage vCenter Server with the Management Interface.
Procedure
Usually, you have to be the root or Administrator user. See Required Privileges for Running
CLIs for details.
The required privileges depend on the task that you want to perform. Sometimes, you are
prompted for the password twice to safeguard sensitive information.
/usr/lib/vmware-vmafd/bin/vecs-cli
/usr/lib/vmware-vmafd/bin/dir-cli
/usr/lib/vmware-vmca/bin/certool
/opt/vmware/bin
/opt/vmware/bin/sso-config.sh
The service-control command does not require that you enter the path.
VMware, Inc. 13
vSphere Authentication
Interface Description
Procedure
1 Log in to a vCenter Server as a user with administrator privileges in the local vCenter Single
Sign-On domain.
2 Select Administration.
3 Under Single Sign On, click Configuration to manage identity providers and configure
password and lockout policies.
Use the sso-config utility for management tasks that the vSphere Client does not support, or to
create custom scripts for your environment.
service-control Command for starting, stopping, and Run this command to stop services
listing services. before running other CLI commands.
Prerequisites
Enable SSH login to vCenter Server. See Manage vCenter Server with the Management Interface.
VMware, Inc. 14
vSphere Authentication
Procedure
Usually, you have to be the root or Administrator user. See Required Privileges for Running
CLIs for details.
The required privileges depend on the task that you want to perform. Sometimes, you are
prompted for the password twice to safeguard sensitive information.
/opt/vmware/bin/sso-config.sh
The service-control command does not require that you specify the path.
For more information about managing vCenter Server, see vCenter Server Configuration.
Interface Description
vCenter Server Management Interface Use this interface to reconfigure the system settings. See
Manage vCenter Server with the Management Interface.
Settings include time synchronization, network settings, and SSH login settings. You can also
change the root password, join the appliance to an Active Directory domain, and leave an Active
Directory domain.
Note Under the Networking pane, the virtual NIC 0 is reserved for management traffic. You
cannot reassign the traffic from NIC 0 to another NIC. If you are using VCHA, this traffic uses NIC
1. You can add NICs to the vCenter Server Appliance. See the VMware knowledge base article at
https://kb.vmware.com/article/2147155.
Procedure
VMware, Inc. 15
vSphere Authentication
2 If a warning message about an untrusted SSL certificate appears, resolve the issue based on
your company security policy and the browser that you are using.
3 Log in as root.
The default root password is the root password that you set when deploying the vCenter
Server.
Results
You see the Summary page of the vCenter Server Management Interface.
Procedure
n If you have direct access to the vCenter Server console, select Log in, and press Enter.
n To connect remotely, use SSH or another remote console connection to start a session to
the vCenter Server.
3 Log in as root with the password that you set when you initially deployed the vCenter Server.
If you are unable to use vCenter Server Identity Provider Federation, or Active Directory over
LDAPS, vCenter Server supports Integrated Windows Authentication (IWA). To use IWA, you
must join the vCenter Server to your Active Directory domain.
Procedure
1 Using the vSphere Client, log in to vCenter Server as a user with administrator privileges in
the local vCenter Single Sign-On domain (vsphere.local by default).
2 Select Administration.
VMware, Inc. 16
vSphere Authentication
5 Click Join AD, enter the domain, optional organizational unit, and user name and password,
and click Join.
What to do next
To attach users and groups from the joined Active Directory domain, add the joined domain as a
vCenter Single Sign-On identity source. See Add or Edit a vCenter Single Sign-On Identity Source.
VMware, Inc. 17
vSphere Security Certificates
2
vSphere provides security by using certificates to encrypt communications, authenticate
services, and sign tokens.
n Encrypt communications between two nodes, such as a vCenter Server and an ESXi host.
vSphere's internal certificate authority, VMware Certificate Authority (VMCA), provides all the
certificates necessary for vCenter Server and ESXi. VMCA is installed on every vCenter Server
host, immediately securing the solution without any other modification. Keeping this default
configuration provides the lowest operational overhead for certificate management. vSphere
provides a mechanism to renew these certificates in the event they expire.
vSphere also provides a mechanism to replace certain certificates with your own certificates.
However, replace only the SSL certificate that provides encryption between nodes, to keep your
certificate management overhead low.
VMCA Default Certificates VMCA provides all the Simplest and lowest overhead. VMCA can
certificates for vCenter Server manage the certificate life cycle for vCenter
and ESXi hosts. Server and ESXi hosts.
VMCA Default Certificates You replace the vCenter Simple and secure. VMCA manages internal
with External SSL Certificates Server SSL certificates, and certificates but you get the benefit of using your
(Hybrid Mode) allow VMCA to manage corporate-approved SSL certificates, and having
certificates for solution users those certificates trusted by your browsers.
and ESXi hosts. Optionally,
for high-security conscious
deployments, you can replace
the ESXi host SSL certificates as
well.
VMware, Inc. 18
vSphere Authentication
VMware does not recommend replacing either solution user certificates or STS certificates, nor
using a subordinate CA in place of the VMCA. If you choose either of these options, you might
encounter significant complexity and the potential for a negative impact to your security, and an
unnecessary increase in your operational risk. For more information about managing certificates
within a vSphere environment, see the blog post titled New Product Walkthrough - Hybrid
vSphere SSL Certificate Replacement at http://vmware.com/go/hybridvmca.
You can use the following options to replace the existing certificates.
Option See
Use the vSphere Client. Managing Certificates with the vSphere Client
Use the vSphere Automation API to manage the life cycle VMware vSphere Automation SDKs Programming Guide
of certificates.
Use the vSphere Certificate Manager utility from the Managing Certificates with the vSphere Certificate
command line. Manager Utility
Use CLI commands for manual certificate replacement. Chapter 3 Managing Services and Certificates with CLI
Commands
Before you begin, ensure that all nodes in your environment are time synchronized.
Note vSphere deploys only RSA certificates for server authentication and does not support
generating ECDSA certificates. vSphere verifies ECDSA certificates presented by other servers.
For example, if vSphere connects to a syslog server and the syslog server has an ECDSA
certificate, vSphere supports verifying that certificate.
n PEM format. VMware supports PKCS8 and PKCS1 (RSA keys). When you add keys to VECS,
they are converted to PKCS8.
VMware, Inc. 19
vSphere Authentication
n x509 version 3
n CRT format
n Exempting the vpxd-extension solution user certificate, Extended Key Usage can be either
empty or contain Server Authentication.
n When creating a custom machine SSL certificate for vCenter Server, Server Authentication
and Client Authentication are not supported, and must be removed when using the Microsoft
Certificate Authority (CA) templates. For more information, see the VMware knowledge base
article at https://kb.vmware.com/s/article/2112009.
If you do not generate CSRs using Certificate Manager, ensure that the CSR includes the following
fields.
CN commonName
L localityName
ST stateOrProvinceName
O organizationName
OU organizationalUnitName
C countryName
STREET streetAddress
DC domainComponent
UID userid
If you generate CSRs using Certificate Manager, you are prompted for the following information,
and Certificate Manager adds the corresponding fields to the CSR file.
n Information that Certificate Manager stores in the certool.cfg file. For most fields, you can
accept the default or provide site-specific values. The FQDN of the machine is required.
VMware, Inc. 20
vSphere Authentication
n Company name
n Organization name
n Organization unit
n State
n Locality
n IP address (optional)
n Email
n Host name, that is, the fully qualified domain name of the machine for which you
want to replace the certificate. If the host name does not match the FQDN, certificate
replacement does not complete correctly and your environment might end up in an
unstable state.
n IP address of the vCenter Server node on which you run Certificate Manager.
VMware, Inc. 21
vSphere Authentication
basicConstraints =
critical,CA:true
keyUsage =
critical,digitalSignature,keyCertSign
Machine SSL certificate You can use the vSphere Certificate Manager to create
the CSR or create the CSR manually.
If you create the CSR manually, it must meet the
requirements listed previously under Requirements for All
Imported Certificates. You also have to specify the FQDN
for the host.
Solution user certificate You can use vSphere Certificate Manager to create the
CSR or create the CSR manually.
Note You must use a different value for Name for each
solution user. If you generate the certificate manually, this
might show up as CN under Subject, depending on the
tool you use.
VMware, Inc. 22
vSphere Authentication
Machine SSL certificate The machine SSL certificate on each node must have a
separate certificate from your third-party or enterprise
CA.
n You can generate the CSR using the vSphere Client
or vSphere Certificate Manager, or create the CSR
manually. The CSR must meet the requirements
listed previously under Requirements for All Imported
Certificates.
n For most fields, you can accept the default or provide
site-specific values. The FQDN of the machine is
required.
Solution user certificate Each solution user on each node must have a separate
certificate from your third-party or enterprise CA.
n You can generate the CSRs using vSphere Certificate
Manager or prepare the CSR yourself. The CSR
must meet the requirements listed previously under
Requirements for All Imported Certificates.
n If you use vSphere Certificate Manager, the tool
prompts you for certificate information for each
solution user. vSphere Certificate Manager stores the
information in certool.cfg. See Information that
Certificate Manager Prompts For.
VMware, Inc. 23
vSphere Authentication
If you do not currently replace VMware certificates, your environment starts using VMCA-signed
certificates instead of self-signed certificates.
n Have the VMCA root certificate signed by a third-party CA or enterprise CA. Replace the
VMCA root certificate with that signed certificate. In this scenario, the VMCA certificate is an
intermediate certificate. VMCA provisions vCenter Server components and ESXi hosts with
certificates that include the full certificate chain.
n If your company policy does not allow intermediate certificates in the chain, you can replace
certificates explicitly. You can use the vSphere Client, vSphere Certificate Manager utility, or
perform manual certificate replacement using the certificate management CLIs.
When upgrading an environment that uses custom certificates, you can retain some of the
certificates.
n ESXi hosts keep their custom certificates during upgrade. Make sure that the vCenter Server
upgrade process adds all the relevant root certificates to the TRUSTED_ROOTS store in
VECS on the vCenter Server.
After the upgrade to vSphere 6.0 or later, you can set the certificate mode to Custom. If the
certificate mode is VMCA, the default, and the user performs a certificate refresh from the
vSphere Client, the VMCA-signed certificates replace the custom certificates.
VMware, Inc. 24
vSphere Authentication
You can use the command-line utility, vSphere Certificate Manager, for most certificate
management tasks.
Interface Use
Certificate Manager utility Perform common certificate replacement tasks from the
command line of the vCenter Server installation.
Certificate management CLIs Perform all certificate management tasks with dir-cli,
certool, and vecs-cli.
PowerCLI 12.4 (requires vSphere 7.0 or later) Perform trusted certificate store management, manage
vCenter Server Machine SSL certificates, and manage
ESXi Machine SSL certificates.
For ESXi, you perform certificate management from the vSphere Client. VMCA provisions
certificates and stores them locally on the ESXi host. VMCA does not store ESXi host certificates
in VMDIR or in VECS. See the vSphere Security documentation.
n Certificates that are generated and signed by VMware Certificate Authority (VMCA).
n Custom certificates.
n Enterprise certificates that are generated from your own internal PKI.
n Third-party CA-signed certificates that are generated by an external PKI such as Verisign,
GoDaddy, and so on.
Self-signed certificates that were created using OpenSSL in which no Root CA exists are not
supported.
VMware, Inc. 25
vSphere Authentication
VMCA is included in each vCenter Server deployment. VMCA provisions each node, each vCenter
Server solution user, and each ESXi host with a certificate that is signed by VMCA as the
certificate authority.
You can replace the default certificates. For vCenter Server components, you can use a set of
command-line tools included in your installation. You have several options.
VMCA
Signed
CA-Cert
Machine-Cert
VECS
For manual certificate replacement, see Replace Existing VMCA-Signed Certificates with New
VMCA-Signed Certificates.
Note If you perform a fresh install with a vCenter Server, replace the VMCA root certificate
before you add ESXi hosts. If you do, VMCA signs the whole chain, and you do not have to
generate new certificates.
VMware, Inc. 26
vSphere Authentication
Machine-Cert
VECS
n Replace VMCA Root Certificate with Custom Signing Certificate and Replace All Certificates
n Replace Machine SSL Certificate with VMCA Certificate (multi-node enhanced linked mode
deployment)
n Replace Solution User Certificate with VMCA Certificate (multi-node enhanced linked mode
deployment)
For manual certificate replacement, see Use VMCA as an Intermediate Certificate Authority.
VMware, Inc. 27
vSphere Authentication
VMware vSphere
VMCA
Signed
External CA Unused
(Commercial or
Enterprise)
Machine-Cert
VECS
For manual certificate replacement, see Use Custom Certificates with vSphere.
You can also use the vSphere Client to generate a CSR for a machine SSL certificate (custom),
and replace the certificate after the CA returns it. See Generate Certificate Signing Request for
Machine SSL Certificate Using the vSphere Client (Custom Certificates).
Hybrid Deployment
You can have VMCA supply some of the certificates, but use custom certificates for other
parts of your infrastructure. For example, because solution user certificates are used only to
authenticate to vCenter Single Sign-On, consider having VMCA provision those certificates.
Replace the machine SSL certificates with custom certificates to secure all SSL traffic.
Company policy often does not allow intermediate CAs. For those cases, hybrid deployment is
a good solution. It minimizes the number of certificates to replace, and secures all traffic. The
hybrid deployment leaves only internal traffic, that is, solution user traffic, to use the default
VMCA-signed certificates.
VMware, Inc. 28
vSphere Authentication
Option Description
VMware Certificate Authority mode (default) When you renew certificates from the vSphere Client,
VMCA issues the certificates for the hosts. If you changed
the VMCA root certificate to include a certificate chain,
the host certificates include the full chain.
Custom Certificate Authority mode Allows you to update and use certificates manually that
are not signed or issued by VMCA.
Thumbprint mode Can be used to retain 5.5 certificates during refresh. Use
this mode only temporarily in debugging situations.
vCenter Single Sign-On SSL Provisioned during installation. Manage this certificate from the command line.
signing certificate
Note Do not change this certificate in the
filesystem or unpredictable behavior results.
VMware Directory Service Provisioned during installation. Starting with vSphere 6.5, the machine SSL
(VMDIR) SSL certificate certificate is used as the vmdir certificate.
SMS self-signed certificates Provisioned during registration In vSphere 7.0 and later, SMS self-signed
of the IOFilter Provider. certificates are stored in /etc/vmware/ssl/
iofiltervp_castore.pem. Before vSphere 7.0,
SMS self-signed certificates are stored in /etc/
vmware/ssl/castore.pem. In addition, the SMS
Store can also store VVOL VASA Provider's
(version 4.0 and earlier) self-signed certificates
when retainVasaProviderCertificate=True.
ESXi
ESXi certificates are stored locally on each host in the /etc/vmware/ssl directory. ESXi
certificates are provisioned by VMCA by default, but you can use custom certificates instead.
ESXi certificates are provisioned when the host is first added to vCenter Server and when the
host reconnects.
VMware, Inc. 29
vSphere Authentication
Each vCenter Server node has its own machine SSL certificate. All services that are running on a
vCenter Server node use the machine SSL certificate to expose their SSL endpoints.
n The reverse proxy service. SSL connections to individual vCenter services always go to the
reverse proxy. Traffic does not go to the services themselves.
VMware products use standard X.509 version 3 (X.509v3) certificates to encrypt session
information. Session information is sent over SSL between components.
A solution user presents the certificate to vCenter Single Sign-On when it first has to
authenticate, after a reboot, and after a timeout has elapsed. The timeout (Holder-of-Key
Timeout) can be set from the vSphere Client and defaults to 2592000 seconds (30 days).
For example, the vpxd solution user presents its certificate to vCenter Single Sign-On when it
connects to vCenter Single Sign-On. The vpxd solution user receives a SAML token from vCenter
Single Sign-On and can then use that token to authenticate to other solution users and services.
Note The machine solution user certificate has nothing to do with the machine SSL
certificate. The machine solution user certificate is used for the SAML token exchange. The
machine SSL certificate is used for secure SSL connections for a machine.
n vpxd: vCenter service daemon (vpxd) store. vpxd uses the solution user certificate that is
stored in this store to authenticate to vCenter Single Sign-On.
n vpxd-extension: vCenter extensions store. Includes the Auto Deploy service, inventory
service, and other services that are not part of other solution users.
n vsphere-webclient: vSphere Client store. Also includes some additional services such as the
performance chart service.
®
n wcp: VMware vSphere with VMware Tanzu™ store.
VMware, Inc. 30
vSphere Authentication
Internal Certificates
vCenter Single Sign-On certificates are not stored in VECS and are not managed with certificate
management tools. As a rule, changes are not necessary, but in special situations, you can
replace these certificates.
The vCenter Single Sign-On service includes an identity provider service which issues SAML
tokens that are used for authentication throughout vSphere. A SAML token represents the
user's identity, and also contains group membership information. When vCenter Single Sign-
On issues SAML tokens, it signs each token with its signing certificate so that clients of
vCenter Single Sign-On can verify that the SAML token comes from a trusted source.
You can replace this certificate from the CLI. See Replace a vCenter Server STS Certificate
Using the Command Line.
Starting with vSphere 6.5, the machine SSL certificate is used as the VMware directory
certificate. For earlier versions of vSphere, see the corresponding documentation.
The vSphere Virtual Machine Encryption solution connects with an external Key Management
Server (KMS). Depending on how the solution authenticates to the KMS, it might generate
certificates and store them in VECS. See the vSphere Security documentation.
Service Description
VMware Directory Service (vmdir) Identity source that handles SAML certificate management for
authentication with vCenter Single Sign-On.
VMware Certificate Authority (VMCA) Issues certificates for VMware solution users, machine certificates for
machines on which services are running, and ESXi host certificates.
VMCA can be used as is, or as an intermediary certificate authority.
VMCA issues certificates only to clients that can authenticate to
vCenter Single Sign-On in the same domain.
VMware Authentication Framework Daemon Includes the VMware Endpoint Certificate Store (VECS) and several
(VMAFD) other authentication services. VMware administrators interact with
VECS. The other services are used internally.
VMware, Inc. 31
vSphere Authentication
VECS runs as part of the VMware Authentication Framework Daemon (VMAFD). VECS runs on
every vCenter Server node, and holds the keystores that contain the certificates and keys.
VECS polls VMware Directory Service (vmdir) periodically for updates to the trusted root store.
You can also explicitly manage certificates and keys in VECS using vecs-cli commands. See
vecs-cli Command Reference.
VMware, Inc. 32
vSphere Authentication
Store Description
Machine SSL store (MACHINE_SSL_CERT) n Used by the reverse proxy service on every vSphere
node.
n Used by the VMware Directory Service (vmdir) on
each vCenter Server node.
All services in vSphere 6.0 and later communicate through
a reverse proxy, which uses the machine SSL certificate.
For backward compatibility, the 5.x services still use
specific ports. As a result, some services such as vpxd still
have their own port open.
Solution user stores VECS includes one store for each solution user. The
n machine subject of each solution user certificate must be unique,
for example, the machine certificate cannot have the
n vpxd
same subject as the vpxd certificate.
n vpxd-extension
Solution user certificates are used for authentication with
n vsphere-webclient
vCenter Single Sign-On. vCenter Single Sign-On checks
n wcp that the certificate is valid, but does not check other
certificate attributes.
The following solution user certificate stores are included
in VECS:
n machine: Used by the license server and the logging
service.
VMware, Inc. 33
vSphere Authentication
Store Description
vSphere Certificate Manager Utility backup store Used by VMCA (VMware Certificate Manager) to support
(BACKUP_STORE) certificate revert. Only the most recent state is stored as a
backup, you cannot go back more than one step.
The vCenter Single Sign-On service stores the token signing certificate and its SSL certificate on
disk. You can change the token signing certificate from the CLI.
Some certificates are stored on the file system, either temporarily during startup or permanently.
Do not change the certificates on the file system.
Note Do not change any certificate files on disk unless instructed by VMware documentation or
Knowledge Base Articles. Unpredictable behavior might result otherwise.
vSphere supports replacing certificates but does not enforce certificate revocation for ESXi hosts
or for vCenter Server systems.
Remove revoked certificates from all nodes. If you do not remove revoked certificates, a
man-in-the-middle attack might enable compromise through impersonation with the account's
credentials.
VMware, Inc. 34
vSphere Authentication
You run vSphere Certificate Manager on each machine. Depending on the task you perform,
you are also prompted for certificate information.
For manual certificate replacement, you run the certificate replacement commands on each
machine. See the following topics for details:
Note When you list solution user certificates in large deployments, the output of dir-cli list
includes all solution users from all nodes. Run vmafd-cli get-machine-id --server-name
localhost to find the local machine ID for each host. Each solution user name includes the
machine ID.
You run vSphere Certificate Manager on each machine. Depending on the task you perform,
you are also prompted for certificate information.
2 Replace the certificates on each node. The precise process depends on the type of
certificate replacement that you are performing. See Managing Certificates with the
vSphere Certificate Manager Utility.
VMware, Inc. 35
vSphere Authentication
You can run the ls_update_certs script to resolve the issue. See the VMware knowledge base
article at http://kb.vmware.com/kb/2109074 for details.
n View the machine SSL, Trusted Root, and Security Token Service (STS) certificates.
n Add new Trusted Root certificates, and renew or replace existing machine SSL and STS
certificates.
n Generate a custom Certificate Signing Request (CSR) for a machine SSL certificate and
replace the certificate when the Certificate Authority returns it.
Most parts of the certificate replacement workflows are supported fully from the vSphere Client.
For generating CSRs for machine SSL certificates, you can use either the vSphere Client or the
Certificate Manage utility.
Supported Workflows
After you install a vCenter Server, the VMware Certificate Authority on that node provisions
all other nodes in the environment with certificates by default. See Chapter 2 vSphere Security
Certificates for the current recommendations for managing certificates.
You can use one of the following workflows to renew or replace certificates.
Renew Certificates
You can have the VMCA renew machine SSL, solution user, and STS certificates in your
environment from the vSphere Client.
VMware, Inc. 36
vSphere Authentication
You can generate a CSR using the vSphere Certificate Manager utility. You can then edit
the certificate you receive from the CSR to add the VMCA to the chain, and then add the
certificate chain and private key to your environment. When you then renew all certificates,
the VMCA provisions all machines and solution users with certificates that the full chain has
signed.
If you do not want to use the VMCA, you can generate CSRs for the certificates that you want
to replace. The CA returns a root certificate and a signed certificate for each CSR. You can
upload the root certificate and the custom certificates from the vCenter Server.
Note If you use the VMCA as an intermediate CA, or use custom certificates, you might
encounter significant complexity and the potential for a negative impact to your security, and an
unnecessary increase in your operational risk. For more information about managing certificates
within a vSphere environment, see the blog post titled New Product Walkthrough - Hybrid
vSphere SSL Certificate Replacement at http://vmware.com/go/hybridvmca.
See VMware Endpoint Certificate Store Overview for details on the different stores inside VECS.
Prerequisites
For most management tasks, you must have the password for the administrator for the local
domain account, administrator@vsphere.local or a different domain if you changed the domain
during installation.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
4 If the system prompts you, enter the credentials of your vCenter Server.
5 Explore the certificates stored inside the VMware Endpoint Certificate Store (VECS).
VMware Endpoint Certificate Store Overview explains what is in the individual stores.
VMware, Inc. 37
vSphere Authentication
6 To view details for a certificate, select the certificate and click View Details.
For example, if you replace the existing certificate, you can later remove the old root
certificate. Remove certificates only if you are sure that they are no longer in use.
Procedure
5 Change the setting of vpxd.cert.threshold to the desired value and click Save.
Prerequisites
For certificate management, you have to supply the password of the administrator of the local
domain (administrator@vsphere.local by default). If you are renewing certificates for a vCenter
Server system, you also have to supply the vCenter Single Sign-On credentials for a user with
administrator privileges on the vCenter Server system.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
4 If the system prompts you, enter the credentials of your vCenter Server.
VMware, Inc. 38
vSphere Authentication
5 Renew the VMCA-signed machine SSL certificate for the local system.
c Click Renew.
vCenter Server services restart automatically. You must log back in because restarting the
services ends the UI session.
You can generate Certificate Signing Requests (CSRs) for each machine and for each solution
user using the Certificate Manager utility. You can also generate CSRs for each machine, and
replace certificates when you receive them from the third-party CA, using the vSphere Client.
When you submit the CSRs to your internal or third-party CA, the CA returns signed certificates
and the root certificate. You can upload both the root certificate and the signed certificates from
the vCenter Server UI.
Generate Certificate Signing Request for Machine SSL Certificate Using the
vSphere Client (Custom Certificates)
The machine SSL certificate is used by the reverse proxy service on every vCenter Server node.
Each machine must have a machine SSL certificate for secure communication with other services.
You can use the vSphere Client to generate a Certificate Signing Request (CSR) for the machine
SSL certificate and to replace the certificate once it is ready.
Prerequisites
n Key size: 2048 bits (minimum) to 16384 bits (maximum) (PEM encoded)
n CRT format
n x509 version 3
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
VMware, Inc. 39
vSphere Authentication
a For the certificate that you want to replace, under Machine SSL Certificate, click Actions
> Generate Certificate Signing Request (CSR).
Note When you use vCenter Server to generate a CSR with a key size of 16384 bits, the
generation takes a few minutes to complete because of the CPU-intensive nature of the
operation.
d Click Finish.
What to do next
When the Certificate Authority returns the certificate, replace the existing certificate in the
certificate store. See Add Custom Certificates.
You can run the Certificate Manager tool from the command line as follows:
/usr/lib/vmware-vmca/bin/certificate-manager
Prerequisites
vSphere Certificate Manager prompts you for information. The prompts depend on your
environment and on the type of certificate you want to replace.
n For any CSR generation, you are prompted for the password of the
administrator@vsphere.local user, or for the administrator of the vCenter Single Sign-On
domain that you are connecting to.
n You are prompted for the host name or IP address of the vCenter Server.
n To generate a CSR for a machine SSL certificate, you are prompted for certificate properties,
which are stored in the certool.cfg file. For most fields, you can accept the default or
provide site-specific values. The FQDN of the machine is required.
VMware, Inc. 40
vSphere Authentication
Procedure
1 On each machine in your environment, start vSphere Certificate Manager and select option 1.
2 Supply the password and the vCenter Server IP address or host name if prompted.
3 Select option 1 to generate the CSR, answer the prompts and exit Certificate Manager.
As part of the process, you have to provide a directory. Certificate Manager places the
certificate and key files in the directory.
4 If you also want to replace all solution user certificates, restart Certificate Manager.
5 Select option 5.
6 Supply the password and the vCenter Server IP address or host name if prompted.
7 Select option 1 to generate the CSRs, answer the prompts and exit Certificate Manager.
As part of the process, you have to provide a directory. Certificate Manager places the
certificate and key files in the directory.
What to do next
Prerequisites
Obtain the custom root certificate from your third-party or in-house CA.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
4 If the system prompts you, enter the credentials of your vCenter Server.
VMware, Inc. 41
vSphere Authentication
7 Click Add.
Usually, replacing the machine SSL certificate for each component is sufficient.
Prerequisites
Generate certificate signing requests (CSRs) for each certificate that you want to replace. You
can generate the CSRs with the Certificate Manager utility. You can also generate a CSR for
a machine SSL certificate using the vSphere Client. Place the certificate and private key in a
location that the vCenter Server can access.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
4 If the system prompts you, enter the credentials of your vCenter Server.
5 Under Machine SSL Certificate, for the certificate that you want to replace, click Actions >
Import and Replace Certificate.
Option Description
Replace with VMCA Creates a VMCA-generated CSR to replace the current certificate.
Replace with certificate generated Use a certificate signed using a vCenter Server generated CSR to replace
from vCenter Server the current certificate.
Replace with external CA certificate Use a certificate signed by an external CA to replace the current certificate.
(requires private key)
8 Click Replace.
VMware, Inc. 42
vSphere Authentication
If you use vSphere Certificate Manager, you are not responsible for placing the certificates in
VECS (VMware Endpoint Certificate Store) and you are not responsible for starting and stopping
services.
Before you run vSphere Certificate Manager, be sure that you understand the replacement
process and procure the certificates that you want to use.
Caution vSphere Certificate Manager supports one level of revert. If you run vSphere Certificate
Manager twice and notice that you unintentionally corrupted your environment, the tool cannot
revert the first of the two runs.
/usr/lib/vmware-vmca/bin/certificate-manager
Replace VMCA Root Certificate with Custom Signing Certificate and Replace All
Certificates.
This single-option workflow (Option 2) can be used by itself, or in the intermediate certificate
workflow. See Regenerate a New VMCA Root Certificate and Replace All Certificates.
1 To generate a CSR, select Option 2, Replace VMCA Root certificate with Custom Signing
Certificate and replace all Certificates. You might have to provide some information about the
certificate next. When prompted for an option again, select Option 1.
Submit the CSR to your external or enterprise CA. You receive a signed certificate and a root
certificate from the CA.
2 Combine the VMCA root certificate with the CA root certificate and save the file.
VMware, Inc. 43
vSphere Authentication
3 Select Option 2, Replace VMCA Root certificate with Custom Signing Certificate and replace
all Certificates. This process replaces all certificates on the local machine.
4 When multiple vCenter Server instances are connected in Enhanced Linked Mode
configuration, you must replace certificates on each node.
a First you replace the machine SSL certificate with the (new) VMCA certificate (Option 3)
b Then you replace the solution user certificates with the (new) VMCA certificate (Option 6).
1 You generate certificate signing requests for the machine SSL certificate and the solution
user certificates separately on each machine.
a To generate CSRs for the machine SSL certificate, you select Option 1.
b If company policy requires that you replace all certificates, you also select Option 5.
2 After you received the signed certificates and the root certificate from your CA, you replace
the machine SSL certificate on each machine by using Option 1.
3 If you also want to replace the solution user certificates, you select Option 5.
4 Finally, when multiple vCenter Server instances are connected in Enhanced Linked Mode
configuration, you must repeat the process on each node.
Note The following prompt appears when you run the Certificate Manager utility:
Respond to the prompt by entering the fully qualified domain name of the machine on which the
certificate configuration is running.
VMware, Inc. 44
vSphere Authentication
When you replace the existing machine SSL certificate with a new VMCA-signed certificate,
vSphere Certificate Manager prompts you for information and enters all values, except for the
password and the IP address of the vCenter Server, into the certool.cfg file.
n Company name
n Organization name
n Organization unit
n State
n Locality
n IP address (optional)
n Email
n Host name, that is, the fully qualified domain name of the machine for which you want to
replace the certificate. If the host name does not match the FQDN, certificate replacement
does not complete correctly and your environment might end up in an unstable state.
n VMCA name, that is, the fully qualified domain name of the machine on which the certificate
configuration is running.
Prerequisites
You must know the following information when you run vSphere Certificate Manager with this
option.
n The FQDN of the machine for which you want to generate a new VMCA-signed certificate. All
other properties default to the predefined values but can be changed.
Procedure
1 Log in to the vCenter Server and start the vSphere Certificate Manager.
/usr/lib/vmware-vmca/bin/certificate-manager
2 Select option 4, Regenerate a new VMCA Root Certificate and replace all certificates.
Certificate Manager generates a new VMCA root certificate based on your input and replaces
all certificates on the system where you are running Certificate Manager. The replacement
process is complete after Certificate Manager has restarted the services.
VMware, Inc. 45
vSphere Authentication
4 To replace the machine SSL certificate, run vSphere Certificate Manager with option 3,
Replace Machine SSL certificate with VMCA Certificate.
5 To replace the solution user certificates, run Certificate Manager with option 6,
Replace Solution user certificates with VMCA certificates.
VMware does not recommend operating VMCA as a subordinate (or intermediate) certificate
authority. If you choose this option, you might encounter significant complexity and the potential
for a negative impact to your security, and an unnecessary increase in your operational risk.
For more information about managing certificates within a vSphere environment, see the blog
post titled New Product Walkthrough - Hybrid vSphere SSL Certificate Replacement at http://
vmware.com/go/hybridvmca.
To make VMCA an intermediate CA, you have to run Certificate Manager several times. The
workflow gives the complete set of steps for replacing machine SSL certificates.
1 To generate a CSR, select Option 1, Replace Machine SSL certificate with Custom Certificate
then Option 1.
You receive a signed certificate and a root certificate from the CA.
2 Combine the VMCA root certificate with the CA root certificate and save the file.
3 Select Option 2, Replace VMCA Root certificate with Custom Signing Certificate and replace
all Certificates. This process replaces all certificates on the local machine.
Generate CSR with vSphere Certificate Manager and Prepare Root Certificate
(Intermediate CA)
You can use vSphere Certificate Manager to generate Certificate Signing Requests (CSRs).
Submit those CSRs to your enterprise CA or to an external certificate authority for signing. You
can use the signed certificates with the different supported certificate replacement processes.
n If you prefer to create the CSR manually, the certificate that you send to be signed must meet
the following requirements.
n Key size: 2048 bits (minimum) to 16384 bits (maximum) (PEM encoded)
n PEM format. VMware supports PKCS8 and PKCS1 (RSA keys). When keys are added to
VECS, they are converted to PKCS8.
n x509 version 3
VMware, Inc. 46
vSphere Authentication
n The CA extension must be set to true for root certificates, and cert sign must be in the list
of requirements. For example:
basicConstraints = critical,CA:true
keyUsage = critical,digitalSignature,keyCertSign
n No explicit limit to the length of the certificate chain. VMCA uses the OpenSSL default,
which is 10 certificates.
n Certificates with wildcards or with more than one DNS name are not supported.
Prerequisites
vSphere Certificate Manager prompts you for information. The prompts depend on your
environment and on the type of certificate that you want to replace.
For any CSR generation, you are prompted for the password of the administrator@vsphere.local
user, or for the administrator of the vCenter Single Sign-On domain that you are connecting to.
Procedure
/usr/lib/vmware-vmca/bin/certificate-manager
2 Select Option 2.
Initially, you use this option to generate the CSR, not to replace certificates.
3 Supply the password and the vCenter Server IP address or host name if prompted.
As part of the process, you have to provide a directory. Certificate Manager places the
certificate to be signed (*.csr file) and the corresponding key file (*.key file) in the
directory.
6 Send the CSR to your enterprise or external CA for signing and name the resulting signed
certificate root_signing_cert.cer.
-----BEGIN CERTIFICATE-----
Signed VMCA root certificate
VMware, Inc. 47
vSphere Authentication
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
CA intermediate certificates
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
Root certificate of enterprise or external CA
-----END CERTIFICATE-----
What to do next
Replace the existing root certificate with the chained root certificate. See Replace VMCA Root
Certificate with Custom Signing Certificate and Replace All Certificates.
Replace VMCA Root Certificate with Custom Signing Certificate and Replace All
Certificates
You can use vSphere Certificate Manager to generate a CSR and send the CSR to an enterprise
or third-party CA for signing. You can then replace the VMCA root certificate with a custom
signing certificate and replace all existing certificates with certificates that are signed by the
custom CA.
You run vSphere Certificate Manager on vCenter Server to replace the VMCA root certificate with
a custom signing certificate.
Prerequisites
n You can use vSphere Certificate Manager to create the CSR or create the CSR manually.
n After you receive the signed certificate from your third-party or enterprise CA, combine it
with the initial VMCA root certificate to create the full chain.
See Generate CSR with vSphere Certificate Manager and Prepare Root Certificate
(Intermediate CA) for certificate requirements and the process of combining the
certificates.
Procedure
1 Start vSphere Certificate Manager on the vCenter Server host and select option 2.
VMware, Inc. 48
vSphere Authentication
2 Select option 2 again to start certificate replacement and respond to the prompts.
b If you are replacing certificates for the first time, you are prompted for information to be
used for the machine SSL certificate.
This information includes the required FQDN of the machine and is stored in the
certool.cfg file.
When you replace the existing machine SSL certificate with a new VMCA-signed certificate,
vSphere Certificate Manager prompts you for information and enters all values, except for the
password and the IP address of the vCenter Server, into the certool.cfg file.
n Company name
n Organization name
n Organization unit
n State
n Locality
n IP address (optional)
n Email
n Host name, that is, the fully qualified domain name of the machine for which you want to
replace the certificate. If the host name does not match the FQDN, certificate replacement
does not complete correctly and your environment might end up in an unstable state.
n VMCA name, that is, the fully qualified domain name of the machine on which the certificate
configuration is running.
Prerequisites
n You must know the following information to run Certificate Manager with this option.
n The FQDN of the machine for which you want to generate a new VMCA-signed
certificate. All other properties default to the predefined values but can be changed.
VMware, Inc. 49
vSphere Authentication
Procedure
Results
Prerequisites
n Restart all vCenter Server nodes explicitly if you replaced the VMCA root certificate in a
deployment consisting of multiple instances of vCenter Server in Enhanced Linked Mode
configuration.
n You must know the following information to run Certificate Manager with this option.
Procedure
Results
One option is to replace only the machine SSL certificate, and to use the solution user certificates
that are provisioned by VMCA. Solution user certificates are used only for communication
between vSphere components.
VMware, Inc. 50
vSphere Authentication
When you use custom certificates, you replace the VMCA-signed certificates with custom
certificates. You can use the vSphere Client, the vSphere Certificate Manager utility, or CLIs for
manual certificate replacement. Certificates are stored in VECS.
To replace all certificates with custom certificates, you have to run Certificate Manager several
times. The workflow gives the complete set of steps for replacing both machine SSL certificates
and solution user certificates.
1 You generate certificate signing requests for the machine SSL certificate and the solution
user certificates separately on each machine.
a To generate CSRs for the machine SSL certificate, you select Option 1.
b If company policy does not allow a hybrid deployment, you select Option 5.
2 After you received the signed certificates and the root certificate from your CA, you replace
the machine SSL certificate on each machine by using Option 1.
3 If you also want to replace the solution user certificates, you select Option 5.
4 Finally, when multiple vCenter Server instances are connected in Enhanced Linked Mode
configuration, you have to repeat the process on each node.
You can run the Certificate Manager tool from the command line as follows:
/usr/lib/vmware-vmca/bin/certificate-manager
Prerequisites
vSphere Certificate Manager prompts you for information. The prompts depend on your
environment and on the type of certificate you want to replace.
n For any CSR generation, you are prompted for the password of the
administrator@vsphere.local user, or for the administrator of the vCenter Single Sign-On
domain that you are connecting to.
n You are prompted for the host name or IP address of the vCenter Server.
n To generate a CSR for a machine SSL certificate, you are prompted for certificate properties,
which are stored in the certool.cfg file. For most fields, you can accept the default or
provide site-specific values. The FQDN of the machine is required.
Procedure
1 On each machine in your environment, start vSphere Certificate Manager and select option 1.
2 Supply the password and the vCenter Server IP address or host name if prompted.
VMware, Inc. 51
vSphere Authentication
3 Select option 1 to generate the CSR, answer the prompts and exit Certificate Manager.
As part of the process, you have to provide a directory. Certificate Manager places the
certificate and key files in the directory.
4 If you also want to replace all solution user certificates, restart Certificate Manager.
5 Select option 5.
6 Supply the password and the vCenter Server IP address or host name if prompted.
7 Select option 1 to generate the CSRs, answer the prompts and exit Certificate Manager.
As part of the process, you have to provide a directory. Certificate Manager places the
certificate and key files in the directory.
What to do next
Prerequisites
Before you start, you need a CSR for each machine in your environment. You can generate the
CSR using vSphere Certificate Manager or explicitly.
1 To generate the CSR using vSphere Certificate Manager, see Generate Certificate Signing
Requests with vSphere Certificate Manager (Custom Certificates).
2 To generate the CSR explicitly, request a certificate for each machine from your third-party or
enterprise CA. The certificate must meet the following requirements:
n Key size: 2048 bits (minimum) to 16384 bits (maximum) (PEM encoded)
n CRT format
n x509 version 3
Procedure
VMware, Inc. 52
vSphere Authentication
n Valid signing certificate for the custom machine SSL certificate (.crt file)
When you are prompted for a solution user certificate, provide the complete signing certificate
chain of the third-party CA.
-----BEGIN CERTIFICATE-----
Signing certificate
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
CA intermediate certificates
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
Root certificate of enterprise or external CA
-----END CERTIFICATE-----
Prerequisites
Before you start, you need a CSR for each machine in your environment. You can generate the
CSR using vSphere Certificate Manager or explicitly.
1 To generate the CSR using vSphere Certificate Manager, see Generate Certificate Signing
Requests with vSphere Certificate Manager (Custom Certificates).
2 Request a certificate for each solution user on each node from your third-party or enterprise
CA. You can generate the CSR using vSphere Certificate Manager or prepare it yourself. The
CSR must meet the following requirements:
n Key size: 2048 bits (minimum) to 16384 bits (maximum) (PEM encoded)
n CRT format
n x509 version 3
VMware, Inc. 53
vSphere Authentication
n Each solution user certificate must have a different Subject. Consider, for example,
including the solution user name (such as vpxd) or other unique identifier.
Procedure
n The certificate and key (vpxd.crt and vpxd.key) for the machine solution user
n The full set of certificates and keys (vpxd.crt and vpxd.key) for all solution users
Note The revert operation restores what is currently in the BACKUP_STORE. If you run vSphere
Certificate Manager with two different options and you then attempt to revert, only the last
operation is reverted.
When you use this option, you overwrite all custom certificates that are currently in VECS.
vSphere Certificate Manager can replace all certificates. Which certificates are replaced depends
on which options you select.
VMware, Inc. 54
vSphere Authentication
You have to stop and start services as part of the certificate replacement process. You can use
the service-control command for starting and stopping services. You can start and stop all
services or individual services. See the command-line help for more information.
n Do not stop services to generate new public/private key pairs or new certificates.
n If you are the only administrator, you do not have to stop services when you add a
new root certificate. The old root certificate remains available, and all services can still
authenticate with that certificate. Stop and immediately restart all services after you add the
root certificate to avoid problems with your hosts.
n If your environment includes multiple administrators, stop services before you add a new root
certificate and restart services after you add a new certificate.
n Stop services right before you delete a machine SSL certificate in VECS.
Use the vSphere Certificate Manager utility to replace certificates for most cases.
If you need fine-grained control, this scenario gives detailed step-by-step instructions for
replacing the complete set of certificates using CLI commands. You can instead replace only
individual certificates using the procedure in the corresponding task.
Prerequisites
Only administrator@vsphere.local or other users in the CAAdmins group can perform certificate
management tasks. See Add Members to a vCenter Single Sign-On Group.
VMware, Inc. 55
vSphere Authentication
Procedure
1 On the vCenter Server, generate a new self-signed certificate and private key.
The command generates the certificate, adds it to vmdir, and adds it to VECS.
3 Stop all services and start the services that handle certificate creation, propagation, and
storage.
The command updates all instances of vmdir immediately. If you do not run the command,
propagation of the new certificate to all nodes might take a while.
1 (Optional) On the vCenter Server, list the VMCA root certificate to make sure it is in the
certificate store.
/usr/lib/vmware-vmca/bin/certool --getrootca
output:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
cf:2d:ff:49:88:50:e5:af
...
VMware, Inc. 56
vSphere Authentication
2 (Optional) List the VECS TRUSTED_ROOTS store and compare the certificate serial number
there with the output from Step 1.
In the simplest case with only one root certificate, the output looks like this:
3 Generate a new VMCA root certificate. The command adds the certificate to the
TRUSTED_ROOTS store in VECS and in vmdir (VMware Directory Service).
Each machine must have a machine SSL certificate for secure communication with other services.
When multiple vCenter Server instances are connected in Enhanced Linked Mode configuration,
you must run the Machine SSL certificate generation commands on each node.
Prerequisites
Be prepared to stop all services and to start the services that handle certificate propagation and
storage.
Procedure
1 Make one copy of certool.cfg for each machine that needs a new certificate.
2 Edit the custom configuration file for each machine to include that machine's FQDN.
Run NSLookup against the machine’s IP address to see the DNS listing of the name, and use
that name for the Hostname field in the file.
VMware, Inc. 57
vSphere Authentication
3 Generate a public/private key file pair and a certificate for each file, passing in the
configuration file that you just customized.
For example:
4 Stop all services and start the services that handle certificate creation, propagation, and
storage.
All machines need the new certificate in the local certificate store to communicate over SSL.
You first delete the existing entry, then add the new entry.
Country = US
Name = vmca-<FQDN-example>
Organization = <my_company>
OrgUnit = <my_company Engineering>
State = <my_state>
Locality = <mytown>
Hostname = <FQDN>
2 Generate a key pair for the machine SSL certificate. In a deployment of multiple vCenter
Server instances connected in Enhanced Linked Mode configuration, run this command on
each vCenter Server node.
The ssl-key.priv and ssl-key.pub files are created in the current directory.
VMware, Inc. 58
vSphere Authentication
3 Generate the new machine SSL certificate. This certificate is signed by VMCA. If you replaced
the VMCA root certificate with custom certificate, VMCA signs all certificates with the full
chain.
5 Replace the Machine SSL certificate in VECS with the new Machine SSL certificate. The --
store and --alias values have to exactly match with the default names.
n On each vCenter Server, run the following commands to update the Machine SSL
certificate in the MACHINE_SSL_CERT store. You must update the certificate for each
machine separately because each has a different FQDN.
What to do next
You can also replace the certificates for your ESXi hosts. See the vSphere Security publication.
VMware, Inc. 59
vSphere Authentication
Many VMware customers do not replace solution user certificates. They replace only the machine
SSL certificates with custom certificates. This hybrid approach satisfies the requirements of their
security teams.
You replace the machine solution user certificate and the solution user certificate on each
vCenter Server system.
Note When you list solution user certificates in large deployments, the output of dir-cli list
includes all solution users from all nodes. Run vmafd-cli get-machine-id --server-name
localhost to find the local machine ID for each host. Each solution user name includes the
machine ID.
Prerequisites
Be prepared to stop all services and to start the services that handle certificate propagation and
storage.
Procedure
1 Make one copy of certool.cfg, remove the Name, IP address, DNS name, and email fields,
and rename the file, for example, to sol_usr.cfg.
You can name the certificates from the command line as part of generation. The other
information is not needed for solution users. If you leave the default information, the
certificates that are generated are potentially confusing.
2 Generate a public/private key file pair and a certificate for each solution user, passing in the
configuration file that you just customized.
For example:
You can use the unique ID that is returned when you replace the certificates. The input and
output might look as follows.
VMware, Inc. 60
vSphere Authentication
3. vpxd-623bef28-0311-436e-b21f-6e0d39aa5179
4. vpxd-extension-623bef28-0311-436e-b21f-6e0d39aa5179
5. hvc-623bef28-0311-436e-b21f-6e0d39aa5179
6. wcp-1cbe0a40-e4ce-4378-b5e7-9460e2b8200e
4 Stop all services and start the services that handle certificate creation, propagation, and
storage.
5 For each solution user, replace the existing certificate in vmdir and then in VECS.
The following example shows how to replace the certificates for the vpxd service.
Note Solution users cannot authenticate to vCenter Single Sign-On if you do not replace the
certificate in vmdir.
b Generate a key pair for the vpxd solution user on each node.
VMware, Inc. 61
vSphere Authentication
c Generate a key pair for the vpxd-extension solution user on each node.
d Generate a key pair for the vsphere-webclient solution user on each node.
e Generate a key pair for the wcp solution user on each node.
2 Generate solution user certificates that are signed by the new VMCA root certificate for the
machine solution user and for each additional solution user (vpxd, vpxd-extension, vsphere-
webclient, wcp) on each vCenter Server node.
Note The --Name parameter has to be unique. Including the name of the solution user
store name makes it easy to see which certificate maps to which solution user. The example
includes the name, for example vpxd or vpxd-extension in each case.
a Run the following command to generate a solution user certificate for the machine
solution user on that node.
e Generate a certificate for the vsphere-webclient solution user on each node by running
the following command.
VMware, Inc. 62
vSphere Authentication
f Generate a certificate for the wcp solution user on each node by running the following
commands.
3 Replace the solution user certificates in VECS with the new solution user certificates.
Note The --store and --alias parameters have to exactly match the default names for
services.
4 Update VMware Directory Service (vmdir) with the new solution user certificates. You are
prompted for a vCenter Single Sign-On administrator password.
a Run dir-cli service list to get the unique service ID suffix for each solution user.
You run this command on a vCenter Server system.
VMware, Inc. 63
vSphere Authentication
2. vsphere-webclient-623bef28-0311-436e-b21f-6e0d39aa5179
3. vpxd-623bef28-0311-436e-b21f-6e0d39aa5179
4. vpxd-extension-623bef28-0311-436e-b21f-6e0d39aa5179
5. hvc-623bef28-0311-436e-b21f-6e0d39aa5179
6. wcp-1cbe0a40-e4ce-4378-b5e7-9460e2b8200e
Note When you list solution user certificates in large deployments, the output of dir-
cli list includes all solution users from all nodes. Run vmafd-cli get-machine-id
--server-name localhost to find the local machine ID for each host. Each solution user
name includes the machine ID.
b Replace the machine certificate in vmdir on each vCenter Server node. For example,
if machine-6fd7f140-60a9-11e4-9e28-005056895a69 is the machine solution user on the
vCenter Server, run this command:
c Replace the vpxd solution user certificate in vmdir on each node. For example, if
vpxd-6fd7f140-60a9-11e4-9e28-005056895a69 is the vpxd solution user ID, run this
command:
e Replace the vsphere-webclient solution user certificate on each node. For example,
if vsphere-webclient-6fd7f140-60a9-11e4-9e28-005056895a69 is the vsphere-webclient
solution user ID, run this command:
f Replace the wcp solution user certificate on each node. For example, if wcp-1cbe0a40-
e4ce-4378-b5e7-9460e2b8200e is the wcp solution user ID, run this command:
What to do next
VMware, Inc. 64
vSphere Authentication
If you use VMCA as an intermediate CA, or use custom certificates, you might encounter
significant complexity and the potential for a negative impact to your security, and an
unnecessary increase in your operational risk. For more information about managing certificates
within a vSphere environment, see the blog post titled New Product Walkthrough - Hybrid
vSphere SSL Certificate Replacement at http://vmware.com/go/hybridvmca.
You can use the Certificate Manager utility or other tool to generate the CSR. The CSR must meet
the following requirements:
n Key size: 2048 bits (minimum) to 16384 bits (maximum) (PEM encoded)
n PEM format. VMware supports PKCS8 and PKCS1 (RSA keys). When keys are added to VECS,
they are converted to PKCS8.
n x509 version 3
n The CA extension must be set to true for root certificates, and cert sign must be in the list of
requirements. For example:
basicConstraints = critical,CA:true
keyUsage = critical,digitalSignature,keyCertSign
n No explicit limit to the length of the certificate chain. VMCA uses the OpenSSL default, which
is 10 certificates.
n Certificates with wildcards or with more than one DNS name are not supported.
VMCA validates the following certificate attributes when you replace the root certificate:
VMware, Inc. 65
vSphere Authentication
Procedure
2 Prepare a certificate file that includes the signed VMCA certificate and the full CA chain of
your third-party CA or enterprise CA. Save the file, for example as rootca1.crt.
You can accomplish this step by copying all CA certificates in PEM format into a single file.
You start with the VMCA root certificate and end up with the root CA PEM certificate. For
example:
-----BEGIN CERTIFICATE-----
<Certificate of VMCA>
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
<Certificate of intermediary CA>
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
<Certificate of Root CA>
-----END CERTIFICATE-----
3 Stop all services and start the services that handle certificate creation, propagation, and
storage.
n Adds the new custom root certificate to the certificate location in the file system.
n Appends the custom root certificate to the TRUSTED_ROOTS store in VECS (after a
delay).
5 (Optional) To propagate the change to all instances of vmdir (VMware Directory Service),
publish the new root certificate to vmdir, supplying the full file path for each file.
For example, if the certificate has only one certificate in the chain:
VMware, Inc. 66
vSphere Authentication
Replication between vmdir nodes happens every 30 seconds. You do not have to add the
root certificate to VECS explicitly because VECS polls vmdir for new root certificate files
every 5 minutes.
vecs-cli force-refresh
n Adds the new custom root certificate to the certificate location in the file system.
What to do next
You can remove the original VMCA root certificate from the certificate store if your company
policy requires it. If you do, you have to replace the vCenter Single Sign-On Signing certificate.
See Replace a vCenter Server STS Certificate Using the Command Line.
These steps are essentially the same as the steps for replacing with a certificate that uses VMCA
as the certificate authority. However, in this case, VMCA signs all certificates with the full chain.
Each machine must have a machine SSL certificate for secure communication with other services.
When multiple vCenter Server instances are connected in Enhanced Linked Mode configuration,
you must run the Machine SSL certificate generation commands on each node.
Prerequisites
For each machine SSL certificate, the SubjectAltName must contain DNS Name=<Machine
FQDN>.
VMware, Inc. 67
vSphere Authentication
Procedure
1 Make one copy of certool.cfg for each machine that needs a new certificate.
2 Edit the custom configuration file for each machine to include that machine's FQDN.
Run NSLookup against the machine’s IP address to see the DNS listing of the name, and use
that name for the Hostname field in the file.
3 Generate a public/private key file pair and a certificate for each machine, passing in the
configuration file that you just customized.
For example:
4 Stop all services and start the services that handle certificate creation, propagation, and
storage.
All machines need the new certificate in the local certificate store to communicate over SSL.
You first delete the existing entry, then add the new entry.
Country = US
Name = vmca-<FQDN-example>
Organization = VMware
OrgUnit = VMware Engineering
State = California
Locality = Palo Alto
Hostname = <FQDN>
VMware, Inc. 68
vSphere Authentication
2 Generate a key pair for the machine SSL certificate. In a deployment of multiple vCenter
Server instances connected in Enhanced Linked Mode configuration, run this command on
each vCenter Server node.
The ssl-key.priv and ssl-key.pub files are created in the current directory.
3 Generate the new machine SSL certificate. This certificate is signed by VMCA. If you replaced
the VMCA root certificate with custom certificate, VMCA signs all certificates with the full
chain.
5 Replace the Machine SSL certificate in VECS with the new Machine SSL certificate. The --
store and --alias values have to exactly match with the default names.
n On each vCenter Server, run the following commands to update the Machine SSL
certificate in the MACHINE_SSL_CERT store. You must update the certificate for each
machine separately because each has a different FQDN.
VMware, Inc. 69
vSphere Authentication
Many VMware customers do not replace solution user certificates. They replace only the machine
SSL certificates with custom certificates. This hybrid approach satisfies the requirements of their
security teams.
You replace the machine solution user certificate and the solution user certificate on each
vCenter Server system.
Note When you list solution user certificates in large deployments, the output of dir-cli list
includes all solution users from all nodes. Run vmafd-cli get-machine-id --server-name
localhost to find the local machine ID for each host. Each solution user name includes the
machine ID.
Prerequisites
Each solution user certificate must have a different Subject. Consider, for example, including the
solution user name (such as vpxd) or other unique identifier.
Procedure
1 Make one copy of certool.cfg, remove the Name, IP address, DNS name, and email fields,
and rename the file, for example, to sol_usr.cfg.
You can name the certificates from the command line as part of generation. The other
information is not needed for solution users. If you leave the default information, the
certificates that are generated are potentially confusing.
2 Generate a public/private key file pair and a certificate for each solution user, passing in the
configuration file that you just customized.
For example:
You can use the unique ID that is returned when you replace the certificates. The input and
output might look as follows.
VMware, Inc. 70
vSphere Authentication
3. vpxd-623bef28-0311-436e-b21f-6e0d39aa5179
4. vpxd-extension-623bef28-0311-436e-b21f-6e0d39aa5179
5. hvc-623bef28-0311-436e-b21f-6e0d39aa5179
6. wcp-1cbe0a40-e4ce-4378-b5e7-9460e2b8200e
4 Stop all services and start the services that handle certificate creation, propagation, and
storage.
For solution users, you must add the certificates in that order. For example:
Note Solution users cannot log in to vCenter Single Sign-On if you do not replace the
certificate in vmdir.
b Generate a key pair for the vpxd solution user on each node.
VMware, Inc. 71
vSphere Authentication
c Generate a key pair for the vpxd-extension solution user on each node.
d Generate a key pair for the vsphere-webclient solution user on each node.
e Generate a key pair for the wcp solution user on each node.
2 Generate solution user certificates that are signed by the new VMCA root certificate for the
machine solution user and for each additional solution user (vpxd, vpxd-extension, vsphere-
webclient, wcp) on each vCenter Server node.
Note The --Name parameter has to be unique. Including the name of the solution user
store name makes it easy to see which certificate maps to which solution user. The example
includes the name, for example vpxd or vpxd-extension in each case.
a Run the following command to generate a solution user certificate for the machine
solution user on that node.
e Generate a certificate for the vsphere-webclient solution user on each node by running
the following command.
VMware, Inc. 72
vSphere Authentication
f Generate a certificate for the wcp solution user on each node by running the following
commands.
3 Replace the solution user certificates in VECS with the new solution user certificates.
Note The --store and --alias parameters have to exactly match the default names for
services.
4 Update VMware Directory Service (vmdir) with the new solution user certificates. You are
prompted for a vCenter Single Sign-On administrator password.
a Run dir-cli service list to get the unique service ID suffix for each solution user.
You run this command on a vCenter Server system.
VMware, Inc. 73
vSphere Authentication
2. vsphere-webclient-623bef28-0311-436e-b21f-6e0d39aa5179
3. vpxd-623bef28-0311-436e-b21f-6e0d39aa5179
4. vpxd-extension-623bef28-0311-436e-b21f-6e0d39aa5179
5. hvc-623bef28-0311-436e-b21f-6e0d39aa5179
6. wcp-1cbe0a40-e4ce-4378-b5e7-9460e2b8200e
Note When you list solution user certificates in large deployments, the output of dir-
cli list includes all solution users from all nodes. Run vmafd-cli get-machine-id
--server-name localhost to find the local machine ID for each host. Each solution user
name includes the machine ID.
b Replace the machine certificate in vmdir on each vCenter Server node. For example,
if machine-6fd7f140-60a9-11e4-9e28-005056895a69 is the machine solution user on the
vCenter Server, run this command:
c Replace the vpxd solution user certificate in vmdir on each node. For example, if
vpxd-6fd7f140-60a9-11e4-9e28-005056895a69 is the vpxd solution user ID, run this
command:
e Replace the vsphere-webclient solution user certificate on each node. For example,
if vsphere-webclient-6fd7f140-60a9-11e4-9e28-005056895a69 is the vsphere-webclient
solution user ID, run this command:
f Replace the wcp solution user certificate on each node. For example, if wcp-1cbe0a40-
e4ce-4378-b5e7-9460e2b8200e is the wcp solution user ID, run this command:
VMware, Inc. 74
vSphere Authentication
You can replace all certificates or use a hybrid solution. For example, consider replacing all
certificates that are used for network traffic but leaving VMCA-signed solution user certificates.
Solution user certificates are used only for authentication to vCenter Single Sign-On. vCenter
Server uses solution user certificates for internal communication only. Solution user certificates
are not used for external communication.
Note If you do not want to use VMCA, you are responsible for replacing all certificates yourself,
for provisioning new components with certificates, and for tracking certificate expiration.
Even if you decide to use custom certificates, you can still use the VMware Certificate Manager
utility for certificate replacement. See Replace All Certificates with Custom Certificate (Certificate
Manager).
If you encounter problems with vSphere Auto Deploy after replacing certificates, see the
VMware knowledge base article at http://kb.vmware.com/kb/2000988.
Prerequisites
n Key size: 2048 bits (minimum) to 16384 bits (maximum) (PEM encoded)
n PEM format. VMware supports PKCS8 and PKCS1 (RSA keys). When keys are added to VECS,
they are converted to PKCS8.
n x509 version 3
n For root certificates, the CA extension must be set to true, and the cert sign must be in the
list of requirements.
n CRT format
n CN (and SubjectAltName) set to the host name (or IP address) that the ESXi host has in the
vCenter Server inventory.
VMware, Inc. 75
vSphere Authentication
Procedure
1 Send the Certificate Signing Requests (CSRs) for the following certificates to your enterprise
or third-party certificate provider.
n A machine SSL certificate for each machine. For the machine SSL certificate,
the SubjectAltName field must contain the fully qualified domain name (DNS
NAME=machine_FQDN).
n Optionally, five solution user certificates for each node. Solution user certificates do not
need to include IP address, host name, or email address. Each certificate must have a
different certificate Subject.
Typically, the result is a PEM file for the trusted chain, plus the signed SSL certificates for
each vCenter Server node.
a Ensure that the current root certificate and all machine SSL certificates are signed by
VMCA.
c (Optional) With a Web browser, open an HTTPS connection to a node where the
certificate is to be replaced, view the certificate information, and ensure that it matches
the machine SSL certificate.
3 Stop all services and start the services that handle certificate creation, propagation, and
storage.
If you do not specify a user name and password on the command line, you are prompted.
What to do next
You can remove the original VMCA root certificate from the certificate store if your company
policy requires it. If you do, you have to refresh the vCenter Single Sign-On certificate. See
Replace a vCenter Server STS Certificate Using the Command Line.
VMware, Inc. 76
vSphere Authentication
You must have the following information before you can start replacing the certificates:
Prerequisites
You must have received a certificate for each machine from your third-party or enterprise CA.
n Key size: 2048 bits (minimum) to 16384 bits (maximum) (PEM encoded)
n CRT format
n x509 version 3
Procedure
1 Stop all services and start the services that handle certificate creation, propagation, and
storage.
2 Log in to each node and add the new machine certificates that you received from the CA to
VECS.
All machines need the new certificate in the local certificate store to communicate over SSL.
VMware, Inc. 77
vSphere Authentication
VMware, Inc. 78
Managing Services and
Certificates with CLI Commands 3
You can manage VMCA (VMware Certificate Authority), VECS (VMware Endpoint Certificate
Store), VMware Directory Service (vmdir), and Security Token Service (STS) certificates by using
a set of CLIs. The vSphere Certificate Manager utility supports many related tasks as well, but the
CLIs are required for manual certificate management and for managing other services.
You normally access the CLI tools for managing certificates and associated services by using
SSH to connect to the appliance shell. See the VMware knowledge base article at http://
kb.vmware.com/kb/2100508 for more information.
Manual Certificate Replacement gives examples for replacing certificates using CLI commands.
Table 3-1. CLI Tools for Managing Certificates and Associated Services
service-control Start or stop services, for example Run this command to stop services
as part of a certificate replacement before running other CLI commands.
workflow.
CLI Locations
By default, you find the CLIs in the following locations.
/usr/lib/vmware-vmafd/bin/vecs-cli
/usr/lib/vmware-vmafd/bin/dir-cli
VMware, Inc. 79
vSphere Authentication
/usr/lib/vmware-vmca/bin/certool
/opt/vmware/bin/sso-config.sh
Note The service-control command does not require that you specify the path.
dir-cli
You must be a member of the Administrators group in the local domain (vsphere.local by
default) to run dir-cli commands. If you do not specify a user name and password, you are
prompted for the password for the administrator of the local vCenter Single Sign-On domain,
administrator@vsphere.local by default.
vecs-cli
Initially, only the store owner and users with blanket access privileges have access to a store.
Users in the Administrators group have blanket access privileges.
The MACHINE_SSL_CERT and TRUSTED_ROOTS stores are special stores. Only the root user
or administrator user, depending on the type of installation, has complete access.
certool
Most of the certool commands require that the user is in the Administrators group. All users
can run the following commands.
n genselfcacert
n initscr
n getdc
n waitVMDIR
VMware, Inc. 80
vSphere Authentication
n waitVMCA
n genkey
n viewcert
The file has several fields with the following default values:
Country = US
Name= Acme
Organization = AcmeOrg
OrgUnit = AcmeOrg Engineering
State = California
Locality = Palo Alto
IPAddress = 127.0.0.1
Email = email@acme.com
Hostname = server.acme.com
You can change the values by specifying a modified file on the command line, or by overriding
individual values on the command line, as follows.
n Create a copy of the configuration file and edit the file. Use the --config command-line
option to specify the file. Specify the full path to avoid path name issues.
n Override individual values on the command line. For example, to override Locality, run this
command:
Specify --Name to replace the CN field of the Subject name of the certificate.
n For solution user certificates, the name is <sol_user name>@<domain> by convention, but
you can change the name if a different convention is used in your environment.
VMCA allows only one DNSName (in the Hostname field) and no other Alias options. If the IP
address is specified by the user, it is stored in SubAltName as well.
VMware, Inc. 81
vSphere Authentication
In many cases, you pass a configuration file in to a certool command. See Changing the certool
Configuration Options. See Replace Existing VMCA-Signed Certificates with New VMCA-Signed
Certificates for some usage examples. The command-line help provides details about the options.
certool --initcsr
Generates a Certificate Signing Request (CSR). The command generates a PKCS10 file and a
private key.
Option Description
--csrfile <csr_file> File name for the CSR file to be sent to the CA provider.
Example:
certool --selfca
Creates a self-signed certificate and provisions the VMCA server with a self-signed root CA.
Using this option is one of the simplest ways to provision the VMCA server. You can instead
provision the VMCA server with a third-party root certificate so that VMCA is an intermediate CA.
See Use VMCA as an Intermediate Certificate Authority.
This command generates a certificate that is predated by three days to avoid time zone conflicts.
Option Description
--predate <number_of_minutes> Allows you to set the Valid Not Before field of the root
certificate to the specified number of minutes before the
current time. This option can be helpful to account for
potential time zone issues. The maximum is three days.
VMware, Inc. 82
vSphere Authentication
Option Description
Example:
certool --rootca
Imports a root certificate. Adds the specified certificate and private key to VMCA. VMCA always
uses the most recent root certificate for signing, but other root certificates remain trusted until
you manually delete them. That means you can update your infrastructure one step at a time,
and finally delete certificates that you no longer use.
Option Description
--privkey <key_file> Name of the private key file. This file must be in PEM
encoded format.
Example:
certool --getdc
Returns the default domain name that is used by vmdir.
Option Description
Example:
certool --getdc
VMware, Inc. 83
vSphere Authentication
certool --waitVMDIR
Wait until the VMware Directory Service is running or until the timeout specified by --wait has
elapsed. Use this option along with other options to schedule certain tasks, for example returning
the default domain name.
Option Description
Example:
certool --waitVMCA
Wait until the VMCA service is running or until the specified timeout has elapsed. Use this option
in conjunction with other options to schedule certain tasks, for example, generating a certificate.
Option Description
Example:
certool --publish-roots
Forces an update of root certificates. This command requires administrative privileges.
Option Description
Example:
certool --publish-roots
VMware, Inc. 84
vSphere Authentication
certool --genkey
Generates a private and public key pair. Those files can then be used to generate a certificate
that is signed by VMCA.
Option Description
Example:
certool --gencert
Generates a certificate from the VMCA server. This command uses the information in
certool.cfg or in the specified configuration file. You can use the certificate to provision
machine certificates or solution user certificates.
Option Description
--cert <certfile> Name of the certificate file. This file must be in PEM
encoded format.
--privkey <keyfile> Name of the private key file. This file must be in PEM
encoded format.
Example:
VMware, Inc. 85
vSphere Authentication
certool --getrootca
Prints the current root CA certificate in human-readable form. This output is not usable as a
certificate, it is changed to be human readable.
Option Description
Example:
certool --viewcert
Print all the fields in a certificate in human-readable form.
Option Description
Example:
certool --enumcert
List all certificates that the VMCA server knows about. The required filter option lets you list all
certificates or only revoked, active, or expired certificates.
Option Description
--filter [all | active] Required filter. Specify all or active. The revoked and
expired options are not currently supported.
Example:
certool --status
Sends a specified certificate to the VMCA server to check whether the certificate has been
revoked. Prints Certificate: REVOKED if the certificate is revoked, and Certificate: ACTIVE
otherwise.
VMware, Inc. 86
vSphere Authentication
Option Description
Example:
certool --genselfcacert
Generates a self-signed certificate based on the values in the configuration file. This command
generates a certificate that is predated by three days to avoid time zone conflicts.
Option Description
--outcert <cert_file> Name of the certificate file. This file must be in PEM
encoded format.
--outprivkey <key_file> Name of the private key file. This file must be in PEM
encoded format.
Example:
VMware, Inc. 87
vSphere Authentication
Option Description
--upn <user-name> User Principle Name that is used to log in to the server
instance specified by --server <server-name> . When
you create a store, it is created in the context of the
current user. Therefore, the owner of the store is the
current user context and not always the root user.
Example:
Option Description
--upn <user-name> User Principle Name that is used to log in to the server
instance specified by --server <server-name> . When
you create a store, it is created in the context of the
current user. Therefore, the owner of the store is the
current user context and not always the root user.
Example:
Option Description
--upn <user-name> User Principle Name that is used to log in to the server
instance specified by --server <server-name> . When
you create a store, it is created in the context of the
current user. Therefore, the owner of the store is the
current user context and not always the root user.
VMware, Inc. 88
vSphere Authentication
Store Description
Machine SSL store (MACHINE_SSL_CERT) n Used by the reverse proxy service on every vSphere
node.
n Used by the VMware Directory Service (vmdir) on
each vCenter Server node.
All services in vSphere 6.0 and later communicate through
a reverse proxy, which uses the machine SSL certificate.
For backward compatibility, the 5.x services still use
specific ports. As a result, some services such as vpxd still
have their own port open.
Solution user stores VECS includes one store for each solution user. The
n machine subject of each solution user certificate must be unique,
for example, the machine certificate cannot have the
n vpxd
same subject as the vpxd certificate.
n vpxd-extension
Solution user certificates are used for authentication with
n vsphere-webclient
vCenter Single Sign-On. vCenter Single Sign-On checks
n wcp that the certificate is valid, but does not check other
certificate attributes.
The following solution user certificate stores are included
in VECS:
n machine: Used by the license server and the logging
service.
VMware, Inc. 89
vSphere Authentication
Store Description
vSphere Certificate Manager Utility backup store Used by VMCA (VMware Certificate Manager) to support
(BACKUP_STORE) certificate revert. Only the most recent state is stored as a
backup, you cannot go back more than one step.
Example:
The owner of the store can perform all operations, including granting and revoking permissions.
The administrator of the local vCenter Single Sign-On domain, administrator@vsphere.local by
default, has all privileges on all stores, including granting and revoking permissions.
You can use vecs-cli get-permissions --name <store-name> to retrieve the current
settings for the store.
Option Description
VMware, Inc. 90
vSphere Authentication
Option Description
--upn <user-name> User Principle Name that is used to log in to the server
instance specified by --server <server-name> . When
you create a store, it is created in the context of the
current user. Therefore, the owner of the store is the
current user context and not always the root user.
Note Do not use this command to add root certificates to the TRUSTED_ROOTS store. Instead,
use the dir-cli command to publish root certificates.
Option Description
--alias <Alias> Optional alias for the certificate. This option is ignored for
the trusted root store.
--key <key-file-path> Full path of the key that corresponds to the certificate.
Optional.
--upn <user-name> User Principle Name that is used to log in to the server
instance specified by --server <server-name> . When
you create a store, it is created in the context of the
current user. Therefore, the owner of the store is the
current user context and not always the root user.
Option Description
VMware, Inc. 91
vSphere Authentication
Option Description
--upn <user-name> User Principle Name that is used to log in to the server
instance specified by --server <server-name> . When
you create a store, it is created in the context of the
current user. Therefore, the owner of the store is the
current user context and not always the root user.
Option Description
--upn <user-name> User Principle Name that is used to log in to the server
instance specified by --server <server-name> . When
you create a store, it is created in the context of the
current user. Therefore, the owner of the store is the
current user context and not always the root user.
VMware, Inc. 92
vSphere Authentication
Option Description
--upn <user-name> User Principle Name that is used to log in to the server
instance specified by --server <server-name> . When
you create a store, it is created in the context of the
current user. Therefore, the owner of the store is the
current user context and not always the root user.
vecs-cli force-refresh
Forces a refresh of VECS. By default, VECS polls vmdir for new root certificate files every 5
minutes. Use this command for an immediate update of VECS from vmdir.
Option Description
--upn <user-name> User Principle Name that is used to log in to the server
instance specified by --server <server-name> . When
you create a store, it is created in the context of the
current user. Therefore, the owner of the store is the
current user context and not always the root user.
Option Description
VMware, Inc. 93
vSphere Authentication
Option Description
Option Description
--cert <cert file> Path to the certificate file. This can be a certificate signed
by VMCA or a third-party certificate.
Option Description
VMware, Inc. 94
vSphere Authentication
Option Description
Option Description
Option Description
VMware, Inc. 95
vSphere Authentication
Option Description
--password-never-expires Set this option to true if you are modifying a user account
for automated tasks that have to authenticate to vCenter
Server, and you want to ensure that the tasks do not stop
running because of password expiration.
Use this option with care.
Option Description
Option Description
VMware, Inc. 96
vSphere Authentication
Option Description
Option Description
Option Description
--name <name> Optional name of the group in vmdir. This option allows
you to check whether a specific group exists.
Use this command if you want to create groups to manage user permissions for the vCenter
Single Sign-On domain. For example, if you create a group and then add it to the Administrators
group of the vCenter Single Sign-On domain, then all users that you add to that group have
administrator permissions for the domain.
It is also possible to give permissions to vCenter inventory objects to groups in the vCenter Single
Sign-On domain. See the vSphere Security documentation.
VMware, Inc. 97
vSphere Authentication
Option Description
Option Description
Option Description
VMware, Inc. 98
vSphere Authentication
Option Description
Option Description
--outcrl <path> Path to write the CRL file to. Not currently used.
Option Description
Option Description
VMware, Inc. 99
vSphere Authentication
Option Description
Option Description
Because traffic is encrypted for all communications, and because only authenticated users can
perform the actions that they have privileges for, your environment is secure.
Users and service accounts authenticate with a token, or a user name and password. Solution
users authenticate with a certificate. For information on replacing solution user certificates, see
Chapter 2 vSphere Security Certificates.
The next step is authorizing the users who can authenticate to perform certain tasks. Usually,
you assign vCenter Server privileges, typically by assigning the user to a group that has a role.
vSphere includes other permission models such as global permissions. See the vSphere Security
documentation.
n Authentication of users through either external identity provider federation or the vCenter
Server built-in identity provider. The built-in identity provider supports local accounts,
Active Directory or OpenLDAP, Integrated Windows Authentication (IWA), and miscellaneous
authentication mechanisms (smart card, RSA SecurID, and Windows Session Authentication).
Starting with vSphere 7.0, you can configure vCenter Server for an external identity provider
using federated authentication. In such a configuration, you replace vCenter Server as the
identity provider. Currently, vSphere supports Active Directory Federation Services (AD FS) as
the external identity provider. In this configuration, AD FS interacts with the identity sources on
behalf of vCenter Server.
Active Directory
User / Groups
AD FS vCenter Server
3 1
User
Application 5 6 Identity Provider
Group Service
1 The user starts on the vCenter Server landing page by entering a user name.
2 If the user name is for a federated domain, vCenter Server redirects the authentication
request to AD FS.
The user is now authenticated, and can view and modify any objects that the user's role has
privileges for.
Note Initially, each user is assigned the No Access role. A vCenter Server administrator must
assign the user at least to the Read Only role before the user can log in. See the vSphere Security
documentation.
In case the external identity provider is unreachable, the login process falls back to the vCenter
Server landing page, showing an appropriate information message. Users can still log in using
their local accounts in the vsphere.local identity source.
Figure 4-2. User Login with the vCenter Server Built-In Identity Provider
vSphere Client
2 1
3 4
vCenter Single
Sign-On
Kerberos
5
CA vCenter
Server
6
VMware
Directory
Service
1 A user logs in to the vSphere Client with a user name and password to access the vCenter
Server system or another vCenter service.
When Integrated Windows Authentication (IWA) has been configured, users can also log in
without having to reenter their Windows password by checking the Use Windows session
authentication check box.
2 The vSphere Client passes the login information to the vCenter Single Sign-On service, which
checks the SAML token of the vSphere Client. If the vSphere Client has a valid token, vCenter
Single Sign-On then checks whether the user is in the configured identity source (for example
Active Directory).
n If only the user name is used, vCenter Single Sign-On checks in the default domain.
3 If the user can authenticate to the identity source, vCenter Single Sign-On returns a token
that represents the user to the vSphere Client.
4 The vSphere Client passes the token to the vCenter Server system.
5 vCenter Server checks with the vCenter Single Sign-On server that the token is valid and not
expired.
6 The vCenter Single Sign-On server returns the token to the vCenter Server system, using the
vCenter Server Authorization Framework to allow user access.
The user is now authenticated, and can view and modify any objects that the user's role has
privileges for.
Note Initially, each user is assigned the No Access role. A vCenter Server administrator must
assign the user at least to the Read Only role before the user can log in. See the vSphere Security
documentation.
Note vCenter Server uses solution user certificates for internal communication only. Solution
user certificates are not used for external communication.
The following figure shows the login flow for solution users.
Solution User
vCenter Single
Sign-On
4
3
Kerberos
vCenter
2 Server
CA
VMware
Directory
Service
2 The solution user is redirected to vCenter Single Sign-On. If the solution user is new to
vCenter Single Sign-On, it has to present a valid certificate.
3 If the certificate is valid, vCenter Single Sign-On assigns a SAML token (bearer token) to the
solution user. The token is signed by vCenter Single Sign-On.
4 The solution user is then redirected to vCenter Single Sign-On and can perform tasks based
on its permissions.
The next time the solution user has to authenticate, it can use the SAML token to log in to
vCenter Server.
By default, this handshake is automatic because VMCA provisions solution users with certificates
during startup. If your company policy requires third-party CA-signed certificates, you can
replace the solution user certificates with third-party CA-signed certificates. If those certificates
are valid, vCenter Single Sign-On assigns a SAML token to the solution user. See Use Custom
Certificates with vSphere.
Supported Encryption
AES encryption, which is the highest level of encryption, is supported. The supported encryption
affects security when vCenter Single Sign-On uses Active Directory as an identity source.
It also affects security anytime an ESXi host or vCenter Server is joined to Active Directory.
Note VMware encourages you to use federated authentication as vSphere moves towards
token-based authentication. vCenter Server continues to have local accounts, for administrative
access and error recovery.
n You can use Single Sign-On with existing federated infrastructure and applications.
n You can improve data center security because vCenter Server never handles the user’s
credentials.
n You can use the authentication mechanisms, such as multi-factor authentication, supported
by the external identity provider.
n A vCenter Server
n An AD FS Application Group
n Active Directory groups and users that map to vCenter Server groups and users
To establish a relying party trust between vCenter Server and an identity provider, you must
establish the identifying information and a shared secret between them. In AD FS, you do so
by creating an OIDC configuration known as an Application Group, which consists of a Server
application and a Web API. The two components specify the information that vCenter Server
uses to trust and communicate with the AD FS server. You also create a corresponding identity
provider in vCenter Server. Finally, you configure group memberships in vCenter Server to
authorize logins from users in the AD FS domain.
The AD FS administrator must provide the following information to create the vCenter Server
identity provider configuration:
n Client Identifier: The UUID string that is generated by the AD FS Application Group wizard
and that identifies the Application Group itself.
n Shared Secret: The secret that is generated by the AD FS Application Group wizard and that
is used to authenticate vCenter Server with AD FS.
n OpenID Address: The OpenID Provider Discovery endpoint URL of the AD FS server,
specifying a well-known address that is typically the issuer endpoint concatenated with the
path “/.well-known/openid-configuration”. For example: https://webserver.example.com/
adfs/.well-known/openid-configuration.
If you use Enhanced Linked Mode configuration, note the following when logging in to vCenter
Server using federated authentication.
n Users continue to see the same inventory, and can perform the same actions, based on the
vCenter Server permissions and roles model.
n vCenter Server hosts in enhanced linked mode are not required to have access to each
other's identity providers. For example, consider two vCenter Server systems A and B, and
that use enhanced linked mode. After vCenter Server A authorizes a user, then the user is
authorized on vCenter Server B as well.
The following illustration shows the authentication workflow with enhanced linked mode and
vCenter Server Identity Provider Federation.
Figure 4-4. Enhanced Linked Mode and vCenter Server Identity Provider Federation
AD FS
Federated
0Auth Group Authentication Active
Redirect URIs: Directory
https://VCA
https://VCB
vCenter Server A
vCenter Server B
Identity Provider
Service Enhanced
Linked Mode
1 Two vCenter Server nodes are deployed in Enhanced Linked Mode configuration.
2 The AD FS setup has been configured on vCenter Server A using the Change Identity
Provider wizard in the vSphere Client. Group memberships and permissions have also been
established for AD FS users or groups.
4 All Redirect URIs for both vCenter Server nodes are added to the OAuth Application Group in
AD FS. Only one OAuth Application Group is created.
5 When a user logs into and is authorized by vCenter Server A, the user is also authorized on
vCenter Server B. If the user logs in to vCenter Server B first, the same holds true.
vCenter Server enhanced linked mode supports the following configuration scenarios for identity
provider federation. In this section, the terms "AD FS settings" and "AD FS configuration" refer to
the settings that you configure in the vSphere Client using the Change Identity Provider wizard,
and any group memberships or permissions that you have established for AD FS users or groups.
High-level steps:
4 Add all Redirect URIs for all N vCenter Server nodes to the configured OAuth Application
Group in AD FS.
High-level Steps:
3 Repoint the new vCenter Server to the N-node AD FS enhanced linked mode domain,
using one of the N nodes as its replication partner.
4 All AD FS settings in the existing Enhanced Linked Mode configuration are replicated to
the new vCenter Server.
The AD FS settings that are in the N-node AD FS enhanced linked mode domain
overwrite any existing AD FS settings on the newly linked vCenter Server.
5 Add all Redirect URIs for the new vCenter Server to the existing configured OAuth
Application Group in AD FS.
High-level steps:
2 Unregister one of the vCenter Server hosts in the N-node configuration and repoint it to a
new domain to unlink it from the N-node configuration.
3 The domain repointing process does not preserve SSO settings, so all AD FS settings on
the unlinked vCenter Server node are reverted and lost. To continue using AD FS on this
vCenter Server unlinked node, you must reconfigure AD FS from the beginning or you
must relink the vCenter Server to an Enhanced Linked Mode configuration where AD FS is
already set up.
As you are planning your vCenter Server Identity Provider Federation strategy, consider possible
interoperability limitations.
Authentication Mechanisms
In a vCenter Server Identity Provider Federation configuration, the external identity provider
handles the authentication mechanisms (passwords, MFA, biometrics, and so on).
You can manage your vCenter Server Identity Provider Federation life cycle in the following
ways.
In general, you do not need to perform any additional AD FS reconfiguration for a cross-domain
repoint, unless one of the following is true.
2 This is the first time the repointed vCenter Server is receiving an AD FS configuration.
In these cases, you must add the vCenter Server system's Redirect URIs to the corresponding
Application Group on the AD FS server. For example, if vCenter Server 1 with AD FS Application
Group A (or no AD FS configuration) is repointed to vCenter Server 2 with AD FS Application
Group B, you must add the Redirect URIs of vCenter Server 1 to Application Group B.
You configure vCenter Server Identity Provider Federation from the vSphere Client or the API.
You also must perform some configuration on your external identity provider. To configure
vCenter Server Identity Provider Federation, you must have vCenter Single Sign-On administrator
privileges. Having vCenter Single Sign-On administrator privileges is different from having the
Administrator role on vCenter Server or ESXi. In a new installation, only the vCenter Single Sign-
On administrator (administrator@vsphere.local by default) can authenticate to vCenter Single
Sign-On.
Figure 4-5. vCenter Server Identity Provider Federation Configuration Process Flow
1 2
External Identity Provider Trust Management Service 3 Configure
(AD FS) Identity
VcIdentityProviders API Provider
Post /providers vAPI
AD FS Administrator vCenter Server
Administrator
5 vmware-stsd Service
Identity Management
(IDM)
AdminServer
4
2 The vCenter Server administrator logs in to the vCenter Server using the vSphere Client.
3 The vCenter Server administrator adds an AD FS identity provider to vCenter Server, and also
enters information about the Active Directory domain.
vCenter Server needs this information to make an LDAP connection to the Active Directory
domain of the AD FS server. Using this connection, vCenter Server searches for users and
groups, and adds them to vCenter Server local groups in the next step. See the section titled
"Searching the Active Directory Domain" that follows for more information.
4 The vCenter Server administrator configures authorization permissions in vCenter Server for
AD FS users.
5 The AD FS Provider queries the VcIdentityProviders API to get the LDAP connection
information for the Active Directory source.
6 The AD FS Provider searches Active Directory for the queried users or groups to finish the
Authorization configuration.
vCenter Server also uses this search process when you configure global permissions for Active
Directory users and groups. In both cases, either configuring global permissions, or adding a user
or group, you select the domain you entered for your AD FS identify provider from the Domain
drop-down menu to search for and select users and groups from your Active Directory domain.
Use the Trusted Root Certificates Store Instead of the JRE truststore
If you imported a root CA certificate issued by your own internal Certificate Authority to the JRE
truststore in vSphere 7.0, starting in vSphere 7.0 Update 1, you can register the certificate to the
Trusted Root Certificates Store.
To configure vCenter Server Identity Provider Federation in vSphere 7.0 with a root CA
certificate that was issued by your own internal Certificate Authority, you had to import it to
the JRE truststore. Starting in vSphere 7.0 Update 1, you can register the certificate to the
Trusted Root Certificates Store. This change means that you should add the root CA certificate
that was issued by your own internal Certificate Authority to the Trusted Root Certificates
Store (also called the VMware Endpoint Certificate Store, or VECS). Certificates in the JRE
truststore continue to function, however, vCenter Server is standardizing on using the Trusted
Root Certificates Store.
Procedure
vCenter Server supports only one configured external identity provider (one source), and the
vsphere.local identity source. You cannot use multiple external identity providers. vCenter Server
Identity Provider Federation uses OpenID Connect (OIDC) for user login to vCenter Server.
This task describes how to add an AD FS group to the vSphere Administrators group as the
way to control permissions. You can also configure privileges using AD FS Authorization through
global or object permissions in vCenter Server. See the vSphere Security documentation for
details about adding permissions.
Caution If you use an Active Directory identity source that you previously added to vCenter
Server for your AD FS identity source, do not delete that existing identity source from vCenter
Server. Doing so causes a regression with previously assigned roles and group memberships.
Both the AD FS user with global permissions and users that were added to the Administrators
group will not be able to log in.
Workaround: If you do not need the previously assigned roles and group memberships, and
want to remove the previous Active Directory identity source, remove the identity source before
creating the AD FS provider and configuring group memberships in vCenter Server.
Prerequisites
n You have created a vCenter Server administrators group in AD FS that contains the users you
want to grant vCenter Server administrator privileges to.
For more information about configuring AD FS, see the Microsoft documentation.
n vCenter Server must be able to connect to the AD FS discovery endpoint, and the
authorization, token, logout, JWKS, and any other endpoints advertised in the discovery
endpoint metadata.
Procedure
2 Add your AD FS server certificate (or a CA or intermediate certificate that signed the AD FS
server certificate) to the Trusted Root Certificates Store.
4 Select the Identity Provider tab and obtain the Redirect URIs.
a Click the informational “i” icon next to the “Change identity provider” link.
b Copy both URIs to a file or write them down for later use in subsequent steps to configure
the AD FS server.
To establish a relying party trust between vCenter Server and an identity provider, you must
establish the identifying information and a shared secret between them. In AD FS, you do so
by creating an OpenID Connect configuration known as an Application Group, which consists
of a Server application and a Web API. The two components specify the information that
vCenter Server uses to trust and communicate with the AD FS server. To enable OpenID
Connect in AD FS, see the VMware knowledge base article at https://kb.vmware.com/s/
article/78029.
n You need the two Redirect URIs you obtained and saved from the prior step.
n Copy the following information to a file or write it down for use when configuring the
vCenter Server Identity Provider in the next step.
n Client Identifier
n Shared secret
Enter the information that you have gathered previously for the following text boxes:
n Client Identifier
n Shared Secret
d Click Next.
e Enter user and group information for the Active Directory over LDAP connection to
search for users and groups.
vCenter Server derives the AD domain to use for authorization and permissions from the
Base Distinguished Name for users. You can add permissions on vSphere objects only
for users and groups from this AD domain. Users or groups from AD child domains or
other domains in the AD forest are not supported by vCenter Server Identity Provider
Federation.
Option Description
Base distinguished name for users Base Distinguished Name for users.
Base distinguished name for The base Distinguished Name for groups.
groups
Primary server URL Primary domain controller LDAP server for the domain.
Use the format ldap://hostname:port or ldaps://hostname:port.
The port is typically 389 for LDAP connections and 636 for LDAPS
connections. For Active Directory multi-domain controller deployments,
the port is typically 3268 for LDAP and 3269 for LDAPS.
A certificate that establishes trust for the LDAPS endpoint of the Active
Directory server is required when you use ldaps:// in the primary or
secondary LDAP URL.
Secondary server URL Address of a secondary domain controller LDAP server that is used for
failover.
SSL certificates If you want to use LDAPS with your Active Directory LDAP Server or
OpenLDAP Server identity source, click Browse to select a certificate.
d In the text box below the drop-down menu, enter the first few characters of AD FS group
that you want to add then wait for the drop-down selection to appear.
It might take several seconds for the selection to appear as vCenter Server establishes
the connection to and searches Active Directory.
f Click Save.
During installation, the following components are deployed as part of a vCenter Server
deployment.
The vCenter Single Sign-On service signs all tokens with a signing certificate, and stores the
token signing certificate on disk. The certificate for the service itself is also stored on disk.
Administration server
The administration server allows users with administrator privileges to vCenter Single Sign-On
to configure the vCenter Single Sign-On server and manage users and groups from the
vSphere Client. Initially, only the user administrator@your_domain_name has these privileges.
You can change the vSphere domain when you install vCenter Server. Do not name the
domain name with your Microsoft Active Directory or OpenLDAP domain name.
A VMware Directory Service (vmdir) is associated with the domain you specify during
installation and is included in each vCenter Server deployment. This service is a multi-
tenanted, peer-replicating directory service that makes an LDAP directory available on port
389. It also stores and manages vCenter Single Sign-On user accounts and passwords, which
are secured by the SHA-512 hashing algorithm.
If your environment includes multiple instances of vCenter Server configured in linked mode,
an update of vmdir content in one vmdir instance is propagated to all other instances of
vmdir.
The VMware Directory Service stores not only vCenter Single Sign-On information but also
certificate information.
vCenter Single Sign-On authenticates both solution users and other users.
n Solution users represent a set of services in your vSphere environment. During installation,
VMCA assigns a certificate to each solution user by default. The solution user uses that
certificate to authenticate to vCenter Single Sign-On. vCenter Single Sign-On gives the
solution user a SAML token, and the solution user can then interact with other services in
the environment.
n When other users log in to the environment, for example, from the vSphere Client, vCenter
Single Sign-On prompts for a user name and password. If vCenter Single Sign-On finds a
user with those credentials in the corresponding identity source, it assigns the user a SAML
token. The user can now access other services in the environment without being prompted to
authenticate again.
Which objects the user can view, and what a user can do, is usually determined by vCenter
Server permission settings. vCenter Server administrators assign those permissions from the
Permissions interface in the vSphere Client, not through vCenter Single Sign-On. See the
vSphere Security documentation.
All users that can authenticate to vCenter Single Sign-On can reset their password. See Change
Your vCenter Single Sign-On Password . Only vCenter Single Sign-On administrators can reset the
password for users who no longer have their password.
To configure vCenter Single Sign-On and manage vCenter Single Sign-On users and groups,
the user administrator@vsphere.local or a user in the vCenter Single Sign-On Administrators
group must log in to the vSphere Client. Upon authentication, that user can access the vCenter
Single Sign-On administration interface from the vSphere Client and manage identity sources and
default domains, specify password policies, and perform other administrative tasks.
Note You cannot rename the vCenter Single Sign-On administrator user, which is
administrator@vsphere.local by default or administrator@mydomain if you specified a different
domain during installation. For improved security, consider creating additional named users in the
vCenter Single Sign-On domain and assigning them administrative privileges. You can then stop
using the administrator account.
Account Description
ESXi Users
Standalone ESXi hosts are not integrated with vCenter Single Sign-On. See vSphere Security for
information on adding an ESXi host to Active Directory.
If you create local ESXi users for a managed ESXi host with the VMware Host Client, ESXCLI, or
PowerCLI, vCenter Server is not aware of those users. Creating local users can therefore result
in confusion, especially if you use the same user names. Users who can authenticate to vCenter
Single Sign-On can view and manage ESXi hosts if they have the corresponding permissions on
the ESXi host object.
Note Manage permissions for ESXi hosts through vCenter Server if possible.
When a user logs in to a vCenter Server system from the vSphere Client, the login behavior
depends on whether the user is in the domain that is set as the default identity source.
n Users who are in the default domain can log in with their user name and password.
n Users who are in a domain that has been added to vCenter Single Sign-On as an identity
source but is not the default domain can log in to vCenter Server but must specify the domain
in one of the following ways.
n Users who are in a domain that is not a vCenter Single Sign-On identity source cannot log in
to vCenter Server. If the domain that you add to vCenter Single Sign-On is part of a domain
hierarchy, Active Directory determines whether users of other domains in the hierarchy are
authenticated or not.
If your environment includes an Active Directory hierarchy, see VMware Knowledge Base article
2064250 for details on supported and unsupported setups.
For all objects in the vCenter Server hierarchy, you can assign permissions by pairing a user and
a role with the object. For example, you can select a resource pool and give a group of users
read privileges to that resource pool object by giving them the corresponding role.
For some services that are not managed by vCenter Server directly, membership in one of the
vCenter Single Sign-On groups determines the privileges. For example, a user who is a member
of the Administrators group can manage vCenter Single Sign-On. A user who is a member of
the CAAdmins group can manage the VMware Certificate Authority, and a user who is in the
LicenseService.Administrators group can manage licenses.
The following groups are predefined in vsphere.local. Many of these groups are internal to
vsphere.local or give users high-level administrative privileges. Add users to any of these groups
only after careful consideration of the risks.
Caution Do not delete any of the predefined groups in the vsphere.local domain. If you do,
errors with authentication or certificate provisioning might result.
Privilege Description
SolutionUsers Solution users group for vCenter services. Each solution user authenticates
individually to vCenter Single Sign-On with a certificate. By default, VMCA
provisions solution users with certificates. Do not add members to this group
explicitly.
CAAdmins Members of the CAAdmins group have administrator privileges for VMCA. Do
not add members to this group unless you have compelling reasons.
DCAdmins Members of the DCAdmins group can perform Domain Controller Administrator
actions on VMware Directory Service.
Note Do not manage the domain controller directly. Instead, use the vmdir CLI
or the vSphere Client to perform corresponding tasks.
SystemConfiguration.BashShellAdmi A user in this group has full access to all the Appliance Management APIs.
nistrators By default, a user who connects to the vCenter Server with SSH can access
only commands in the restricted shell, but users in this group have Bash Shell
Access over SSH and gain full privileges similar to the root user.
ActAsUsers Members of Act-As Users are allowed to get Act-As tokens from vCenter Single
Sign-On.
ExternalIDPUsers This internal group is not used by vSphere. VMware vCloud Air requires this
group.
DCClients This group is used internally to allow the management node access to data in
VMware Directory Service.
Note Do not modify this group. Any changes might compromise your
certificate infrastructure.
Privilege Description
ServiceProviderUsers Members of this group can manage the vSphere with Tanzu and VMware Cloud
on AWS infrastructure.
SystemConfiguration.ReadOnly Members of this group can access vCenter Server Appliance read-only
operations under Appliance Management.
VCLSAdmin Members of this group have administrative privileges for vSphere Cluster
Services (vCLS).
AnalyticsService.Administrators This group is used for the VMware Analytics Service APIs.
in the login screen, vCenter Single Sign-On checks the specified domain if that domain has been
added as an identity source. You can add identity sources, remove identity sources, and change
the default.
You configure vCenter Single Sign-On from the vSphere Client. To configure vCenter Single
Sign-On, you must have vCenter Single Sign-On administrator privileges. Having vCenter
Single Sign-On administrator privileges is different from having the Administrator role on
vCenter Server or ESXi. In a new installation, only the vCenter Single Sign-On administrator
(administrator@vsphere.local by default) can authenticate to vCenter Single Sign-On.
Note In vSphere 7.0 Update 2 and later, you can enable FIPS on vCenter Server. See the
vSphere Security documentation. AD over LDAP and IWA are not supported when FIPS is
enabled. Use external identity provider federation when in FIPS mode. See Configuring vCenter
Server Identity Provider Federation.
An administrator can add identity sources, set the default identity source, and create users and
groups in the vsphere.local identity source.
The user and group data is stored in Active Directory, OpenLDAP, or locally to the operating
system of the machine where vCenter Single Sign-On is installed. After installation, every instance
of vCenter Single Sign-On has the identity source your_domain_name, for example vsphere.local.
This identity source is internal to vCenter Single Sign-On.
Note At any time, only one default domain exists. If a user from a non-default domain logs in,
that user must add the domain name to authenticate successfully. The domain name is in the
form:
DOMAIN\user
n Active Directory over LDAP. vCenter Single Sign-On supports multiple Active Directory over
LDAP identity sources.
n Active Directory (Integrated Windows Authentication) versions 2003 and later. vCenter
Single Sign-On allows you to specify a single Active Directory domain as an identity source.
The domain can have child domains or be a forest root domain. VMware KB article 2064250
discusses Microsoft Active Directory Trusts supported with vCenter Single Sign-On.
n OpenLDAP versions 2.4 and later. vCenter Single Sign-On supports multiple OpenLDAP
identity sources.
Note A future update to Microsoft Windows will change the default behavior of Active
Directory to require strong authentication and encryption. This change will impact how
vCenter Server authenticates to Active Directory. If you use Active Directory as your identity
source for vCenter Server, you must plan to enable LDAPS. For more information about
this Microsoft security update, see https://portal.msrc.microsoft.com/en-US/security-guidance/
advisory/ADV190023 and https://blogs.vmware.com/vsphere/2020/01/microsoft-ldap-vsphere-
channel-binding-signing-adv190023.html.
When a user logs in to a vCenter Server system from the vSphere Client, the login behavior
depends on whether the user is in the domain that is set as the default identity source.
n Users who are in the default domain can log in with their user name and password.
n Users who are in a domain that has been added to vCenter Single Sign-On as an identity
source but is not the default domain can log in to vCenter Server but must specify the domain
in one of the following ways.
n Users who are in a domain that is not a vCenter Single Sign-On identity source cannot log in
to vCenter Server. If the domain that you add to vCenter Single Sign-On is part of a domain
hierarchy, Active Directory determines whether users of other domains in the hierarchy are
authenticated or not.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
4 Under the Identity Provider tab, click Identity Sources, select an identity source, and click
Set as Default.
5 Click OK.
In the domain display, the default domain shows (default) in the Type column.
An identity source can be an Active Directory over LDAP, a native Active Directory (Integrated
Windows Authentication) domain, or an OpenLDAP directory service. See Identity Sources for
vCenter Server with vCenter Single Sign-On.
Immediately after installation, the vsphere.local domain (or the domain you specified during
installation) with the vCenter Single Sign-On internal users is available.
Note If you have updated or replaced your Active Directory SSL certificate, you must remove
and re-add the identity source in vCenter Server.
Prerequisites
If you are adding an Active Directory (Integrated Windows Authentication) identity source, the
vCenter Server must be in the Active Directory domain. See Add a vCenter Server to an Active
Directory Domain.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
4 Under the Identity Provider tab, click Identity Sources, and click Add.
5 Select the identity source and enter the identity source settings.
Option Description
Active Directory (Integrated Use this option for native Active Directory implementations. The machine on
Windows Authentication) which the vCenter Single Sign-On service is running must be in an Active
Directory domain if you want to use this option.
See Active Directory Identity Source Settings.
Active Directory over LDAP This option requires that you specify the domain controller and other
information. See Active Directory over LDAP and OpenLDAP Server Identity
Source Settings.
OpenLDAP Use this option for an OpenLDAP identity source. See Active Directory over
LDAP and OpenLDAP Server Identity Source Settings.
Note If the user account is locked or disabled, authentications and group and user searches
in the Active Directory domain fail. The user account must have read-only access over the
User and Group OU, and must be able to read user and group attributes. Active Directory
provides this access by default. Use a special service user for improved security.
6 Click Add.
What to do next
Initially, each user is assigned the No Access role. A vCenter Server administrator must assign
the user at least to the Read Only role before the user can log in. See the vSphere Security
documentation.
Active Directory over LDAP and OpenLDAP Server Identity Source Settings
The Active Directory over LDAP identity source is preferred over the Active Directory
(Integrated Windows Authentication) option. The OpenLDAP Server identity source is available
for environments that use OpenLDAP.
If you are configuring an OpenLDAP identity source, see the VMware knowledge base article at
http://kb.vmware.com/kb/2064977 for additional requirements.
Note A future update to Microsoft Windows will change the default behavior of Active
Directory to require strong authentication and encryption. This change will impact how
vCenter Server authenticates to Active Directory. If you use Active Directory as your identity
source for vCenter Server, you must plan to enable LDAPS. For more information about
this Microsoft security update, see https://portal.msrc.microsoft.com/en-US/security-guidance/
advisory/ADV190023 and https://blogs.vmware.com/vsphere/2020/01/microsoft-ldap-vsphere-
channel-binding-signing-adv190023.html.
Table 4-3. Active Directory over LDAP and OpenLDAP Server Settings
Option Description
Base DN for users Base Distinguished Name for users. Enter the DN
from which to start user searches. For example,
cn=Users,dc=myCorp,dc=com.
Base DN for groups The Base Distinguished Name for groups. Enter the
DN from which to start group searches. For example,
cn=Groups,dc=myCorp,dc=com.
Primary Server URL Primary domain controller LDAP server for the domain.
You can use either the host name or the IP address.
Use the format ldap://hostname_or_IPaddress:port
or ldaps://hostname_or_IPaddress:port. The port is
typically 389 for LDAP connections and 636 for LDAPS
connections. For Active Directory multi-domain controller
deployments, the port is typically 3268 for LDAP and
3269 for LDAPS.
A certificate that establishes trust for the LDAPS endpoint
of the Active Directory server is required when you use
ldaps:// in the primary or the secondary LDAP URL.
Table 4-3. Active Directory over LDAP and OpenLDAP Server Settings (continued)
Option Description
Certificates (for LDAPS) If you want to use LDAPS with your Active Directory
LDAP Server or OpenLDAP Server identity source, click
Browse to select a certificate that was exported from the
domain controller specified in the LDAPS URL. (Note that
the certificate used here is not a root CA certificate.) To
export the certificate from Active Directory, consult the
Microsoft documentation.
Prerequisites for Using an Active Directory (Integrated Windows Authentication) Identity Source
You can set up vCenter Single Sign-On to use an Active Directory (Integrated Windows
Authentication) identity source only if that identity source is available. Follow the instructions
in the vCenter Server Configuration documentation.
Note Active Directory (Integrated Windows Authentication) always uses the root of the Active
Directory domain forest. To configure your Integrated Windows Authentication identity source
with a child domain within your Active Directory forest, see the VMware knowledge base article
at http://kb.vmware.com/kb/2070433.
Select Use machine account to speed up configuration. If you expect to rename the local
machine on which vCenter Single Sign-On runs, specifying an SPN explicitly is preferable.
If you have enabled diagnostic event logging in your Active Directory to identify where
hardening might be needed, you might see a log event with Event ID 2889 on that directory
server. Event ID 2889 is generated as an anomaly rather than a security risk when using
Integrated Windows Authentication. For more information about Event ID 2889, see the VMware
knowledge base article at https://kb.vmware.com/s/article/78644.
Use machine account Select this option to use the local machine account as the
SPN. When you select this option, you specify only the
domain name. Do not select this option if you expect to
rename this machine.
Use Service Principal Name (SPN) Select this option if you expect to rename the local
machine. You must specify an SPN, a user who can
authenticate with the identity source, and a password for
the user.
Service Principal Name (SPN) SPN that helps Kerberos to identify the Active Directory
service. Include the domain in the name, for example,
STS/example.com.
The SPN must be unique across the domain. Running
the setspn -S command checks that no duplicate is
created. See the Microsoft documentation for information
on setspn.
User Principal Name (UPN) Name and password of a user who can authenticate
Password with this identity source. Use the email address format,
for example, jchin@mydomain.com. You can verify the
User Principal Name with the Active Directory Service
Interfaces Editor (ADSI Edit).
An identity source can be a native Active Directory (Integrated Windows Authentication) domain,
AD over LDAP, AD over LDAP using LDAPS (LDAP over SSL), or OpenLDAP. See Identity
Sources for vCenter Server with vCenter Single Sign-On. You also use the sso-config utility
to set up smart card and RSA SecurID authentication.
Prerequisites
If you are adding an Active Directory identity source, the vCenter Server must be in the Active
Directory domain. See Add a vCenter Server to an Active Directory Domain.
Enable SSH login. See Manage vCenter Server from the vCenter Server Shell.
Procedure
1 Use SSH or another remote console connection to start a session on the vCenter Server
system.
2 Log in as root.
cd /opt/vmware/bin
4 Refer to the sso-config help by running sso-config.sh -help, or see the VMware
knowledge base article at https://kb.vmware.com/s/article/67304 for usage examples.
Prerequisites
n Join the vCenter Server to an Active Directory domain. See Add a vCenter Server to an
Active Directory Domain.
n Verify that the domain is set up properly. See the VMware knowledge base article at http://
kb.vmware.com/kb/2064250.
n Verify that the Enhanced Authentication Plug-In is installed. See vCenter Server Installation
and Setup.
Note When you configure vCenter Server to use federated authentication with Active Directory
Federation Services, the Enhanced Authentication Plug-in only applies to configurations where
vCenter Server is the identity provider (Active Directory over LDAP, Integrated Windows
Authentication, and OpenLDAP configurations).
Procedure
n If the Active Directory domain is the default identity source, log in with your user name,
for example jlee.
As a token issuer, the Security Token Service (STS) uses a private key to sign the tokens
and publishes the public certificates for services to verify the token signature. vCenter Server
manages the STS signing certificates and stores them in the VMware Directory Service (vmdir).
Tokens can have a significant lifetime, and historically might have been signed by any one of
multiple keys.
Users present their primary credentials to the STS interface to acquire tokens. The primary
credential depends on the type of user.
Solution user
Valid certificate.
Other users
User name and password available in a vCenter Single Sign-On identity source.
STS authenticates the user based on the primary credentials, and constructs a SAML token that
contains user attributes.
By default, the VMware Certificate Authority (VMCA) generates the STS signing certificate. You
can refresh the STS signing certificate with a new VMCA certificate. You can also import and
replace the default STS signing certificate with a custom or third-party generated STS signing
certificate. Do not replace the STS signing certificate unless the security policy of your company
requires replacing all certificates.
You can also use the command line to replace custom and third-party generated STS certificates.
Note In certain circumstances, replacing your STS signing certificates can change the duration
of the certificates. When performing certificate replacement, pay attention to the issuing and
expiration dates.
When you refresh STS signing certificates, the VMware Certificate Authority (VMCA) issues a
new certificate and replaces the current certificate in the VMware Directory Service (vmdir). STS
starts using the new certificate to issue new tokens. In an Enhanced Linked Mode configuration,
vmdir uploads the new certificate from the issuing vCenter Server system to all linked vCenter
Server systems. When you refresh STS signing certificates, you must restart the vCenter
Server system, and any other vCenter Server system that is part of an Enhanced Linked Mode
configuration.
If you are using a custom generated or third-party STS signing certificate, the refresh overwrites
that certificate with a VMCA-issued certificate. To update custom generated or third-party STS
signing certificates, use the import and replace option. See Import and Replace a vCenter Server
STS Certificate Using the vSphere Client.
The VMCA-issued STS signing certificate is valid for 10 years and is not an external-facing
certificate. Do not replace this certificate unless the security policy of your company requires
it.
Prerequisites
For certificate management, you must supply the password of the administrator of the local
domain (administrator@vsphere.local by default). If you are renewing certificates, you must also
supply the vCenter Single Sign-On credentials for a user with administrator privileges on the
vCenter Server system.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
4 If the system prompts you, enter the credentials of your vCenter Server.
5 Under STS Signing Certificate, click Actions > Refresh with vCenter certificate.
If you are using a custom generated or third-party STS signing certificate, the refresh action
overwrites that certificate with a VMCA-generated certificate.
Note If you were using third-party certificates for compliance reasons, the refresh might
cause your vCenter Server systems to go out of compliance. Also, if you are using a custom
generated or third-party STS signing certificate, the Security Token Service no longer uses
that custom or third-party certificate for token signing.
6 Click Refresh.
The VMCA refreshes the STS signing certificate on this vCenter Server system and on any
linked vCenter Server systems.
7 (Optional) If the Force Refresh button appears, vCenter Single Sign-On has detected a
problem. Before clicking Force Refresh, consider the following potential results.
n If all the impacted vCenter Server systems are not running at least vSphere 7.0 Update 3,
they do not support the certificate refresh.
n Selecting Force Refresh requires that you restart all vCenter Server systems and can
render those systems inoperable until you do so.
a If you are unsure of the impact, click Cancel and research your environment.
b If you are sure of the impact, click Force Refresh to proceed with the refresh then
manually restart your vCenter Server systems.
What to do next
To ensure that all the STS services in an Enhanced Linked Mode configuration validate the new
tokens, you must restart the linked vCenter Server systems. See the topic about how to reboot
vCenter Server in the vCenter Server Configuration documentation.
To import and replace the default STS signing certificate, you must first generate a new
certificate. When you import and replace STS signing certificates, the VMware Directory Service
(vmdir) uploads the new certificate from the issuing vCenter Server system to all linked vCenter
Server systems.
The STS certificate is not an external-facing certificate. Do not replace this certificate unless the
security policy of your company requires it.
Prerequisites
For certificate management, you must supply the password of the administrator of the local
domain (administrator@vsphere.local by default). You also must supply the vCenter Single Sign-
On credentials for a user with administrator privileges on the vCenter Server system.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
4 If the system prompts you, enter the credentials of your vCenter Server.
5 Under STS Signing Certificate, click Actions > Import and Replace.
The PEM file includes the signing certificate chain and the private key.
7 Click Replace.
The STS signing certificate is replaced on this vCenter Server system and on any linked
vCenter Server systems.
8 Restart the vCenter Server system, and any other vCenter Server system that is part of an
Enhanced Linked Mode configuration.
See the topic about how to reboot vCenter Server in the vCenter Server Configuration
documentation.
To use a company required certificate or to refresh a certificate that is near expiration, you can
replace the existing STS signing certificate. To replace the default STS signing certificate, you
must first generate a new certificate.
The STS certificate is not an external-facing certificate. Do not replace this certificate unless the
security policy of your company requires it.
Caution You must use the procedures described here. Do not replace the certificate directly in
the file system.
Prerequisites
Enable SSH login to vCenter Server. See Manage vCenter Server from the vCenter Server Shell.
Procedure
2 Create a certificate.
a Create a top-level directory to hold the new certificate and verify the location of the
directory.
mkdir newsts
cd newsts
pwd
#resulting output: /root/newsts
cp /usr/lib/vmware-vmca/share/config/certool.cfg /root/newsts
c Using a command-line editor such as Vim, open your copy of the certool.cfg file and
edit it to use the local vCenter Server IP address and hostname. The country is required
and has to be two characters, as shown in the following example.
#
# Template file for a CSR request
#
f Create a PEM file with the certificate chain and private key.
4 Restart the vCenter Server system, and any other vCenter Server system that is part of an
Enhanced Linked Mode configuration. See the topic about how to reboot vCenter Server in
the vCenter Server Configuration documentation.
For authentication to work correctly, you must restart vCenter Server. Both the STS service
and the vSphere Client are restarted.
You can view the following information on the active STS certificate.
n A green check for a valid certificate, and an orange check warning of an expired certificate
Procedure
2 Enter the user name and password for a user that has at least Read privileges.
4 If the system prompts you, enter the credentials of your vCenter Server.
5 To view details for the active STS certificate, click View Details.
vCenter Server alerts you when an active LDAP SSL certificate is close to its expiration date.
You see certificate expiration information only if you use Active Directory over LDAP or an
OpenLDAP identity source and specify an ldaps:// URL for the server.
Prerequisites
Enable SSH login to vCenter Server. See Manage vCenter Server from the vCenter Server Shell.
Procedure
/opt/vmware/bin/sso-config.sh -get_identity_sources
3 To determine the expiration date, view the SSL certificate's details and verify the NotAfter
field.
By default, vCenter Single Sign-On built-in user account passwords expire after 90 days. The
vSphere Client reminds you when your password is about to expire.
Note The administrator account (administrator@vsphere.local) does not get locked out nor does
its password expire. Proper security practice is to audit logins from this account and rotate the
password regularly.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
Option Description
Maximum lifetime Maximum number of days that a password is valid before the user must
change it. The maximum number of days you can enter is 999999999. A
value of zero (0) means that the password never expires.
Restrict reuse Number of previous passwords that cannot be reused. For example, if you
enter 6, the user cannot reuse any of the last six passwords.
Maximum length Maximum number of characters that are allowed in the password.
Minimum length Minimum number of characters required in the password. The minimum
length must be no less than the combined minimum of alphabetic, numeric,
and special character requirements.
Character requirements Minimum number of different character types that are required in the
password. You can specify the number of each type of character, as follows:
n Special: & # %
n Alphabetic: A b c D
n Uppercase: A B C
n Lowercase: a b c
n Numeric: 1 2 3
n Identical Adjacent: The number must be greater than 0. For example, if
you enter 1, the following password is not allowed: p@$$word.
The minimum number of alphabetic characters must be no less than the
combined uppercase and lowercase characters.
Non-ASCII characters are supported in passwords. In earlier versions of
vCenter Single Sign-On, limitations on supported characters exist.
Note The password policy picks up the maximum length value only if the minimum length is
greater than 20 characters. The behavior of the password policy is undefined or could result
in failure of services when the minimum length value is greater than 20 characters and the
maximum length is set to any value. To avoid a potential problem, leave the minimum length
set to the default value of 8 characters, or no greater than 20 characters.
7 Click Save.
If a user logs in to vsphere.local multiple times with the wrong password, the user is locked out.
The lockout policy allows administrators to specify the maximum number of failed login attempts,
and set the time interval between failures. The policy also specifies how much time must elapse
before the account is automatically unlocked.
Note The lockout policy applies only to user accounts, not to system accounts such as
administrator@vsphere.local.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
You might need to scroll down to see the Lockout Policy row.
Option Description
Maximum number of failed login Maximum number of failed login attempts that are allowed before the
attempts account is locked.
Time interval between failures Time period in which failed login attempts must occur to trigger a lockout.
Unlock time Amount of time that the account remains locked. If you enter 0, the
administrator must unlock the account explicitly.
7 Click Save.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
You might need to scroll down to see the Token Trustworthiness row.
Option Description
Clock Tolerance Time difference, in milliseconds, that vCenter Single Sign-On tolerates
between a client clock and the domain controller clock. If the time difference
is greater than the specified value, vCenter Single Sign-On declares the
token invalid.
Maximum Token Renewal Count Maximum number of times that a token can be renewed. After the maximum
number of renewal attempts, a new security token is required.
Maximum Token Delegation Count Holder-of-key tokens can be delegated to services in the vSphere
environment. A service that uses a delegated token performs the service
on behalf of the principal that provided the token. A token request specifies
a DelegateTo identity. The DelegateTo value can either be a solution token
or a reference to a solution token. This value specifies how many times a
single holder-of-key token can be delegated.
Maximum Bearer Token Lifetime Bearer tokens provide authentication based only on possession of the
token. Bearer tokens are intended for short-term, single-operation use. A
bearer token does not verify the identity of the user or entity that is sending
the request. This value specifies the lifetime value of a bearer token before
the token has to be reissued.
Maximum Holder-of-Key Token Holder-of-key tokens provide authentication based on security artifacts
Lifetime that are embedded in the token. Holder-of-key tokens can be used for
delegation. A client can obtain a holder-of-key token and delegate that
token to another entity. The token contains the claims to identify the
originator and the delegate. In the vSphere environment, a vCenter Server
system obtains delegated tokens on a user's behalf and uses those tokens
to perform operations.
This value determines the lifetime of a holder-of-key token before the token
is marked invalid.
7 Click Save.
Prerequisites
n Enable SSH login to vCenter Server. See Manage vCenter Server from the vCenter Server
Shell.
Procedure
cd /etc/vmware/vsphere-ui
sso.pending.password.expiration.notification.days = 30
The vCenter Single Sign-On administrator user can perform the following tasks.
You can select other domains and view information about the users in those domains, but you
cannot add users to other domains from a vCenter Single Sign-On management interface.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
4 If vsphere.local is not the currently selected domain, select it from the drop-down menu.
The maximum number of characters allowed for the user name is 300.
You cannot change the user name after you create a user. The password must meet the
password policy requirements for the system.
7 (Optional) Enter the first name and the last name of the new user.
9 Click Add.
Results
When you add a user, that user initially has no privileges to perform management operations.
What to do next
Add the user to a group in the vsphere.local domain, for example, to the group of users who
can administer VMCA (CAAdmins) or to the group of users who can administer vCenter Single
Sign-On (Administrators). See Add Members to a vCenter Single Sign-On Group.
Disabled user accounts remain available in the vCenter Single Sign-On system, but the user
cannot log in or perform operations on the server. Users with administrator privileges can disable
and enable accounts from the vCenter Users and Groups page.
Prerequisites
You must be a member of the vCenter Single Sign-On Administrators group to disable and enable
vCenter Single Sign-On users.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
4 Select a user name, click the vertical ellipsis icon, and click Disable.
5 Click OK.
6 To enable the user again, click the vertical ellipsis icon, click Enable, and click OK.
Caution If you delete the administrator user in the vsphere.local domain, you can no longer log
in to vCenter Single Sign-On. Reinstall vCenter Server and its components.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
4 Select Users, and select the vsphere.local domain from the drop-down menu.
5 In the list of users, select the user that you want to delete and click the vertical ellipsis icon.
6 Click Delete.
You can create additional users with the same privileges as administrator@vsphere.local.
vCenter Single Sign-On users are stored in the vCenter Single Sign-On vsphere.local domain.
You can review the vCenter Single Sign-On password policies from the vSphere Client. Log in
as administrator@vsphere.local and from the Administration menu, select Configuration > Local
Accounts > Password Policy.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
4 Click Users.
The password must meet the password policy requirements for the system.
7 Click OK.
You cannot add groups to other domains, for example, the Active Directory domain, from the
vCenter Single Sign-On Groups tab.
If you do not add an identity source to vCenter Single Sign-On, creating groups and adding users
can help you organize the local domain.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
The maximum number of characters allowed for the group name is 300. You cannot change
the group name after you create the group.
6 From the Add Members drop-down menu, select the identity source that contains the
member to add to the group.
If you have configured an external identity provider such as AD FS, the domain of that
identity provider is available to select in the Add Members drop-down menu.
9 Click Add.
What to do next
Groups listed on the Groups tab in the Web interface are part of the vsphere.local domain. See
Groups in the vCenter Single Sign-On Domain.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
5 From the Add Members drop-down menu, select the identity source that contains the
member to add to the group.
If you have configured an external identity provider, such as AD FS, the domain of that
identity provider is available to select in the Add Members drop-down menu.
8 Click Save.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
5 In the list of group members, select the user or group that you want to remove and click the
vertical ellipsis icon.
7 Click Remove.
Results
The user is removed from the group, but is still available in the system.
The vCenter Single Sign-On lockout policy determines when your password expires. By default,
vCenter Single Sign-On passwords expire after 90 days, but administrator passwords such as the
password for administrator@vsphere.local do not expire. vCenter Single Sign-On management
interfaces show a warning when your password is about to expire.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
3 In the upper navigation pane, to the right of the Help menu, click your user name to pull down
the menu.
As an alternative, you can select Single Sign On > Users and Groups and select Edit from the
vertical ellipsis menu.
6 Click Save.
External identity provider federation enables you to use the authentication mechanisms
supported by the external identity provider, including multi-factor authentication.
Smart card authentication allows access only to users who attach a physical card reader to
the computer that they log in to. An example is Common Access Card (CAC) authentication.
The administrator can deploy the PKI so that the smart card certificates are the only client
certificates that the CA issues. For such deployments, only smart card certificates are
presented to the user. The user selects a certificate, and is prompted for a PIN. Only users
who have both the physical card and the PIN that matches the certificate can log in.
For RSA SecurID authentication, your environment must include a correctly configured RSA
Authentication Manager. If the vCenter Server is configured to point to the RSA server, and if
RSA SecurID Authentication is enabled, users can log in with their user name and token.
See the two vSphere Blog posts about RSA SecurID setup for details.
Note vCenter Single Sign-On supports only native SecurID. It does not support RADIUS
authentication.
n For smart card authentication, you can perform the vCenter Single Sign-On setup from the
vSphere Client or by using sso-config. Setup includes enabling smart card authentication
and configuring certificate revocation policies.
n For RSA SecurID, you use the sso-config script to configure RSA Authentication Manager
for the domain, and to enable RSA token authentication. You cannot configure RSA
SecurID authentication from the vSphere Client. However, if you enable RSA SecurID, that
authentication method appears in the vSphere Client.
Note In vSphere 7.0 Update 2 and later, you can enable FIPS on vCenter Server. See the
vSphere Security documentation. RSA SecureID and CAC authentication are not supported when
FIPS is enabled. Use external identity provider federation for MFA authentication. See Configuring
vCenter Server Identity Provider Federation.
Users who log in to a vCenter Server system are prompted to authenticate with a smart card and
PIN combination, as follows.
1 When a user inserts the smart card into the smart card reader, the browser reads the
certificates on the card.
2 The browser prompts the user to select a certificate, then prompts the user for the PIN for
that certificate.
3 vCenter Single Sign-On checks whether the certificate on the smart card is known. If
revocation checking is turned on, vCenter Single Sign-On also checks whether the certificate
is revoked.
4 If the certificate is known to vCenter Single Sign-On, and is not a revoked certificate, the user
is authenticated and can perform tasks for which that the user has permissions.
Note It usually makes sense to leave user name and password authentication enabled during
testing. After testing is complete, deactivate user name and password authentication and
activate smart card authentication. Subsequently, the vSphere Client allows only smart card login.
Only users with root or administrator privileges on the machine can reactivate user name and
password authentication by logging in to the vCenter Server directly.
You can use either the vSphere Client or the sso-config utility to activate the configuration.
You can use either the vSphere Client or the sso-config utility to customize the checking.
The configuration uses port 3128, which is set and opened automatically on vCenter Server (as of
vSphere 7.0 Update 3i).
Prerequisites
Copy the certificate authority (CA) certificates to the vCenter Server system to use to create the
trusted client CA store. This store must contain the trusted certificates issued by the CA for the
client certificate. The client here is the browser from which the smart card process prompts the
end user for information.
Note vCenter Server 7.0 supports the HTTP/2 protocol. All modern browsers and applications,
including the vSphere Client, connect to vCenter Server using HTTP/2. However, smart card
authentication requires use of the HTTP/1.1 protocol. Enabling smart card authentication disables
Application-Layer Protocol Negotiation (ALPN, https://tools.ietf.org/html/rfc7301) for HTTP/2,
effectively preventing the browser from using HTTP/2. Applications that use only HTTP/2,
without relying on ALPN, continue to work.
To complete smart card authentication, clients must be permitted access to port 3128/TCP on
the appropriate vCenter Server. Check your perimeter firewalls to ensure that access has been
granted.
Procedure
2 Create a trusted client CA store on the vCenter Server using the exact path and PEM
name, /usr/lib/vmware-sso/vmware-sts/conf/clienttrustCA.pem.
Warning You must use the exact path and PEM name, /usr/lib/vmware-sso/vmware-sts/
conf/clienttrustCA.pem.
cd /usr/lib/vmware-sso/
b To create the trusted client CA store, run the openssl command, taking as
input your trusted signing certificate. For example, the following command creates
the clienttrustCA.pem file from the xyzCompanySmartCardSigningCA.cer trusted
signing certificate.
You can add additional certificates to the trusted client CA store by running the openssl
command with the ">>" operator to append the additional certificate. For example,
the following command appends xyzCompanySmartCardSigningCA2.cer to the existing
clienttrustCA.pem file.
3 To validate that the contents of the clienttrustCA.pem file contain the trusted CAs that
signed the smart card certificates, run the keytool command.
For example:
4 Verify that the CA names match the Smart Card User Certificate Chain.
The root and intermediate certificates must have matching thumbprints, names, valid dates,
and so on.
Note You can also use the vSphere Client (Single Sign On > Configuration > Smart Card
Configuration > Smart Card Authentication > Trusted CA Certificates).
5 For vSphere versions prior to 7.0 Update 3i, make a backup of the /etc/vmware-
rhttpproxy/config.xml file that includes the reverse proxy definition, open config.xml
in an editor, and make and save the following changes.
<http>
<maxConnections> 2048 </maxConnections>
<requestClientCertificate>true</requestClientCertificate>
<clientCertificateMaxSize>4096</clientCertificateMaxSize>
<clientCAListFile>/usr/lib/vmware-sso/vmware-sts/conf/clienttrustCA.pem</clientCAListFile>
</http>
The config.xml file includes some of these elements. Uncomment, update, or add the
elements as needed.
Note This step is no longer necessary starting with vSphere 7.0 Update 3i.
If smart card authentication is enabled and other authentication methods are disabled, users are
then required to log in using smart card authentication.
If user name and password authentication are disabled, and if problems occur with smart card
authentication, users cannot log in. In that case, a root or administrator user can turn on
user name and password authentication from the vCenter Server command line. The following
command enables user name and password authentication.
Prerequisites
n Verify that an enterprise Public Key Infrastructure (PKI) is set up in your environment, and
that certificates meet the following requirements:
n A User Principal Name (UPN) must correspond to an Active Directory account in the
Subject Alternative Name (SAN) extension.
n The certificate must specify Client Authentication in the Application Policy or Extended
Key Usage field or the browser does not show the certificate.
n Assign the vCenter Server Administrator role to one or more users in the Active Directory
identity source. Those users can then perform management tasks because they can
authenticate and they have vCenter Server administrator privileges.
n Ensure that you have set up the reverse proxy and restarted the physical or virtual machine.
Procedure
1 Obtain the certificates and copy them to a folder that the sso-config utility can see.
shell
chsh -s "/bin/bash" root
csh -s "bin/appliance/sh" root
3 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
5 Under the Identity Provider tab, click Smart Card Authentication, then click Edit.
You can choose smart card authentication by itself, or both smart card authentication and
password and Windows session authentication.
You cannot enable or disable RSA SecurID authentication from this Web interface. However,
if RSA SecurID has been enabled from the command line, the status appears in the Web
interface.
What to do next
n If your OCSP response is issued by a different CA than the signing CA of the smart card,
provide the OCSP signing CA certificate.
n You can configure one or more local OCSP responders for each vCenter Server site in a
multi-site deployment. You can configure these alternative OCSP responders using the CLI.
See Use the Command Line to Manage Smart Card Authentication.
/opt/vmware/bin/sso-config.sh
If user name and password authentication are disabled, and if problems occur with smart card
authentication, users cannot log in. In that case, a root or administrator user can turn on
user name and password authentication from the vCenter Server command line. The following
command enables user name and password authentication.
If you use the default tenant, use vsphere.local as the tenant name.
If you use OCSP for revocation check, you can rely on the default OCSP specified in the smart
card certificate AIA extension. You can also override the default and configure one or more
alternative OCSP responders. For example, you can set up OCSP responders that are local to the
vCenter Single Sign-On site to process the revocation check request.
Note If your certificate does not have OCSP defined, enable CRL (certificate revocation list)
instead.
Prerequisites
n Verify that an enterprise Public Key Infrastructure (PKI) is set up in your environment, and
that certificates meet the following requirements:
n A User Principal Name (UPN) must correspond to an Active Directory account in the
Subject Alternative Name (SAN) extension.
n The certificate must specify Client Authentication in the Application Policy or Extended
Key Usage field or the browser does not show the certificate.
n Assign the vCenter Server Administrator role to one or more users in the Active Directory
identity source. Those users can then perform management tasks because they can
authenticate and they have vCenter Server administrator privileges.
n Ensure that you have set up the reverse proxy and restarted the physical or virtual machine.
Procedure
1 Obtain the certificates and copy them to a folder that the sso-config utility can see.
shell
chsh -s "/bin/bash" root
For example:
Separate multiple certificates with commas, but do not put spaces after the comma.
This allowlist specifies object IDs of policies that are allowed in the certificate's certificate
policy extension. An X509 certificate can have a Certificate Policy extension.
b If the OCSP responder link is not provided by the AIA extension of the certificates,
provide the overriding OCSP responder URL and OCSP authority certificate.
The alternative OCSP is configured for each vCenter Single Sign-On site. You can specify
more than one alternative OCSP responder for your vCenter Single Sign-On site to allow
for failover.
Note The configuration is applied to the current vCenter Single Sign-On site by default.
Specify the siteID parameter only if you configure alternative OCSP for other vCenter
Single Sign-On sites.
c To display the current alternative OCSP responder settings, run this command.
d To remove the current alternative OCSP responder settings, run this command.
You can customize the behavior by using the vSphere Client or by using the sso-config script.
The settings that you select depend in part on what the CA supports.
n If revocation checking is disabled, vCenter Single Sign-On ignores any CRL or OCSP settings.
vCenter Single Sign-On does not perform checks on any certificates.
OCSP only
If the issuing CA supports an OCSP responder, enable OCSP and disable CRL as failover for
OCSP.
CRL only
If the issuing CA does not support OSCP, enable CRL checking and disable OSCP checking.
If the issuing CA supports both an OCSP responder and a CRL, vCenter Single Sign-On checks
the OCSP responder first. If the responder returns an unknown status or is not available,
vCenter Single Sign-On checks the CRL. For this case, enable both OCSP checking and CRL
checking, and enable CRL as failover for OCSP.
n If revocation checking is enabled, advanced users can specify the following additional
settings.
OSCP URL
By default, vCenter Single Sign-On checks the location of the OCSP responder that is defined
in the certificate being validated. If the Authority Information Access extension is absent from
the certificate or if you want to override it, you can explicitly specify a location.
By default, vCenter Single Sign-On checks the location of the CRL that is defined in the
certificate being validated. Disable this option if the CRL Distribution Point extension is absent
from the certificate or if you want to override the default.
CRL location
Use this property if you disable Use CRL from certificate and you want to specify a location
(file or HTTP URL) where the CRL is located.
You can further limit which certificates vCenter Single Sign-On accepts by adding a certificate
policy.
Prerequisites
n Verify that an enterprise Public Key Infrastructure (PKI) is set up in your environment, and
that certificates meet the following requirements:
n A User Principal Name (UPN) must correspond to an Active Directory account in the
Subject Alternative Name (SAN) extension.
n The certificate must specify Client Authentication in the Application Policy or Extended
Key Usage field or the browser does not show the certificate.
n Verify that the vCenter Server certificate is trusted by the end user's workstation. Otherwise,
the browser does not attempt authentication.
n Assign the vCenter Server Administrator role to one or more users in the Active Directory
identity source. Those users can then perform management tasks because they can
authenticate and they have vCenter Server administrator privileges.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
5 Click Certificate revocation and click Edit to enable or disable revocation checking.
6 If certificate policies are in effect in your environment, you can add a policy in the Certificate
policies pane.
See the two vSphere Blog posts about RSA SecurID setup for details.
Note RSA Authentication Manager requires that the user ID is a unique identifier that uses 1 to
255 ASCII characters. The characters ampersand (&), percent (%), greater than (>), less than (<),
and single quote (`) are not allowed.
Prerequisites
n Verify that your environment has a correctly configured RSA Authentication Manager and
that users have RSA tokens. RSA Authentication Manager version 8.0 or later is required.
n Verify that the identity source that RSA Manager uses has been added to vCenter Single
Sign-On. See Add or Edit a vCenter Single Sign-On Identity Source.
n Verify that the RSA Authentication Manager system can resolve the vCenter Server host
name, and that the vCenter Server system can resolve the RSA Authentication Manager host
name.
n Export the sdconf.rec file from the RSA Manager by selecting Access > Authentication
Agents > Generate configuration file. To find sdconf.rec file, decompress the resulting
AM_Config.zip file.
Procedure
/opt/vmware/bin
tenantName is the name of the vCenter Single Sign-On domain, vsphere.local by default.
3 (Optional) To disable other authentication methods, run the following command.
4 To configure the environment so that the tenant at the current site uses the RSA site, run the
following command.
For example:
Option Description
siteID Optional Platform Services Controller site ID. Platform Services Controller
supports one RSA Authentication Manager instance or cluster per site. If you
do not explicitly specify this option, the RSA configuration is for the current
Platform Services Controller site. Use this option only if you are adding a
different site.
sdConfFile Copy of the sdconf.rec file that was downloaded from RSA Manager and
includes configuration information for the RSA Manager, such as the IP
address.
5 (Optional) To change the tenant configuration to nondefault values, run the following
command.
6 (Optional) If your identity source is not using the User Principal Name as the user ID, set
up the identity source userID attribute. (Supported with Active Directory over LDAP identity
sources only.)
The userID attribute determines which LDAP attribute is used as the RSA userID.
For example:
Results
If user name and password authentication is disabled and RSA authentication is enabled, users
must log in with their user name and RSA token. User name and password login is no longer
possible.
You can set a message, disclaimer, or terms and conditions. Also, you can configure the message
to require acknowledgment of the message before login.
Procedure
2 Specify the user name and password for administrator@vsphere.local or another member of
the vCenter Single Sign-On Administrators group.
Option Description
Show login message Toggle on Show login message to enable the login message. You cannot
make changes to the login message unless you toggle on this switch.
Login message Title of the message. By default, when Consent checkbox is toggled on,
the login message text is I agree to Terms and Conditions. You must
replace Terms and Conditions with your own text. If the Consent checkbox
is toggled off, then Login message appears, over which you enter your
message.
Option Description
Consent checkbox Toggle on Consent checkbox to require that the user clicks a check box
before logging in. You can also display a message without a check box.
Details of login message Message that the user sees when clicking the login message, for example,
the text of the terms and conditions. You must enter some details in this text
box.
6 Click Save.
The default vCenter Single Sign-On password policy has a password lifetime of 90 days. After
90 days, the password expires and you can no longer log in. Check the expiration and refresh
passwords in a timely fashion.
Configure NTP
Ensure that all systems use the same relative time source (including the relevant localization
offset), and that the relative time source can be correlated to an agreed-upon time standard
(such as Coordinated Universal Time—UTC). Synchronized systems are essential for vCenter
Single Sign-On certificate validity, and for the validity of other vSphere certificates.
NTP also makes it easier to track an intruder in log files. Incorrect time settings can make it
difficult to inspect and correlate log files to detect attacks, and can make auditing inaccurate.
Problem
vCenter Server and Web Client installers show the error Could not contact Lookup Service.
Please check VM_ssoreg.log....
Cause
This problem has several causes, including unsynchronized clocks on the host machines, firewall
blocking, and services that must be started.
Solution
1 Verify that the clocks on the host machines running vCenter Single Sign-On, vCenter Server,
and the Web Client are synchronized.
The log file contains output from all installation attempts. Locate the last message that shows
Initializing registration provider...
java.net.ConnectException: The IP address or FQDN is incorrect and the vCenter Single Sign-On service
Connection refused: connect has not started or has started within the past minute.
Verify that vCenter Single Sign-On is working by checking the status of
vCenter Single Sign-On vmware-sso daemon.
Restart the service. If restarting does not correct the problem, see the
recovery section of the vSphere Troubleshooting Guide.
Unexpected status code: 404. Restart vCenter Single Sign-On. If restarting does not correct the problem,
SSO Server failed during see the Recovery section of the vSphere Troubleshooting Guide.
initialization
The error shown in the UI begins You also see the return code SslHandshakeFailed. This error indicates that
with Could not connect to vCenter the provided IP address or FQDN that resolves to vCenter Single Sign-On
Single Sign-On host was not the address used when you installed vCenter Single Sign-On.
In the VM_ssoreg.log, find the line that contains the following message.
host name in certificate did not match: <install-configured FQDN or
IP> != <A> or <B> or <C> where A was the FQDN you entered during
the vCenter Single Sign-On installation, and B and C are system-generated
allowable alternatives.
Correct the configuration to use the FQDN on the right of the != sign in
the log file. In most cases, use the FQDN that you specified during vCenter
Single Sign-On installation.
If none of the alternatives are possible in your network configuration,
recover your vCenter Single Sign-On SSL configuration.
Problem
You add an Active Directory identity source to vCenter Single Sign-On, but users cannot log in to
vCenter Server.
Cause
Users use their user name and password to log in to the default domain. For all other domains,
users must include the domain name (user@domain or DOMAIN\user).
Solution
For all vCenter Single Sign-On deployments, you can change the default identity source. After
that change, users can log in to the default identity source with user name and password only.
To configure your Integrated Windows Authentication identity source with a child domain
within your Active Directory forest, see the VMware knowledge base article at http://
kb.vmware.com/kb/2070433. By default, Integrated Windows Authentication uses the root
domain of your Active Directory forest.
If changing the default identity source does not resolve the issue, perform the following
additional troubleshooting steps.
1 Synchronize the clocks between the vCenter Server and the Active Directory domain
controllers.
2 Verify that each domain controller has a pointer record (PTR) in the Active Directory domain
DNS service.
Verify that the PTR record information for the domain controller matches the DNS name of
the controller. When using the vCenter Server, run the following commands to perform the
task:
The relevant addresses are in the answer section, as in the following example:
;; ANSWER SECTION:
_ldap._tcp.my-ad.com. (...) my-controller.my-ad.com
...
b For each domain controller, verify forward and reverse resolution by running the
following command:
# dig my-controller.my-ad.com
The relevant addresses are in the answer section, as in the following example:
;; ANSWER SECTION:
my-controller.my-ad.com (...) IN A controller IP address
...
The relevant addresses are in the answer section, as in the following example:
;; ANSWER SECTION:
IP-in-reverse.in-addr.arpa. (...) IN PTR my-controller.my-ad.com
...
3 If that does not resolve the problem, remove the vCenter Server from the Active Directory
domain and then rejoin the domain. See the vCenter Server Configuration documentation.
4 Close all browser sessions connected to the vCenter Server and restart all services.
Problem
After several failed attempts, you cannot log in to the vSphere Client using vCenter Single Sign-
On. You see the message that your account is locked.
Cause
Solution
u If you attempted log in as a user from the system domain (vsphere.local by default), ask
your vCenter Single Sign-On administrator to unlock your account. If the lock is set to expire
in the lockout policy, you can wait until your account is unlocked. vCenter Single Sign-On
administrators can use CLI commands to unlock your account.
u If you log in as a user from an Active Directory or LDAP domain, ask your Active Directory or
LDAP administrator to unlock your account.
Problem
In certain situations, for example, when your environment includes multiple vCenter Server
instances in different locations, and you make significant changes while one vCenter Server is
unavailable, you do not see replication across VMware Directory Service instances right away.
For example, you do not see a new user that was added to the available vCenter Server instance
in the other instance until replication is complete. Replication might take a long time, depending
on your enhanced linked mode topology.
Cause
During normal operation, changes to a VMware Directory Service (vmdir) instance in one vCenter
Server instance (node) show up in its direct replication partner within about 30 seconds.
Depending on the replication topology, changes in one node might have to propagate through
intermediate nodes before they arrive at each vmdir instance in each node. Information that
is replicated includes user information, certificate information, license information for virtual
machines that are created, cloned, or migrated with VMware vMotion, and more.
When the replication link is broken, for example, because of a network outage or because a node
becomes unavailable, changes in the federation do not converge. After the unavailable node is
restored, each node tries to catch up with all changes. Eventually, all vmdir instances converge
to a consistent state but it might take a while to reach that consistent state if many changes
occurred while one node was unavailable.
Solution
Your environment functions normally while replication happens. Do not attempt to solve the
problem unless it persists for over an hour.
For more information about the API, see vCenter Server Management Programming Guide.
Prerequisites
Procedure
1 From a Web browser, connect to the vCenter Server configuration management interface at
https://vcenter_server_ip:5480.
4 Unless browser settings prevent an immediate download, the support bundle is saved to your
local machine.
Service Description
VMware Endpoint Certificate Store (VECS) VECS service log is located in /var/log/vmware/
vmafdd/vmafdd-syslog.log.