vcf certificates pki tls

Post-Deployment: Certificates

Configure the Microsoft CA in Fleet Manager, generate CSRs for all VCF components, and deploy signed certificates across the stack.

Pre-requisite: Windows AD and ADCS must be deployed. See Windows AD Deployment. Identity & SSO should be configured first — see Post-Deployment: Identity & SSO.


Configure the Certificate Authority

Under Fleet Management → Certificates, select Configure CA:

FieldValue
CA Server URLhttps://winsrv1.pgnet.local/certsrv
User Namesvc-vcf-ca@pgnet.local
PasswordVMware123!VMware123!
Template NameVMware

Do it for both VCF Management and the VCF instance

Generate and Deploy Certificates

For each VCF component, select the TLS Certificate type → ...Generate CSR.

Example parameters for fleet.pgnet.io:

ParameterValue
Common Namefleet.pgnet.io
Organizationpgnet
Organizational UnitPGGB
CountryAustralia
State/ProvinceQueensland
LocalityBrisbane
Email Addressadmin@pgnet.io
Hostfleet.pgnet.io
Subject Alternative Namefleet.pgnet.io
Key Size4096

Workflow

  1. Use SDDC Manager to generate CSRs for SDDC Manager, vCenter, and NSX Manager.
  2. Submit CSRs to the Microsoft CA.
  3. Import the signed certificates back into SDDC Manager.
  4. Execute the Replace Certificates workflow to propagate trust across the stack.

Certificate Status Reference

NameHostnameStatusIssuerExpirationType
Fleet Managementfleet.pgnet.ioActiveMicrosoft CA12 Feb 2028TLS Certificate
VCF Automationpgauto-w2npgActiveSelf Signed CA4 Feb 2028TLS Certificate
VCF Operationsops.pgnet.ioActiveSelf Signed CA4 Feb 2028TLS Certificate

The CA root certificate must also be added to any host computer accessing these devices to avoid browser trust warnings.