Replacing the self-signed SSL certificate on an ESXi 5.5 host

System: VMware ESXi 5.5

- last updated on -

About: The purpose of this document is to provide a step-by-step guide on how one can replace an ESXi's self-signed certificates, which are used to encrypt the management traffic sent over port 443, usually to a vCenter Server.

Work instructions:

Note that it might be a good idea to migrate all of the VMs (even the ones that are shut down) off of the ESXi host for which the certificate will be replaced, as complications with its re-addition to the inventory might mean that the VMs which it used to hold will have to be manually re-registered in vCenter; on a large host, it might not be worth the risk of leaving them in place. This would be done prior to following the below instructions.

________________________________________________________________________________________________________________________ ________________________________________________________________________________________________________________________

Note that this implicit certificate-regenerating approach has likely been made possible due to the ESXi 5.5 Update 3a (the version for which these steps have been put together) having the /sbin/generate-certificates script already configured to output SHA256 certificates. Based on the version of the ESXi installation and/or arguments supplied to the script (normally, no arguments are necessary), your mileage may vary.

References:

  1. http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2015499
  2. http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2076665