SlideShare a Scribd company logo
1 of 40
VMware vSphere Certificate Management for Mere Mortals
Ryan Johnson, VMware, Inc
@tenthirtyam
Adam Eckerle, VMware, Inc
@eck79
vmware.com/go/podcast
INF4529
#INF4529
• This presentation may contain product features that are currently under development.
• This overview of new technology represents no commitment from VMware to deliver these
features in any generally available product.
• Features are subject to change, and must not be included in contracts, purchase orders, or
sales agreements of any kind.
• Technical feasibility and market demand will affect final delivery.
• Pricing and packaging for any new technologies or features discussed or presented have not
been determined.
Disclaimer
2
3
Certificate Lifecycle Management
VMware vSphere 6.0 Solutions for Complete Certificate Lifecycle Management
VMware
Certificate
Authority
VMCA
VMware
Endpoint
Certificate Store
VECS
Located on:
Embedded Deployment, and
Platform Services Controller
Located on:
Embedded Deployment, and
vCenter Management Node
4
VMware Certificate Authority (VMCA)
5
Dual Operational Modes
Root CA
• During installation, VMCA automatically
creates a root CA certificate.
• This certificate is capable of issuing
other certificates.
• All solutions and endpoint
certificates are created and trusted
through to this certificate.
Issuer CA
• Can replace the default root CA
certificate created during installation.
• Requires a CSR issued from VMCA to
be used by an enterprise or 3rd party
CA to generate a new issuing
certificate.
• Requires replacement of all issued
default certificates after
implementation.
VMware Endpoint Certificate Store (VECS)
 Repository for Certificates and Private Keys
 Mandatory Component
(Used even if you don’t sign your certificates with the VMCA… )
 Key Stores:
– Machine SSL Certificates
– Trusted Roots
– Certificate Revocation Lists (CRLs)
– Solution Users Certificates
– Others (e.g. Virtual Volumes)
 Managing VECS is done via vecs-cli
(Or better yet, use the vSphere 6.0 Certificate Manager… coming up in a bit… )
 Does Not Manage Single Sign-On Certificates
6
VMware vSphere 6.0
VECSVMCA
VMware Endpoint Certificate Store (VECS)
7
VMware vSphere 6.0
Signed
VMCA
Certificate
Machine SSL
Certificate
VMware vSphere 6.0 Certificate Types
 ESXi Certificates
 Machine SSL Certificate
 Solution User Certificates
 Single Sign-On Certificates
8
ESXi Certificates
9
VMware vSphere 6.0
 Post-install, ESXi always has an auto-generated
certificate
 VMCA will provision a signed certificate when host is
joined to vCenter (default mode)
 Custom certificates can be use if desired (custom mode)
 ESXi certificates are stored locally on each host in
the /etc/vmware/ssl
 VMCA issued certificates can be renewed via the
vSphere Web Client or PowerCLI
ESXi Certificates
10
VMware vSphere 6.0
Example:
function refreshcerts {
process {
$hostid = Get-VMHost $vmhost | Get-View
$hostParam = New-Object VMware.Vim.ManagedObjectReference[] (1)
$hostParam[0] = New-Object VMware.Vim.ManagedObjectReference
$hostParam[0].value = $hostid.moref.value
$hostParam[0].type = 'HostSystem'
$_this = Get-View -Id 'CertificateManager-certificateManager'
$_this.CertMgrRefreshCertificates_Task($hostParam)
}
}
Machine SSL Certificates
 Creates a server-side SSL socket
 Server verification and secure communication
e.g. HTTPS or LDAPS
 Each node has its own Machine SSL Certificate.
i.e. Embedded Deployment; Management Node; or Platform Services Controller
 All services use a Machine SSL Certificate for endpoint encryption.
 All services communicate through the reverse proxy
 Traffic does not go to the services themselves
e.g. The vpxd service uses the MACHINE_SSL_CERT to expose its endpoint.
11
VMware vSphere 6.0
Solution User Certificate
Certificate stores are located in VECS on each management node and
embedded deployment:
 machine – Used by component manager, license server, and the
logging service
 vpxd – vCenter service daemon (vpxd) store on management nodes
and embedded deployments. vpxd uses the solution user certificate
to authenticate to vCenter Single Sign-On
 vpxd-extensions – Includes the Auto Deploy service, inventory
service, and other services that are not part of other solution users
 vsphere-webclient – Includes the vSphere Web Client and some
additional services such as the performance chart service
12
VMware vSphere 6.0 – More Services but Consolidated Behind Solution Users that Hold the Certificate
Solution User Certificates
 Encapsulates one or more vCenter Server services
 Certificate authenticated by vCenter Single Sign-On
and issued a SAML token to authenticate to other
solution user and services
 Each solution user must be authenticated to vCenter
Single Sign-On
 Re-authentication occurs after a reboot and after a
timeout
 The timeout configurable in the vSphere Web Client
and defaults to 2592000 seconds (30 days)
Maximum Holder-of-Key Token Lifetime
13
VMware vSphere 6.0
30 DAYS
Single Sign-On Certificates
VMware Directory Service SSL Certificate –
 With custom certificates you may need to replace this SSL
certificate explicitly.
VMware vCenter Single Sign-On Signing Certificate –
 Security Token Service (STS) – an identity provider that
issues, validates, and renews SAML tokens that are used for
authentication throughout vSphere
 By default, the STS signing certificate is generated by VMCA
 Manually refresh STS certificate via vSphere Web Client when
the certificate expires or changes
14
VMware vSphere 6.0
Single Sign-On Certificates
 Not stored in VECS.
 Not managed with certificate management tools.
 Changes are not necessary, but in special situations,
you can replace these certificates.
15
Remember…
VMware vSphere 6.0 Certificates
16
Summary
Certificate Type Provisioning Storage
ESXi Certificates VMCA (Default) Locally on ESXi Hosts
Machine SSL Certificates VMCA (Default) VECS
Solution User Certificates VMCA (Default) VECS
Single Sign-On Certificates Provisioned During Installation Manage in vSphere Web Client.
Directory Service Certificates Provisioned During Installation In certain custom certificate
corner cases, you may need to
replace this certificate.
Certificate Replacement Options
17
VMware vCenter Server 6.0
VMCA
as Root CA
VMCA
as Enterprise CA
Subordinate
Custom CA Hybrid
VMware vSphere 6.0 Certificate Manager
18
Let’s Make Certificate Replacement Simple
Appliance Deployment
/usr/lib/vmware-vmca/
bin/certificate-manager
Windows Deployment
<Drive>:Program FilesVMware
vCenter Servervmcad
certificate-manager
Common Certificate Manager Use Cases
19
VMCA
as Root CA
(Default or
Option 4)
VMCA
as Enterprise
CA
Subordinate
(Option 2)
Custom CA
(Option 1 & 5)
Hybrid
(Combination)
VMCA as Root CA
20
VMware KB 2108294
VMCA as Enterprise CA Subordinate
Private Key Algorithm: RSA with 2048 bits.
Standard: X.509 v3
Format: PEM (PKCS8 and PKCS1) with a header of ---BEGIN CERTIFICATE---
Recommended Signature Algorithms: SHA256, SHA384, or SHA512
 Does NOT support wildcard cards or SubjectAltName
 You CANNOT create subsidiary CAs of VMCA.
 No explicit limit to the length of the certificate chain.
 Synchronize time for all nodes in environment.
21
Requirements
VMCA as Enterprise CA Subordinate
 Create and publish custom Subordinate Certificate Authority template per KB 2112009
 Generate Certificate Signing Request and Key in Certificate Manager with Option 2
 On VCSA run chsh –s /bin/bash root to enable WinSCP file transfers.
 Submit Certificate Signing Request – root_signing_cert.csr – to Enterprise Certificate Authority
 Create the Full Certificate Chain – root_signing_chain.pem
 Import the Full Certificate Chain and Key to Replace VMCA Root Signing Certificate in Certificate Manager with Option 2
 Configure certool.cfg with proper values.
 Restart vCenter Services on Connected vCenter to Reflect the Change
 service-control –stop | --start –all
 Replace Machine SSL Certificate with VMCA Certificate on Connected vCenter(s) with Option 3
 Provide the FQDN or IP of Platform Service Controller
 Configure certool.cfg with proper values.
 Replace Solution User Certificates with VMCA Certificates on Connected vCenter(s) with Option 6
 Provide the FQDN or IP of Platform Service Controller
22
Workflow
Demo Time
VMCA as Enterprise CA Subordinate:
Certificate Replacement
VECSVMCA
Demo Scenario
VMCA
Signing Certificate
Machine SSL
Certificate
Root CA
Certificate
Enterprise CA
Certificate
Microsoft Enterprise
Certificate Authority
mgmt01dc01.sddc.local vSphere 6 Platform Services Controller
mgmt01psc01.sddc.local
Signed Signed Signed
VECS
Machine SSL
Solution Users
Certificates
vCenter 6 Server
mgmt01vc01.sddc.local
24
ESXi Certificate Management Modes
25
VMware ESXi 6.0
VMCA
Authority
Mode
Custom
Mode
Thumbprint
Mode
26
Default Value = vmca
Possible Values = vmca | custom | thumbprint
Search for certmgmt
VMCA Authority Mode
 The default mode
 Post-install ESXi always has an auto-generated certificate
 ESXi certificates are stored locally on each host in the /etc/vmware/ssl
 VMCA provisions the host a signed certificate when added to vCenter Server
 Host certificates include the full chain to VMCA
 ESXi certificates can be renewed via the vSphere Web Client or PowerCLI
vpxd.certmgmt.mode = vmca
 24 Hour Rule – VMCA as Enterprise CA Subordinate
 Signing certificate must have a valid date of 24 hours prior before renewing host certificates or
adding new hosts to vCenter
 Plan for this aging period when configuring an environment
 Replace certificates prior to putting an environment into production
27
Custom Mode
 Replacement is the same as vSphere 5.5
– ESXi Shell
– HTTPS GET/PUT
 vifs will wrap these operations.
 Custom / 3rd Party certificates
– Must change vpxd.certmgmt.mode to custom or risk replacement by VMCA
– Must update TRUSTED_ROOTS store in VECS on vCenter with the custom root certificates to
ensure trust relationship – use the vecs-cli entry create command
vpxd.certmgmt.mode = custom
28
Thumbprint Mode
 Legacy mode
 Fallback option for vSphere 6.0
 May be used to retains vSphere 5.5 certificates during an upgrade
 DO NOT use this mode unless encountering issues with vmca or custom mode
 vCenter 6.0 and later services may not work correctly in thumbprint mode
 Switching from thumbprint to vmca mode requires extensive planning
29
vpxd.certmgmt.mode = thumbprint
Demo Time
VMCA as Enterprise CA Subordinate:
ESXi Certificate Replacement
VECSVMCA
Demo Scenario
31
VMCA
Signing Certificate
Machine SSL
Certificate
Root CA
Certificate
Enterprise CA
Certificate
Microsoft Enterprise
Certificate Authority
mgmt01dc01.sddc.local vSphere 6 Platform Services Controller
mgmt01psc01.sddc.local
Signed Signed Signed
VECS
Machine SSL
Solution Users
Certificates
vCenter 6 Server
mgmt01vc01.sddc.local
/etc/vmware/ssl/
ESXi Certificate
ESXi 6.0 Host
mgmt01esx01.sddc.local
Signed
Upgrades and Operational
Considerations
VMware vSphere 6.0 Certificate Management
Deployment Considerations
 VMCA as Enterprise CA Subordinate
– Perform the signing certificate replacement on all Platform Services Controllers to
ensure trusted certificates for all vCenter Server 6.0 installations
• Remember the ‘24 Hour Rule’
– Signing certificate must have a valid date of 24 hours prior before renewing host
certificates or adding new hosts to vCenter
– Plan for this aging period when configuring an existing environment
– Replace certificates prior to putting a new environment into production
33
VMware vSphere 6.0
Managing Certificates
• Supports replacing certificates
• No CRL enforcement against PKI for vCenter Server and ESXi hosts
• If you suspect that one of your certificates has been compromised, revoke and
replace all existing certificates, including the VMCA root certificate
• If you do not remove revoked certificates, a man-in-the-middle attack might
enable compromise through impersonation with the account's credentials.
34
VMware vSphere 6.0
Upgrades & Auto Deploy
 Host Upgrades and VMCA Signed Certificates
– Upgrade process replaces self-signed certificates with VMCA-signed certificates
– vCenter then monitors certificates and displays details vSphere Web Client
 Host Upgrades and Custom Certificates
– Custom certificates are retained – even if expired or invalid
– Change vxd.certmgmt.mode to custom to ensure certificates are not replaced accidentally
 Update Manager
– Not compatible with the Machine SSL certificate template in vSphere 6.0.
 Use the vSphere 5.5 certificate template for Update Manager 6.0
35
A Call to Action
Determine the Best Approach for Your Organization.
VMCA
as Root CA
(Default or
Option 4)
VMCA
as Enterprise
CA
Subordinate
(Option 2)
Custom CA
(Option 1 & 5)
Hybrid
(Combination)
36
CONFIDENTIAL 37vmware.com/go/inf4529
Ryan Johnson
Senior Technical Marketing Manager
@tenthirtyam
Adam Eckerle
Technical Account Manager
@eck79
vmware.com/go/podcast
VMware vSphere Certificate Management for Mere Mortals
Ryan Johnson, VMware, Inc
@tenthirtyam
Adam Eckerle, VMware, Inc
@eck79
vmware.com/go/podcast
INF4529
#INF4529

More Related Content

What's hot

[오픈소스컨설팅] 스카우터 사용자 가이드 2020
[오픈소스컨설팅] 스카우터 사용자 가이드 2020[오픈소스컨설팅] 스카우터 사용자 가이드 2020
[오픈소스컨설팅] 스카우터 사용자 가이드 2020Ji-Woong Choi
 
VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2Vepsun Technologies
 
What’s New in VMware vSphere 7?
What’s New in VMware vSphere 7?What’s New in VMware vSphere 7?
What’s New in VMware vSphere 7?Insight
 
Build automated Machine Images using Packer
Build automated Machine Images using PackerBuild automated Machine Images using Packer
Build automated Machine Images using PackerMarek Piątek
 
DevOps avec Ansible et Docker
DevOps avec Ansible et DockerDevOps avec Ansible et Docker
DevOps avec Ansible et DockerStephane Manciot
 
VMworld 2017 vSAN Network Design
VMworld 2017 vSAN Network Design VMworld 2017 vSAN Network Design
VMworld 2017 vSAN Network Design Cormac Hogan
 
Esxi troubleshooting
Esxi troubleshootingEsxi troubleshooting
Esxi troubleshootingOvi Chis
 
VMware Outlines Its Own Journey to the Cloud
VMware Outlines Its Own Journey to the CloudVMware Outlines Its Own Journey to the Cloud
VMware Outlines Its Own Journey to the CloudVMware
 
KB국민은행은 시작했다 -  쉽고 빠른 클라우드 거버넌스 적용 전략 - 강병억 AWS 솔루션즈 아키텍트 / 장강홍 클라우드플랫폼단 차장, ...
KB국민은행은 시작했다 -  쉽고 빠른 클라우드 거버넌스 적용 전략 - 강병억 AWS 솔루션즈 아키텍트 / 장강홍 클라우드플랫폼단 차장, ...KB국민은행은 시작했다 -  쉽고 빠른 클라우드 거버넌스 적용 전략 - 강병억 AWS 솔루션즈 아키텍트 / 장강홍 클라우드플랫폼단 차장, ...
KB국민은행은 시작했다 -  쉽고 빠른 클라우드 거버넌스 적용 전략 - 강병억 AWS 솔루션즈 아키텍트 / 장강홍 클라우드플랫폼단 차장, ...Amazon Web Services Korea
 
클라우드 네이티브로 가는길 - AWS 컨테이너 서비스 파헤치기 - 최진영 AWS 테크니컬 트레이너 / 배주혁 소프트웨어 엔지니어, 삼성전자...
클라우드 네이티브로 가는길 - AWS 컨테이너 서비스 파헤치기 - 최진영 AWS 테크니컬 트레이너 / 배주혁 소프트웨어 엔지니어, 삼성전자...클라우드 네이티브로 가는길 - AWS 컨테이너 서비스 파헤치기 - 최진영 AWS 테크니컬 트레이너 / 배주혁 소프트웨어 엔지니어, 삼성전자...
클라우드 네이티브로 가는길 - AWS 컨테이너 서비스 파헤치기 - 최진영 AWS 테크니컬 트레이너 / 배주혁 소프트웨어 엔지니어, 삼성전자...Amazon Web Services Korea
 
How Netflix Tunes Amazon EC2 Instances for Performance - CMP325 - re:Invent 2017
How Netflix Tunes Amazon EC2 Instances for Performance - CMP325 - re:Invent 2017How Netflix Tunes Amazon EC2 Instances for Performance - CMP325 - re:Invent 2017
How Netflix Tunes Amazon EC2 Instances for Performance - CMP325 - re:Invent 2017Amazon Web Services
 
VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5Vepsun Technologies
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1Sanjeev Kumar
 
VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3Vepsun Technologies
 

What's hot (20)

VMware
VMware VMware
VMware
 
Virtualization
VirtualizationVirtualization
Virtualization
 
[오픈소스컨설팅] 스카우터 사용자 가이드 2020
[오픈소스컨설팅] 스카우터 사용자 가이드 2020[오픈소스컨설팅] 스카우터 사용자 가이드 2020
[오픈소스컨설팅] 스카우터 사용자 가이드 2020
 
VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2
 
Commvault Story - CVTSP_1.pptx
Commvault Story - CVTSP_1.pptxCommvault Story - CVTSP_1.pptx
Commvault Story - CVTSP_1.pptx
 
What’s New in VMware vSphere 7?
What’s New in VMware vSphere 7?What’s New in VMware vSphere 7?
What’s New in VMware vSphere 7?
 
Build automated Machine Images using Packer
Build automated Machine Images using PackerBuild automated Machine Images using Packer
Build automated Machine Images using Packer
 
DevOps avec Ansible et Docker
DevOps avec Ansible et DockerDevOps avec Ansible et Docker
DevOps avec Ansible et Docker
 
VMworld 2017 vSAN Network Design
VMworld 2017 vSAN Network Design VMworld 2017 vSAN Network Design
VMworld 2017 vSAN Network Design
 
Esxi troubleshooting
Esxi troubleshootingEsxi troubleshooting
Esxi troubleshooting
 
VMware Outlines Its Own Journey to the Cloud
VMware Outlines Its Own Journey to the CloudVMware Outlines Its Own Journey to the Cloud
VMware Outlines Its Own Journey to the Cloud
 
KB국민은행은 시작했다 -  쉽고 빠른 클라우드 거버넌스 적용 전략 - 강병억 AWS 솔루션즈 아키텍트 / 장강홍 클라우드플랫폼단 차장, ...
KB국민은행은 시작했다 -  쉽고 빠른 클라우드 거버넌스 적용 전략 - 강병억 AWS 솔루션즈 아키텍트 / 장강홍 클라우드플랫폼단 차장, ...KB국민은행은 시작했다 -  쉽고 빠른 클라우드 거버넌스 적용 전략 - 강병억 AWS 솔루션즈 아키텍트 / 장강홍 클라우드플랫폼단 차장, ...
KB국민은행은 시작했다 -  쉽고 빠른 클라우드 거버넌스 적용 전략 - 강병억 AWS 솔루션즈 아키텍트 / 장강홍 클라우드플랫폼단 차장, ...
 
클라우드 네이티브로 가는길 - AWS 컨테이너 서비스 파헤치기 - 최진영 AWS 테크니컬 트레이너 / 배주혁 소프트웨어 엔지니어, 삼성전자...
클라우드 네이티브로 가는길 - AWS 컨테이너 서비스 파헤치기 - 최진영 AWS 테크니컬 트레이너 / 배주혁 소프트웨어 엔지니어, 삼성전자...클라우드 네이티브로 가는길 - AWS 컨테이너 서비스 파헤치기 - 최진영 AWS 테크니컬 트레이너 / 배주혁 소프트웨어 엔지니어, 삼성전자...
클라우드 네이티브로 가는길 - AWS 컨테이너 서비스 파헤치기 - 최진영 AWS 테크니컬 트레이너 / 배주혁 소프트웨어 엔지니어, 삼성전자...
 
How Netflix Tunes Amazon EC2 Instances for Performance - CMP325 - re:Invent 2017
How Netflix Tunes Amazon EC2 Instances for Performance - CMP325 - re:Invent 2017How Netflix Tunes Amazon EC2 Instances for Performance - CMP325 - re:Invent 2017
How Netflix Tunes Amazon EC2 Instances for Performance - CMP325 - re:Invent 2017
 
SCCM 2012 Presentation
SCCM 2012 PresentationSCCM 2012 Presentation
SCCM 2012 Presentation
 
VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1
 
Vagrant
Vagrant Vagrant
Vagrant
 
VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
 

Viewers also liked (7)

RAID and Storage Arrays
RAID and Storage ArraysRAID and Storage Arrays
RAID and Storage Arrays
 
VTSP Foundation 2016
VTSP Foundation 2016VTSP Foundation 2016
VTSP Foundation 2016
 
VMware VTSP SV presentation
VMware VTSP SV presentationVMware VTSP SV presentation
VMware VTSP SV presentation
 
Raid(redundant array of independent disks).
Raid(redundant array of independent disks).Raid(redundant array of independent disks).
Raid(redundant array of independent disks).
 
VXLAN Practice Guide
VXLAN Practice GuideVXLAN Practice Guide
VXLAN Practice Guide
 
RAID CONCEPT
RAID CONCEPTRAID CONCEPT
RAID CONCEPT
 
RAID
RAIDRAID
RAID
 

Similar to VMworld 2015: VMware vSphere Certificate Management for Mere Mortals

Nashville VMUG Keynote April 8 2015 - vSphere 6
Nashville VMUG Keynote April 8 2015 - vSphere 6Nashville VMUG Keynote April 8 2015 - vSphere 6
Nashville VMUG Keynote April 8 2015 - vSphere 6Adam Eckerle
 
Cisco SDWAN - Components Deployment Workflow
Cisco SDWAN - Components Deployment WorkflowCisco SDWAN - Components Deployment Workflow
Cisco SDWAN - Components Deployment WorkflowFarooq Khan
 
IBM MQ Security Deep Dive
IBM MQ Security Deep DiveIBM MQ Security Deep Dive
IBM MQ Security Deep DiveIBM Systems UKI
 
vCenter Server 5.5 Single Sign-On VMDir deep dive
vCenter Server 5.5 Single Sign-On VMDir deep divevCenter Server 5.5 Single Sign-On VMDir deep dive
vCenter Server 5.5 Single Sign-On VMDir deep divefbuechsel
 
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...VMworld
 
Web server hardware and software
Web server hardware and softwareWeb server hardware and software
Web server hardware and softwareSaquib Suhail
 
VMworld 2013: PowerCLI What’s New? Administrating with the CLI Was Never Easier
VMworld 2013: PowerCLI What’s New? Administrating with the CLI Was Never Easier VMworld 2013: PowerCLI What’s New? Administrating with the CLI Was Never Easier
VMworld 2013: PowerCLI What’s New? Administrating with the CLI Was Never Easier VMworld
 
vmware-certification-tracks-diagram.pdf
vmware-certification-tracks-diagram.pdfvmware-certification-tracks-diagram.pdf
vmware-certification-tracks-diagram.pdfGnanaKumarBitra1
 
VMware Certified Professional 5 - Data Center Virtualization Delta Exam
VMware Certified Professional 5 - Data Center Virtualization Delta ExamVMware Certified Professional 5 - Data Center Virtualization Delta Exam
VMware Certified Professional 5 - Data Center Virtualization Delta ExamArchana Parameshwari
 
VMworld 2014: vCenter Server Architecture and Deployment Deep Dive
VMworld 2014: vCenter Server Architecture and Deployment Deep DiveVMworld 2014: vCenter Server Architecture and Deployment Deep Dive
VMworld 2014: vCenter Server Architecture and Deployment Deep DiveVMworld
 
Upgrading to VMware vSphere 6.0
Upgrading to VMware vSphere 6.0Upgrading to VMware vSphere 6.0
Upgrading to VMware vSphere 6.0Tim Carman
 
vsphere-esxi-vcenter-sesecurity-guide.pdf
vsphere-esxi-vcenter-sesecurity-guide.pdfvsphere-esxi-vcenter-sesecurity-guide.pdf
vsphere-esxi-vcenter-sesecurity-guide.pdfhokismen
 
VMworld Europe 2014: Built to be Extended - vCloud Automation Center
VMworld Europe 2014: Built to be Extended - vCloud Automation CenterVMworld Europe 2014: Built to be Extended - vCloud Automation Center
VMworld Europe 2014: Built to be Extended - vCloud Automation CenterVMworld
 
Presentation v mware v-cloud director overview
Presentation   v mware v-cloud director overviewPresentation   v mware v-cloud director overview
Presentation v mware v-cloud director overviewsolarisyourep
 
VMware vCloud Director Technisch Overzicht
VMware vCloud Director Technisch OverzichtVMware vCloud Director Technisch Overzicht
VMware vCloud Director Technisch OverzichtArjan Hendriks
 
VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC
VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC
VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC VMworld
 
System Center 2012 for VMware Infrastructure
System Center 2012 for VMware InfrastructureSystem Center 2012 for VMware Infrastructure
System Center 2012 for VMware InfrastructureBryan Dady
 

Similar to VMworld 2015: VMware vSphere Certificate Management for Mere Mortals (20)

Nashville VMUG Keynote April 8 2015 - vSphere 6
Nashville VMUG Keynote April 8 2015 - vSphere 6Nashville VMUG Keynote April 8 2015 - vSphere 6
Nashville VMUG Keynote April 8 2015 - vSphere 6
 
Cisco SDWAN - Components Deployment Workflow
Cisco SDWAN - Components Deployment WorkflowCisco SDWAN - Components Deployment Workflow
Cisco SDWAN - Components Deployment Workflow
 
IBM MQ Security Deep Dive
IBM MQ Security Deep DiveIBM MQ Security Deep Dive
IBM MQ Security Deep Dive
 
vCenter Server 5.5 Single Sign-On VMDir deep dive
vCenter Server 5.5 Single Sign-On VMDir deep divevCenter Server 5.5 Single Sign-On VMDir deep dive
vCenter Server 5.5 Single Sign-On VMDir deep dive
 
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...
 
Web server hardware and software
Web server hardware and softwareWeb server hardware and software
Web server hardware and software
 
VMworld 2013: PowerCLI What’s New? Administrating with the CLI Was Never Easier
VMworld 2013: PowerCLI What’s New? Administrating with the CLI Was Never Easier VMworld 2013: PowerCLI What’s New? Administrating with the CLI Was Never Easier
VMworld 2013: PowerCLI What’s New? Administrating with the CLI Was Never Easier
 
vmware-certification-tracks-diagram.pdf
vmware-certification-tracks-diagram.pdfvmware-certification-tracks-diagram.pdf
vmware-certification-tracks-diagram.pdf
 
VMware Certified Professional 5 - Data Center Virtualization Delta Exam
VMware Certified Professional 5 - Data Center Virtualization Delta ExamVMware Certified Professional 5 - Data Center Virtualization Delta Exam
VMware Certified Professional 5 - Data Center Virtualization Delta Exam
 
IBM MQ V8 Security
IBM MQ V8 SecurityIBM MQ V8 Security
IBM MQ V8 Security
 
VMworld 2014: vCenter Server Architecture and Deployment Deep Dive
VMworld 2014: vCenter Server Architecture and Deployment Deep DiveVMworld 2014: vCenter Server Architecture and Deployment Deep Dive
VMworld 2014: vCenter Server Architecture and Deployment Deep Dive
 
Upgrading to VMware vSphere 6.0
Upgrading to VMware vSphere 6.0Upgrading to VMware vSphere 6.0
Upgrading to VMware vSphere 6.0
 
Vma 40 guide
Vma 40 guideVma 40 guide
Vma 40 guide
 
vsphere-esxi-vcenter-sesecurity-guide.pdf
vsphere-esxi-vcenter-sesecurity-guide.pdfvsphere-esxi-vcenter-sesecurity-guide.pdf
vsphere-esxi-vcenter-sesecurity-guide.pdf
 
vmware_ports.pdf
vmware_ports.pdfvmware_ports.pdf
vmware_ports.pdf
 
VMworld Europe 2014: Built to be Extended - vCloud Automation Center
VMworld Europe 2014: Built to be Extended - vCloud Automation CenterVMworld Europe 2014: Built to be Extended - vCloud Automation Center
VMworld Europe 2014: Built to be Extended - vCloud Automation Center
 
Presentation v mware v-cloud director overview
Presentation   v mware v-cloud director overviewPresentation   v mware v-cloud director overview
Presentation v mware v-cloud director overview
 
VMware vCloud Director Technisch Overzicht
VMware vCloud Director Technisch OverzichtVMware vCloud Director Technisch Overzicht
VMware vCloud Director Technisch Overzicht
 
VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC
VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC
VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC
 
System Center 2012 for VMware Infrastructure
System Center 2012 for VMware InfrastructureSystem Center 2012 for VMware Infrastructure
System Center 2012 for VMware Infrastructure
 

More from VMworld

VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld
 
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld
 
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld
 
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld
 
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld
 
VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld
 
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld
 
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld
 
VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld
 
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld
 
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld
 
VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld
 
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld
 
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld
 
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld
 
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld
 
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld
 

More from VMworld (20)

VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep Dive
 
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for Horizon
 
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSX
 
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
 
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
 
VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7
 
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep Dive
 
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
 
VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations!
 
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
 
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts Panel
 
VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way!
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphere
 
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!
 
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
 
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SAN
 
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

VMworld 2015: VMware vSphere Certificate Management for Mere Mortals

  • 1. VMware vSphere Certificate Management for Mere Mortals Ryan Johnson, VMware, Inc @tenthirtyam Adam Eckerle, VMware, Inc @eck79 vmware.com/go/podcast INF4529 #INF4529
  • 2. • This presentation may contain product features that are currently under development. • This overview of new technology represents no commitment from VMware to deliver these features in any generally available product. • Features are subject to change, and must not be included in contracts, purchase orders, or sales agreements of any kind. • Technical feasibility and market demand will affect final delivery. • Pricing and packaging for any new technologies or features discussed or presented have not been determined. Disclaimer 2
  • 3. 3
  • 4. Certificate Lifecycle Management VMware vSphere 6.0 Solutions for Complete Certificate Lifecycle Management VMware Certificate Authority VMCA VMware Endpoint Certificate Store VECS Located on: Embedded Deployment, and Platform Services Controller Located on: Embedded Deployment, and vCenter Management Node 4
  • 5. VMware Certificate Authority (VMCA) 5 Dual Operational Modes Root CA • During installation, VMCA automatically creates a root CA certificate. • This certificate is capable of issuing other certificates. • All solutions and endpoint certificates are created and trusted through to this certificate. Issuer CA • Can replace the default root CA certificate created during installation. • Requires a CSR issued from VMCA to be used by an enterprise or 3rd party CA to generate a new issuing certificate. • Requires replacement of all issued default certificates after implementation.
  • 6. VMware Endpoint Certificate Store (VECS)  Repository for Certificates and Private Keys  Mandatory Component (Used even if you don’t sign your certificates with the VMCA… )  Key Stores: – Machine SSL Certificates – Trusted Roots – Certificate Revocation Lists (CRLs) – Solution Users Certificates – Others (e.g. Virtual Volumes)  Managing VECS is done via vecs-cli (Or better yet, use the vSphere 6.0 Certificate Manager… coming up in a bit… )  Does Not Manage Single Sign-On Certificates 6 VMware vSphere 6.0
  • 7. VECSVMCA VMware Endpoint Certificate Store (VECS) 7 VMware vSphere 6.0 Signed VMCA Certificate Machine SSL Certificate
  • 8. VMware vSphere 6.0 Certificate Types  ESXi Certificates  Machine SSL Certificate  Solution User Certificates  Single Sign-On Certificates 8
  • 9. ESXi Certificates 9 VMware vSphere 6.0  Post-install, ESXi always has an auto-generated certificate  VMCA will provision a signed certificate when host is joined to vCenter (default mode)  Custom certificates can be use if desired (custom mode)  ESXi certificates are stored locally on each host in the /etc/vmware/ssl  VMCA issued certificates can be renewed via the vSphere Web Client or PowerCLI
  • 10. ESXi Certificates 10 VMware vSphere 6.0 Example: function refreshcerts { process { $hostid = Get-VMHost $vmhost | Get-View $hostParam = New-Object VMware.Vim.ManagedObjectReference[] (1) $hostParam[0] = New-Object VMware.Vim.ManagedObjectReference $hostParam[0].value = $hostid.moref.value $hostParam[0].type = 'HostSystem' $_this = Get-View -Id 'CertificateManager-certificateManager' $_this.CertMgrRefreshCertificates_Task($hostParam) } }
  • 11. Machine SSL Certificates  Creates a server-side SSL socket  Server verification and secure communication e.g. HTTPS or LDAPS  Each node has its own Machine SSL Certificate. i.e. Embedded Deployment; Management Node; or Platform Services Controller  All services use a Machine SSL Certificate for endpoint encryption.  All services communicate through the reverse proxy  Traffic does not go to the services themselves e.g. The vpxd service uses the MACHINE_SSL_CERT to expose its endpoint. 11 VMware vSphere 6.0
  • 12. Solution User Certificate Certificate stores are located in VECS on each management node and embedded deployment:  machine – Used by component manager, license server, and the logging service  vpxd – vCenter service daemon (vpxd) store on management nodes and embedded deployments. vpxd uses the solution user certificate to authenticate to vCenter Single Sign-On  vpxd-extensions – Includes the Auto Deploy service, inventory service, and other services that are not part of other solution users  vsphere-webclient – Includes the vSphere Web Client and some additional services such as the performance chart service 12 VMware vSphere 6.0 – More Services but Consolidated Behind Solution Users that Hold the Certificate
  • 13. Solution User Certificates  Encapsulates one or more vCenter Server services  Certificate authenticated by vCenter Single Sign-On and issued a SAML token to authenticate to other solution user and services  Each solution user must be authenticated to vCenter Single Sign-On  Re-authentication occurs after a reboot and after a timeout  The timeout configurable in the vSphere Web Client and defaults to 2592000 seconds (30 days) Maximum Holder-of-Key Token Lifetime 13 VMware vSphere 6.0 30 DAYS
  • 14. Single Sign-On Certificates VMware Directory Service SSL Certificate –  With custom certificates you may need to replace this SSL certificate explicitly. VMware vCenter Single Sign-On Signing Certificate –  Security Token Service (STS) – an identity provider that issues, validates, and renews SAML tokens that are used for authentication throughout vSphere  By default, the STS signing certificate is generated by VMCA  Manually refresh STS certificate via vSphere Web Client when the certificate expires or changes 14 VMware vSphere 6.0
  • 15. Single Sign-On Certificates  Not stored in VECS.  Not managed with certificate management tools.  Changes are not necessary, but in special situations, you can replace these certificates. 15 Remember…
  • 16. VMware vSphere 6.0 Certificates 16 Summary Certificate Type Provisioning Storage ESXi Certificates VMCA (Default) Locally on ESXi Hosts Machine SSL Certificates VMCA (Default) VECS Solution User Certificates VMCA (Default) VECS Single Sign-On Certificates Provisioned During Installation Manage in vSphere Web Client. Directory Service Certificates Provisioned During Installation In certain custom certificate corner cases, you may need to replace this certificate.
  • 17. Certificate Replacement Options 17 VMware vCenter Server 6.0 VMCA as Root CA VMCA as Enterprise CA Subordinate Custom CA Hybrid
  • 18. VMware vSphere 6.0 Certificate Manager 18 Let’s Make Certificate Replacement Simple Appliance Deployment /usr/lib/vmware-vmca/ bin/certificate-manager Windows Deployment <Drive>:Program FilesVMware vCenter Servervmcad certificate-manager
  • 19. Common Certificate Manager Use Cases 19 VMCA as Root CA (Default or Option 4) VMCA as Enterprise CA Subordinate (Option 2) Custom CA (Option 1 & 5) Hybrid (Combination)
  • 20. VMCA as Root CA 20 VMware KB 2108294
  • 21. VMCA as Enterprise CA Subordinate Private Key Algorithm: RSA with 2048 bits. Standard: X.509 v3 Format: PEM (PKCS8 and PKCS1) with a header of ---BEGIN CERTIFICATE--- Recommended Signature Algorithms: SHA256, SHA384, or SHA512  Does NOT support wildcard cards or SubjectAltName  You CANNOT create subsidiary CAs of VMCA.  No explicit limit to the length of the certificate chain.  Synchronize time for all nodes in environment. 21 Requirements
  • 22. VMCA as Enterprise CA Subordinate  Create and publish custom Subordinate Certificate Authority template per KB 2112009  Generate Certificate Signing Request and Key in Certificate Manager with Option 2  On VCSA run chsh –s /bin/bash root to enable WinSCP file transfers.  Submit Certificate Signing Request – root_signing_cert.csr – to Enterprise Certificate Authority  Create the Full Certificate Chain – root_signing_chain.pem  Import the Full Certificate Chain and Key to Replace VMCA Root Signing Certificate in Certificate Manager with Option 2  Configure certool.cfg with proper values.  Restart vCenter Services on Connected vCenter to Reflect the Change  service-control –stop | --start –all  Replace Machine SSL Certificate with VMCA Certificate on Connected vCenter(s) with Option 3  Provide the FQDN or IP of Platform Service Controller  Configure certool.cfg with proper values.  Replace Solution User Certificates with VMCA Certificates on Connected vCenter(s) with Option 6  Provide the FQDN or IP of Platform Service Controller 22 Workflow
  • 23. Demo Time VMCA as Enterprise CA Subordinate: Certificate Replacement
  • 24. VECSVMCA Demo Scenario VMCA Signing Certificate Machine SSL Certificate Root CA Certificate Enterprise CA Certificate Microsoft Enterprise Certificate Authority mgmt01dc01.sddc.local vSphere 6 Platform Services Controller mgmt01psc01.sddc.local Signed Signed Signed VECS Machine SSL Solution Users Certificates vCenter 6 Server mgmt01vc01.sddc.local 24
  • 25. ESXi Certificate Management Modes 25 VMware ESXi 6.0 VMCA Authority Mode Custom Mode Thumbprint Mode
  • 26. 26 Default Value = vmca Possible Values = vmca | custom | thumbprint Search for certmgmt
  • 27. VMCA Authority Mode  The default mode  Post-install ESXi always has an auto-generated certificate  ESXi certificates are stored locally on each host in the /etc/vmware/ssl  VMCA provisions the host a signed certificate when added to vCenter Server  Host certificates include the full chain to VMCA  ESXi certificates can be renewed via the vSphere Web Client or PowerCLI vpxd.certmgmt.mode = vmca  24 Hour Rule – VMCA as Enterprise CA Subordinate  Signing certificate must have a valid date of 24 hours prior before renewing host certificates or adding new hosts to vCenter  Plan for this aging period when configuring an environment  Replace certificates prior to putting an environment into production 27
  • 28. Custom Mode  Replacement is the same as vSphere 5.5 – ESXi Shell – HTTPS GET/PUT  vifs will wrap these operations.  Custom / 3rd Party certificates – Must change vpxd.certmgmt.mode to custom or risk replacement by VMCA – Must update TRUSTED_ROOTS store in VECS on vCenter with the custom root certificates to ensure trust relationship – use the vecs-cli entry create command vpxd.certmgmt.mode = custom 28
  • 29. Thumbprint Mode  Legacy mode  Fallback option for vSphere 6.0  May be used to retains vSphere 5.5 certificates during an upgrade  DO NOT use this mode unless encountering issues with vmca or custom mode  vCenter 6.0 and later services may not work correctly in thumbprint mode  Switching from thumbprint to vmca mode requires extensive planning 29 vpxd.certmgmt.mode = thumbprint
  • 30. Demo Time VMCA as Enterprise CA Subordinate: ESXi Certificate Replacement
  • 31. VECSVMCA Demo Scenario 31 VMCA Signing Certificate Machine SSL Certificate Root CA Certificate Enterprise CA Certificate Microsoft Enterprise Certificate Authority mgmt01dc01.sddc.local vSphere 6 Platform Services Controller mgmt01psc01.sddc.local Signed Signed Signed VECS Machine SSL Solution Users Certificates vCenter 6 Server mgmt01vc01.sddc.local /etc/vmware/ssl/ ESXi Certificate ESXi 6.0 Host mgmt01esx01.sddc.local Signed
  • 32. Upgrades and Operational Considerations VMware vSphere 6.0 Certificate Management
  • 33. Deployment Considerations  VMCA as Enterprise CA Subordinate – Perform the signing certificate replacement on all Platform Services Controllers to ensure trusted certificates for all vCenter Server 6.0 installations • Remember the ‘24 Hour Rule’ – Signing certificate must have a valid date of 24 hours prior before renewing host certificates or adding new hosts to vCenter – Plan for this aging period when configuring an existing environment – Replace certificates prior to putting a new environment into production 33 VMware vSphere 6.0
  • 34. Managing Certificates • Supports replacing certificates • No CRL enforcement against PKI for vCenter Server and ESXi hosts • If you suspect that one of your certificates has been compromised, revoke and replace all existing certificates, including the VMCA root certificate • If you do not remove revoked certificates, a man-in-the-middle attack might enable compromise through impersonation with the account's credentials. 34 VMware vSphere 6.0
  • 35. Upgrades & Auto Deploy  Host Upgrades and VMCA Signed Certificates – Upgrade process replaces self-signed certificates with VMCA-signed certificates – vCenter then monitors certificates and displays details vSphere Web Client  Host Upgrades and Custom Certificates – Custom certificates are retained – even if expired or invalid – Change vxd.certmgmt.mode to custom to ensure certificates are not replaced accidentally  Update Manager – Not compatible with the Machine SSL certificate template in vSphere 6.0.  Use the vSphere 5.5 certificate template for Update Manager 6.0 35
  • 36. A Call to Action Determine the Best Approach for Your Organization. VMCA as Root CA (Default or Option 4) VMCA as Enterprise CA Subordinate (Option 2) Custom CA (Option 1 & 5) Hybrid (Combination) 36
  • 38. Ryan Johnson Senior Technical Marketing Manager @tenthirtyam Adam Eckerle Technical Account Manager @eck79 vmware.com/go/podcast
  • 39.
  • 40. VMware vSphere Certificate Management for Mere Mortals Ryan Johnson, VMware, Inc @tenthirtyam Adam Eckerle, VMware, Inc @eck79 vmware.com/go/podcast INF4529 #INF4529

Editor's Notes

  1. Good afternoon. Welcome to VMworld session #INF4529 - VMware vSphere Certificate Management for Mere Mortals. My name is Ryan Johnson. I'm a Senior Technical Marketing Manager with the Integrated Systems Business Unit at VMware - where I focus on the Software-Defined Data Center as we as architectures and enablement for the VMware Validate Designs you've learned about here at the conference. (To Adam….) Good afternoon and welcome to VMworld session INF4529 – this is VMware vSphere Certificate Management for Mere Mortals. Get ready to learn quite a bit about certificates and certificate lifecycle management in vSphere 6.0. My name is Ryan Johnson. I'm a Senior Technical Marketing Manager with the Integrated Systems Business Unit at VMware - where I focus on the Software-Defined Data Center as we as architectures and enablement for the VMware Validated Designs you've learned about here at the conference. You can follow me on twitter at @tenthirtyam or on the weekly VMware Communities Podcast at vmware.com/go/podcast. (To Adam….)
  2. This slide introduces the two new components of certificate management. The VMware certificate authority also known as VMCA and the VMware endpoint certificates services also known as VECS. One of the key things to remember is that certificates are now stored within VECS and no longer stored in the filesystem of vCenter. Even if you are using third party certificates you will still need to store them in VECS. For ESXi the certificates are still stored locally on the host this has not changed. VMCA provisions each vCenter server and Service with certificates that are signed by VMCA. We will go into further detail in the next couple of slides. Key take away: VMCA and VECS provide a common platform for managing certificates
  3. Okay. So, Adam's presented you with a primer on the awesome Certificate Lifecycle Management c apabilities we've added in the vSphere 6.0. Now it’s time we dive a bit deeper. And for that, we're going to discuss the types of certificates used in vSphere 6.0. (click….) These are: ESXi Certificates, Machine SSL Certificates, Solutions User Certificates and the Single Sign-On certificates. Let's get started with ESXi Certificates
  4. (click….) Post-install, an ESXi host will always have an auto generated certificate… (click….) Now, you'll learn more about ESXi certificate replacement options from Adam a little later on.. but when a host is joined to vCenter Server and the default ESXi certificate replacement is in tact, that is, when the vpxd-certmgmt.mode is set to equal vmca… a host will receive a freshly minted certificate from the VMware Certificate Authority. (click….) If the mode is set to custom, that is, vpxd.certmgmt.mode is set equal to custom, custom certificates may be used. But keep in mind that custom ESXi certificates will be more exhaustive process. More about that later with Adam. (click….) These ESXI certificates, either VMCA-issued or custom, are not stored in VECS but rather are stored locally on each host in the /etc/vmware/ssl directory. (click….) A VMCA-issued certificates can be renewed from either the vSphere Web Client or through PowerCLI. (click….) Let's take a look at the vSphere Web Client. If you navigate to host and select its Manage > Settings and then locate the Certificate section in the content pane you'll see the… the certificate subject; the Issuer - note, that's our Platform Services Controller in our management cluster; the Valid From and to - note, that by default, ESXi certificate has a validity of 5 years; and the current status. If the certificate was nearing expiration, the Status would change and an alert would be generated .
  5. (click….) If you'd rather not perform manual certificate renewal in the vSphere Web Client, then PowerCLI is your friend. Here's an example PowerCLI snippet to illustrate how you can renew a VMCA-issued certificate on a host by running the CertMgrRefreshCertificates_Task. Later on, Adam will show you... well, we'll just wait for that now won't we... so stick around….
  6. That was ESXi Certificates, now let's move on to Machine SSL Certificates in vSphere 6.0. (click….) Machine SSL Certificates are used to create a server-side SSL socket. (click….) This is use to provide both server verification and secure communications channels - for example, over HTTPs or Secure LDAP. (click….) Each node will have a Machine SSL Certificate. For a vCenter embedded deployment node; where the management and platform services reside together; or an external vCenter deployment model where the management and platform services services reside on their respective management node and platform service controller node. (click….) All services will use a Machine SSL Certificate for endpoint encryption and all services will (click...) communicate through a reverse proxy…. (click….) as the traffic does not communicate directly with the services themselves.
  7. Now, on let’s move on to Solution User Certificates. In vSphere 6.0 we've added a lot more services to vCenter Server than seen in prior version, but we've consolidated access to these services behind a set of Solution Users that hold the certificate. These Solution User certificate are located in VECS on each management node and each embedded deployment. Let's take a look at the four types of Solution Users and their certificate stores in VECS.... (click….) The machine Solution User is used by the component manager, license and logging services. Note that the machine solution user certificate has nothing to do with the machine SSL certificate. The machine solution user certificate is used for the SAML token exchange; while the machine SSL certificate is used for secure SSL connections for a machine. Also note that you will also find that this machine store is also included on each Platform Services Controller node. (click….) The vpxd Solution User consolidates the vCenter Service Daemon on management and embedded deployments and uses the certificate to authenticate to vCenter Single Sign-On. (click….) The vpxd-extensions Solution User includes Auto Deploy and Inventory Services as well as other services not part of other SUs. (click….) Lastly, there's the vsphsre-webclient Solution User that includes the vSphere Web Client and additional services such as performance charts.
  8. (click…) Recall that these Solution Users are encapsulating one or more vCenter Service services. (click…) The certificate is authenticated by vCenter Single Sign-On to issued a SAML token so that it each and every solution user may authenticated to other solution users and services. (click…) For example, the vpxd solution user presents its certificate to vCenter Single Sign-On. The vpxd solution user receives a SAML token and then use th at token to authenticate to other solution users and services. (click…) Solution users will re-authenticate with SSO either after a reboot or when the configured timeout expires. (click…) By default, the Maximum Holder-of-Key Token Lifetime is ~2.6M seconds... that's 30 days by the way. and it can be set in the vSphere Web Client... (click…).... here.
  9. Now on to Single Sign-On Certificates These include - the (click…) (click…) Directory Service SSL Certificate and (click…) 2) vCenter Single Sign-On Signing Certificate. These are provisioned during installation, and are not stored in VECS. (click…) (click…) The vCenter Single Sign-On Signing Certificate is the identity provider that issues, validates and renews the SAML tokens that are user for authenticate through vSphere can be manually refreshed in the vSphere Web Client if required (click….) as can be seen in this (click…) screenshot. Do not change this certificate in the file system or unpredictable behavior results.
  10. Remember, these certificates are not stored in VECS and…are not managed by any certificate management tools. And changes are typically nore necessary but in some special corner cases with custom certificates you may need to replace these.
  11. So let's recap. (click….) - ESXi Certificates - Provisioned by VMCA after joining vCenter - Stored on ESXi Hosts - Machine SSL Certificates - Provisioned by VMCA and Stored in VECS - Solution Users - Provisioned by VMCA and Stored in VECS - SSO Certificate - Provisioned During Installation - Managed in vSphere Web Client - Directory Service Certificate - Provisioned During Installation - Changes are typically not necessary but in some speil corner cases with custom certificates you may need to replace these.
  12. There are four certificate replacement options for vCenter. The first is... VMCA as Root CA: VMCA provides the Root certificate All vSphere certificates chain to VMCA. You can regenerate certificates on demand easily. And you can add the root certificates to your trusted authorities. Next is VMCA as Enterprise CA Subordinate: (aka Intermediate) You replace the VMCA CA certificate with a subordinate CA certificate from the Enterprise CA or commercial CA. Upon removal of the old VMCA CA certificate, all old certificates will be regenerated. Third is using a Custom CA Here you do not use VMCA as a certificate authority. Instead you provision your own custom certificates for each solution user and machine endpoint External certificates are stored directly in VECS but the VMCA is not used. You are responsible for all certificate provisioning and monitoring. Note that this is a more complicated option and is meant For highly security conscious customers only And lastly there is a Hybrid approach... Herd you use a mixed approach. For example: VMCA provides the root certificates and issues certificates to ESXi hosts and solution users. But you Provision your own customer SSL certificates for the endpoints. This is what one customer called "The best of both worlds”… using certificates that chaing corporate PKI for user-facing services and VMCA certificates to secure the vSphere internal components so we can retain all the VMCA functionality Of the four options, the easiest method is to use VMCA in default Root CA mode and next, is VMCA as Enterprise CA Subordinate Please Note: The vSphere 6.0 Certificate Manager and VMCA cannot currently be used to issue certificates to any other Products. Only vCenter Server 6.0 currently integrates with VMCA.
  13. So, how have we make all these certificate replacement options easier? With the vSphere 6.0 Certificate Manager Utility. This utility is essentially a menu-driven Python program that simplfies inteactions with the VMCA and use of 3rd party certificates. There's no need to fumble around with OpenSSL or even VECS CLIs. It even generates your certificate signing requests. (click…) Certificate Manager is present on both form vCenter Form Factors on the embedded deployment, management node and platform services controller node: On the vCenter Server Appliance it's present in: /usr/lib/vmware-vmca/bin/certificate-manager And on Windows vCenter Server it's present in: <Drive>:\Program Files\VMware\vCenter Server\vmcad\certificate-manager
  14. Now, let's talk about the Common Certifiace Manager Use Cases. Speficially, as it relates to the 4 certificate replacement options. (click…) VMCA as Root CA (Leave as Default or Option 4) This use case is when... If you have no plan on implementing custom CA certificates signed by either an in-house CA or a Commercial CA. VMCA will signs, generates and issues certificates and these certificates will then stored by the VMware Endpoint Certificate Store (VECS). These certificates issued by the VMCA will not be trusted by default but can in imported into your Trusted Root Authorities. (click…) VMCA as Enterprise Subordina te CA (Option 2) This use case is when... You want to replace the default VMCA certificate and key with a custom CA certificate and key from either an in-house CA or a commercial CA. VMCA generates and issues new certificates signed by the custom CA certificate and key. These are then stored by the VMware Endpoint Certificate Store (VECS). These certificates issued by the VMCA will be trusted through the signing authority. (click…) Custom CA (Option 1 and 5) This use case is when.. You want to replace the Machine SSL Certificate and all Solution User Certificates with custom CA certificates signed by either an in-house or a commercial CA. VMCA is not responsible for issuing the certificates. These are still stored by the VMware Endpoint Certificate Store (VECS). (click…) And Hybrid, of course, is a combination therein. For example, you'd like to use replace Machine SSL for end-user facing services on the vCenter Server and PSC but use the VMCA-issued certificates for Solution Users and ESXi.
  15. If you would like to continue use the VMCA as Root CA default, but are like me get eally annoyed by these warning messages and extra clicks, you can avoid the warning messages. (click…) Connect to your vCenter Server’s default URL -- in this example http://mgmt01vc01.sddc.local -- and (click….) follow the steps outline in VMware KB 2108294 to download the root certificates and add these to your trusted certificates in your Group Policy(s). It's worth noting that by default, the VMCA root certificate expires after 10 years, and all certificates that VMCA signs expire when the root certificate expires, that is, after a maximum of 10 years.
  16. If you'd like to use the VMCA as an Enterprise CA Subordinate let's understand the requirements. Use a Private Key Algorithm of RSA with 2048 bits. The certificate must be of the X.509 v3 Standard: The format must be PEM-Encoded (PKCS8 and PKCS1) with a header of ---BEGIN CERTIFICATE--- The recommended signature algorithms are SHA256, SHA384, or SHA512 Also, be cognizant that... The VMCA does NOT support wildcard cards or SubjectAltName... While there is no explicit limit to the length of the certificate chain, the VMCA uses the OpenSSL default, which is ten certificates. VMCA will only issue the certificate types we've discussed and only to those VMware vSphere solutions -- vCenter Server, PSC and ESXi. Therefore, you cannot create subsidiary CAs of VMCA. And, of course, you must ensure that time is synchronized for all nodes in environment.
  17. Okay. So, what does the process look like to enable the VMCA as an Enterprise CA Subordinate? Let's take a look at the workflow of tasks for an external deployment model... (click…) First we need to create and publish custom subordinate certificate authority template per KB 2112009 (click…) Then we generate a certificate signing request and key in Certificate Manager with Option 2 (click…) Note that on VCSA you need to run 'chsh –s /bin/bash root' to allow SCP file transfers. (click…) Next, we submit certificate signing request – root_signing_cert.csr – to Enterprise Certificate Authority (click…) We create the full certificate chain – root_n signing_chain.pem (click…) We Import the full certificate chain and key to replace VMCA root signing certificate in Certificate Manager with Option 2 (click…) Configure certool.cfg with proper values. (click…) Restart vCenter services on connected vCenter to reflect the change (click…) service-control –stop | --start –all (click…) Replace Machine SSL certificate with VMCA certificate on connected vCenter(s) with Option 3 (click…) Provide the FQDN or IP of Platform Service Controller (click…) Configure certool.cfg with proper values. (click…) Replace Solution User Certificates with VMCA certificates on connected vCenter(s) with Option 6 (click…) Provide the FQDN or IP of Platform Service Controller (click…) A CRITICAL NOTE: If you have multiple Platform Services Controllers, you need to perform the signing certificate replacement on all Platform Services Controllers to ensure trusted certificates for all vCenter Server 6.0 installations. Got all that? :)
  18. Well, you will. Because now it's time for a full demo. But first, let’s review the scenario for this demo…
  19. This is with regards to ESXi hosts. NOT vCenter Server.
  20. Clarification: This slide is only if you are NOT using VMCA. ESXi certificate replacement is still the same. There is no VECS on ESXi. Use the certificate manager tool to install 3rd party certs on ESXi. The certificate manager tool will do the following for you. Run vecs-cli to add the new certificates to the TRUSTED_ROOTS store, for example: /usr/lib/vmware-vmafd/bin/vecs-cli entry create --store TRUSTED_ROOTS --alias rbd_cert --cert /etc/vmware-rbd/ssl/rbd-ca.crt
  21. Note: If you decide not to upgrade your hosts to vSphere 6.0 or later, the hosts retain the certificates that they are currently using even if the host is managed by a vCenter Server that uses VMCA certificates. Auto Deploy: Signed certificate stored by the Auto Deploy server in its local certificate store and re-used on boot If VMCA is not available then the a stateless host will cycle through shutdown and reboot until VMCA is available
  22. VMCA as Root CA – Self-Signed and Trusted (Uses VECS) VMCA as Enterprise CA Subordinate – Full Chain to Root CA (Uses VECS) Custom CA – Least Desirable, More Exhaustive Choice (Requires VECS) Hybrid – 3rd Party for Machine SSL; VMCA for Solutions User (Yep, Also Requires VECS) VMCA as Root CA (Option 4) No plan on implementing custom CA certificates signed by either an in-house CA or a Commercial CA. VMCA signs, generates and issues certificates. These stored by the VMware Endpoint Certificate Store (VECS). These certificates issued by the VMCA will not be trusted by default. VMCA as Enterprise Subordinate CA (Option 2) Replace the default VMCA certificate and key with a custom CA certificate and key from either an in-house CA or a commercial CA. VMCA generates and issues new certificates signed by the custom CA certificate and key. These stored by the VMware Endpoint Certificate Store (VECS). These certificates issued by the VMCA will be trusted. Custom CA (Option 5) Replace the Machine SSL Certificate and all Solution User Certificates with custom CA certificates signed by either an in-house or a commercial CA. VMCA is not responsible for issuing the certificates. These are still stored by the VMware Endpoint Certificate Store (VECS).
  23. And that folks, is VMware vSphere Certificate Management for Mere Mortals. We hope you’ve learned a lot about certificates and their management in vSphere 6.0. But before you go, we want to leave you with this…. (click…) Go to vmware.com/go/inf4529 to access this presentation, the full demo videos that you saw plus a demo on vRealize Operations certificate management, as well as the PowerCLI and PowerActions scripts to refresh VMCA-issued certificate on a host or an entire cluster. On behalf of Adam and myself, thanks for making this an awesome session. We hope you’ve enjoyed it and learned a lot – have a safe trip home!
  24. Good afternoon. Welcome to VMworld session #INF4529 - VMware vSphere Certificate Management for Mere Mortals. My name is Ryan Johnson. I'm a Senior Technical Marketing Manager with the Integrated Systems Business Unit at VMware - where I focus on the Software-Defined Data Center as we as architectures and enablement for the VMware Validate Designs you've learned about here at the conference. (To Adam….) Good afternoon and welcome to VMworld session INF4529 – this is VMware vSphere Certificate Management for Mere Mortals. Get ready to learn quite a bit about certificates and certificate lifecycle management in vSphere 6.0. My name is Ryan Johnson. I'm a Senior Technical Marketing Manager with the Integrated Systems Business Unit at VMware - where I focus on the Software-Defined Data Center as we as architectures and enablement for the VMware Validated Designs you've learned about here at the conference. You can follow me on twitter at @tenthirtyam or on the weekly VMware Communities Podcast at vmware.com/go/podcast. (To Adam….)