Open hfenner opened 3 years ago
Initial research into this problem seemed to indicate that the best option available was to access the shell in order to perform this operation. However, it looks like vSphere 7 introduces some new API options that MAY be available in vSphere 6.7 (which is a very common infrastructure target). https://blogs.vmware.com/vsphere/2020/04/vsphere-7-certificate-management.html
Variations of the CLI technique popped up a lot in blog posts about Let's Encrypt and vSphere: https://blog.krogloth.de/vmware-vcenter-vcsa-ssl-certificates-using-lets-encrypt/ but may (hopefully!) will not be the most reliable option.
As a vSphere user and administrator, I want to access the vSphere UI and API with widely trusted certificates (i.e. not obtaining/trust a CA first) so that the system can be used and managed by any authorized users without forcing Trust On First Use behavior that adds friction to the user experience.
*It is difficult to add third-party signed certificates to VCSA. There seems to be some unresolved issue with the certificate chains causing the certs to fail to be rolled over properly when the machine cert is provided and the certificate chain of intermediate and root CA is provided for the signing key.
Reset shell to root
chsh -s /bin/bash root