- Make a backup of /etc/vmware/ssl/rui.crt and rui.key
- Generate a new server key: openssl genrsa -out rui.key 2048
- Generate a CSR: openssl req -new -key rui.key -out server.csr
- Go to the Certificate Services web interface on one of your DCs, and select “Request a Certificate”
- Select “advanced certificate request”
- Select “Submit a certificate request by using a base-64-encoded CMC or PKCS #10 file, or submit a renewal request by using a base-64-encoded PKCS #7 file.”
- Paste the CSR text into the “Saved Request” field, and select “Web Server”, and Submit the request
- Select “Base 64 encoded”, and “Download certificate”
- Transfer the certificate to the Linux box running VMWare Server
- Copy/rename the new certificate (certnew.cer) over rui.crt
- Do a “service vmware restart”
- Voila! A trusted certificate. No more web browser/VMWare Client messages about invalid certificates
I have problem replacing the certficate. I replaced the certificate and restarted the vmware server. But the old certificate is used, i dont have any idea why
LikeLike
the certificates are stored in:
VMware Server 2.x (Linux) /etc/vmware/ssl
VMware Server 2.x (Windows) C:Program FilesVMwareVMware Serverssl and %ALLUSERSPROFILE%Application DataVMwareVMware ServerSSL
both have to be replaced for windows.
rgrds,
Andy
LikeLike
Thanks for that, Andy.
LikeLike
Very useful information. Thanks!
LikeLike