10 Jun 2010
Rate this item
(0 votes)

This article forms part of the Replacing vSphere SSL Certificates series.

Before continuing with the steps in this article, be sure that you have completed Step 2: Generate a new SSL Certificate Request

Now that we have used OpenSSL to generate a new SSL certificate request, we need to submit the request to a Certificate Authority in order to sign a new SSL Certificate based on the request. OpenSSL has now generated the request and saved the request in rui.csr. We now need to open the rui.csr file using Wordpad. Once the file has been opened in Wordpad, we will copy the entire contents of the file to the clipboard.

09 Jun 2010
Rate this item
(0 votes)

This cannot be regarded as a blog post. However, I seem to be having trouble logging into Twitter with the following message?



This has been going on for a while now (more than 20 minutes I think). Is it just me or is anyone else suffering?


09 Jun 2010
Rate this item
(0 votes)

I am delighted to say that I have received confirmation that I had been awarded a VMware vExpert 2010 award. I am humbled and honored to be included in the program for a second year running. Thank you VMware!


According to the vEXPERT Landing Page  "The VMware vExpert Award is given to individuals who have significantly contributed to the community of VMware users over the past year. vExperts are book authors, bloggers, VMUG leaders, tool builders, and other IT professionals who share their knowledge and passion with others. These vExperts have gone above and beyond their day jobs to share their technical expertise and communicate the value of VMware and virtualization to their colleagues and community."

07 Jun 2010
Rate this item
(0 votes)

Well, it seems like telecoms has become yet another obstacle again for www.virtualvcp.com. Today I've had to make a call to BT (the main UK landline provider) as my ADSL line picked up a fault over the weekend. For this reason, I regret to say that www.virtualvcp.com might be unavailable at times as the ADSL connection might drop off every now and then. BT is due to fix the issue tomorrow.

I am glad to report that BT Openreach has fixed the problem with the ADSL line that supports virtualvcp.com. The site is back online now!

06 Jun 2010
Rate this item
(0 votes)

This article forms part of the Replacing vSphere SSL Certificates series.

Before you continue with the following procedure, ensure that you have completed Step 1: Prepare OpenSSL and Microsoft CS

We will be using OpenSSL to generate a new RSA key. We will then use this key to generate a new SSL Certificate Request that we can submit to the Microsoft Certificate Authority that we have created in Step 1.

 On the SSL Server that we have prepared in Step 1, Open a new command prompt window and change directory to the “C:\OpenSSL-Win32\bin” directory.

Written by 0 comment
Published in VMware vSphere
01 Jun 2010
Rate this item
(0 votes)

This article forms part of the Replacing vSphere SSL Certificates series.

In order to request and self sign new SSL certificates for VMware vCenter Server 4.x and VMware Update Manager we will need to get a certificate authority up and running. For this lab, we will use a Microsoft Windows 2003 Server running Microsoft Certificate Services as our Certificate Authority. Although we will be using Microsoft Certificate Services to sign the new SSL Certificates, OpenSSL will be used to generate the SSL Certificate Requests that will be submitted to the Microsoft Certificate Authority.

To build the SSL CA Server we will need to have the following software components:

  • A Windows 2003 Server
  • Microsoft Internet Information Services (IIS) enabled
  • Microsoft Certificate Services Installed
  • Visual C++ Redistibutable (Download this from here )
  • Win32 OpenSSL V1.0.0 Lite (Download this from here) 

For this example I have prepared a Windows 2003 Server called LABSSL01 and I've also added the server to the LABS.UK.VIRTUALVCP.COM domain. So, the FQDN of our SSL Certificate Authority server for this example will be: labssl01.labs.uk.virtualvcp.com.

Preparing the server for Microsoft Certificate Services

The first thing that we will need to get in place is IIS. We will use IIS to access the Microsoft Certificate Services Web Portal. The web portal will be handy to:

  • Submit new SSL Certificate Requests to the Microsoft CA
  • Download the signed SSL Certificates
  • Download the CA Root Certificate to client machines

We will be installing the IIS and Certificate Services components at the same time.

Using Add or Remove Programs from the Windows Control Panel, Click the Add/Remove Windows Components Button:


Select "Application Server" and click "Details". Then select the following components under "Application Server"

  • Application Server Console
  • Enable network COM+ access
  • Internet Information Services


Once the components have been selected, Click OK.

With the IIS components now selected, we can go ahead and select the Certificate Services components as well.

Select "Certificate Services", then click "Details"


The Certificate Services components dialog opens. Select the following components before clicking "OK":

  • Certificate Services CA
  • Certificate Services Web Enrollment Support


When Certificate Services CA is selected, the following message will appear. Click "Yes" to continue


Now that both IIS and Certificate Services components have been selected, click "Next".


As we are installing a new Certificate Authority, we need to provide some information for the new Certificate Authority.

For the CA type, select "Stand-alone root CA" and click "Next" 


Now it's time to supply information that will identify the new Certificate Authority. The information provided here will also be included in each SSL certificate that the new CA will sign in the future.

At least the "Common Name for this CA" field should be completed as well as the "Validity period" field.


At the Certificate Database Settings dialog, keep the default settings and click "Next"


A message will appear stating that in order to complete the installation, Internet Information Services must be restarted. Click "Yes" to acknowledge this message.


You may also be presented with a message requesting that ASP be enabled. Click "Yes" to enable ASP now.


During the installation, you may be prompted for the Windows 2003 Installation CD. Please make sure that you have this handy in order to complete the installation of IIS and Certificate Services.

When the above steps have been completed, your server will be an ASP Web Server as well as a Certificate Authority capable of signing new SSL Certificates. However we will still need to install OpenSSL for Windows. OpenSSL is used to generate new SSL Certificate requests that will be submitted to the new Microsoft Certificate Authority. In this example, our Certificate Authority is called "VirtualVCP SelfSign Certificate Authority"


 In order for your client machines to verify the authenticity of any certificates signed by your new CA, you will have to download and install the CA root certificate on each client machine. The new CA root certificate can be downloaded from http://<your-ca-server>/certserv

Installing Win32 OpenSSL V1.0.0 Lite

NOTE: Before installing Win32 OpenSSL V1.0.0 Lite, please download and install Visual C++ Redistibutable from the Microsoft Website.

Download Win32 OpenSSL V1.0.0 Lite from here

Run the Win32 OpenSSL Light installer. At the Welcome dialog, click “Next”


Select “I accept the agreement” and click “Next”


Keep the default Destination Location as “C:\OpenSSL-Win32” and click “Next”


Select "The OpenSSL binaries (/bin) directory" and click "Next"


Click "Finish" to complete the installation


This then completes the SSL Server preparation. However, as we will be issuing new SSL certificates using the SSL Certificate Authority installed on this server, we will have to import the CA's root certificate into the Trusted Root Certification Authorities store of each of the client computers that will be using the vSphere client to connect to vCenter and VUM.

Continue to the next step: Generate a new SSL Certificate Request