Certificate troubleshooting, supportability, and trust requirements for vRealize Automation (2024)

Supported Certificate types:

  • In many organizations, certificates are issued or requested by external authorities according to company regulations.
  • An effort was made to identify formats and certificate types supported by VMware vRealize Automation components, based on Certification Authority and Offline Root CA.

Certificate properties covered:

  • Hash Algorithm - SHA1, SHA2 (256, 384, 512)
  • Signature Algorithm - RSASSA-PKCS1_V1_5
  • Key Length - 2048, 4096

Note: RSASSA-PSS is not a supported signature for vRealize Automation setup. This is the default signature selected when using Microsoft CA on Windows 2012 R2.
This is a configurable parameter, so in case of using a MS-CA, ensure that it is properly set to a supported value.


Certificates supportability matrix for vRealize Automation

Hash algorithm

SHA1

SHA2-256

Signature algorithm

RSASSA-PKCS1_V1_5

RSASSA-PSS

RSASSA-PKCS1_V1_5

RSASSA-PSS

Key Size20484096204840962048409620484096
vRA Supported

Supported

Verified

Supported
Verified

Not

Supported

Not

Supported

Supported
Verified

Supported
Verified

Not

Supported

Not

Supported

Hash algorithm

SHA2 - 384

SHA2 - 512

Signature algorithm

RSASSA-PKCS1_V1_5

RSASSA-PSS

RSASSA-PKCS1_V1_5

RSASSA-PSS

Key Size

20484096204840962048409620484096
vRA Supported

Supported

Verified

Supported

Verified

Not

Supported

Not

Supported

Supported

Verified

Supported

Verified

Not

Supported

Not

Supported

Note: The preceding certificate support matrix is also applicable for vRA 7.x versions.


Certificate trust requirements between VMware vRealize Automation components

vRealize Automation Component (alias)

Certificate file type required

Node Cryptographic provider

Needs to be trusted by

Keystores on node (alias)

SSO.pemOpenSSL 0.9.8*vRealize Automation VAvcac.keystore
(websso)
IaaS hostsIaaS DB *
vRealize Automation
.pem

1) OpenSSL 0.9.8j*

  • used by Apache httpd server

2) Java

  • used by all vRA services
vRealize Automation VA

1) server.pem


2) vcac.keystore
(café)

IaaS hostsIaaS DB **
IaaS Web components.pfxWindow CAvRealize Aurtomation VAPostgres DB
IaaS hostWindows certificate store
/ local / computer account / Personal certificates
Iaas Manager Service.pftWindows CAIaaS hostsWindows certificate store
/ local / computer account / Personal certificates
Orchestrator***
(vCO, vRO)
.jksJava

vRealize Automation VA

IaaS hosts

jssecacerts (dunes)
  • * vRealize certificate thumbprint is stored in IaaS database during installation
  • ** SSO certificate thumbprint is stored in IaaS database during installation
  • *** Application Director and Orchestrator as an external instance are optional services

Supportability details and best practices:

  • Windows CA signed certificates converted with OpenSSL are not supported due to a mismatch in the order of the certificates in the chain. You may be able to get these certificates to work by editing the files and changing the order of the certificates to a client to root format:
    1. Client/Server certificate signed by the intermediate CA.
    2. One or more intermediate certificates in the chain. If more than one intermediate chain exists, they should be in the ascending order from client up to root.
    3. Root CA certificate.

      Note: If you use the incorrect order, you may see the Return code is:

      SslHandshakeFailed error.
  • Always use host names (FQDN) for CN (common name) and SAN (subject alternative name) in certificates. Using an IP address is not supported.
  • When using SAN certificates, ensure that the CN value is also included in the SAN.
  • Wildcard certificates are supported but not recommended. If you want to reduce the number of certificates, VMware recommends to list all server names in the SAN instead.
  • IaaS components requires Certificate Revocation List (CRL) access to successfully connect to vRealize Automation appliances. Checking of the CRL servers can be disabled on the IaaS side. If this is required, file a support request with VMware Support and note this Knowledge Base article ID ( 2106583) in the problem description. For more information, see Filing a Support Request in Customer Connect (2006985) or How to Submit a Support Request.
  • vRA 6.2 uses RabbitMQ as one of its components. By default, RabbitMQ uses the same certificate that as the vRA web server. Manual updates to the RabbitMQ certificate are not supported.
  • Never replace all the different platform certificates at once (Identity Appliance, vRA Appliance, and IaaS). Replace certificates one at a time and follow all of the steps in the System Administration Guide to fully distribute the updated certificate before moving on to the next platform.

Common issues and solutions:

Troubleshooting methodology:

  • When troubleshooting certificate errors, extract/ view the certificate in question and check these:
    • Date: Confirm expiration dates on all certificates.
    • URL: Must match exactly the subject and/or subject alternative name on the certificates.
    • Chain:Verify the certificate chain to ensure that a full path to trust can be achieved. Ensure that the PEM file is copied into the Appliance management page in the correct order.
    • CRL: Ensure that the certificate revocation server is accessible. To test access to the CRL, log in to the vRealize Automation appliance you are testing from and use the curl command

    For example:
    • curl https://www.domain.com/crl-directory/filename.crl
    • curl -k https://www.domain.com/crl-directory/filename.crl (-k ignores certificates)
Certificate troubleshooting, supportability, and trust requirements for vRealize Automation (2024)
Top Articles
Latest Posts
Article information

Author: Greg Kuvalis

Last Updated:

Views: 6274

Rating: 4.4 / 5 (75 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Greg Kuvalis

Birthday: 1996-12-20

Address: 53157 Trantow Inlet, Townemouth, FL 92564-0267

Phone: +68218650356656

Job: IT Representative

Hobby: Knitting, Amateur radio, Skiing, Running, Mountain biking, Slacklining, Electronics

Introduction: My name is Greg Kuvalis, I am a witty, spotless, beautiful, charming, delightful, thankful, beautiful person who loves writing and wants to share my knowledge and understanding with you.