Setup own certificates for ESXi 6.5

Spoiler: Like many other services, ESXI uses a web configuration interface that uses a self-signed certificate. Today we’ll show you how to change the default certificates to replace them with your own. You will need to activate SSH to upload the new certificates. Then restart the machine to take the change into account.

Rather than having a physical machine for each of our servers, we preferred to virtualize them with ESXi on a Dell R620. It’s true that it’s a big machine, which requires energy and air conditioning, but with no less than 15 virtual servers, it pays for our carbon impact.

Like other services (ie Landscape and VitalPBX), ESXi uses a web configuration interface which, by default, is unsecured with a self-signed certificate.

Pete Linforth @ pixabay

Today, we will therefore show you how to modify the default certificates to replace them with yours, signed by your own CA and therefore automatically validated by your browsers.

Upload your certificate

As you are pros at certificate creation, I’m assuming you already have your two files available (the key in esxi.pem, the certificate in esxi.crt).

Although menus talk about security and certificates, the ESXi web interface does not allow the kind of configuration that we will be doing here. We will have to get our hands dirty and modify the files directly via SSH.

Technically, since it’s just a matter of replacing files, you could do it via SCP and graphical tools (i.e. WinSCP).

Enable SSH

By default, the SSH server is not started. Considering the few cases where we need it, that’s quite a good thing, but today we’re going to need it and so we’re going to start it.

For that, we go to the Manage menu (on the left of the interface) then in the Services tab. We click on the line corresponding to SSH then on the start button.

Start the SSH service (screenshot in french)

I was going to take another screenshot with an english version of the graphical user interface when I remembered that we’ve replaced our ESXi with a proxmox server. Feel free to send us a screenshot if you have one.

Note that the start is only temporary. When the server restarts, the service will not be automatically started, which is exactly what is needed today.

Save the old ones

As always when you want to be careful, it is a good idea to back up old certificates. If something goes wrong, we can reinstall them to return to the initial configuration. To do this, we will simply rename the two original files (key and certificates):

cd /etc/vmware/ssl
mv rui.crt orig.rui.crt
mv rui.key orig.rui.key

Personally, I actually renamed anything that started with rui to orig.rui.

Replace with the new ones

Now that the stage is free, you can add your files in place of the old ones. There are plenty of way to do so, here is one using SCP from ESXi if we consider the following particularities:

cd /etc/vmware/ssl
scp you@yourmachine:/home/you/esxi.crt rui.crt
scp you@yourmachine:/home/you/esxi.pem rui.key

Personally, I have used winscp, it is much more convenient 😉 but the screenshots are less accessible.

And after ?

We could try to just restart the web interface but since the documentation says to restart the host, that’s what we’ll do.

From experience, when the documentation mentions it, there is a risk of instability if you only restart the web server. Rather than paying off a technical debt, it is easier (for developers) to ask to restart the machine (to administrators).

So we go to the Host menu (on the left) and click on the ‘restart’ button and we will need patience because a server takes time to start 😭.