<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cleanup old trusted root certificates from PSC in VMware vCenter™ Discussions</title>
    <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472300#M5345</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the only interesting store is TRUSTED_ROOTS, wouldn't it be easier to just display that, rather than all the stores in your second step?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There's also a typo in the "grep" line, where you have two "-ie" arguments together, and then two parameters together, rather than alternating.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So to just show the TRUSTED_ROOTS store, and with the grep fixes, I used:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;STORE="TRUSTED_ROOTS" ;&amp;nbsp; echo "[*] Store :" $STORE; /usr/lib/vmware-vmafd/bin/vecs-cli entry list --store $STORE --text | grep -ie "Alias" -ie "Subject" -ie "Issuer"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(the "echo" is obviously not that useful any more)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, is it possible to get the system to prompt for the password in the "unpublish" command, rather than having to include it in clear text on the command line?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 19 Apr 2019 13:43:19 GMT</pubDate>
    <dc:creator>mfirth</dc:creator>
    <dc:date>2019-04-19T13:43:19Z</dc:date>
    <item>
      <title>Cleanup old trusted root certificates from PSC</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472291#M5336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a customer that has had to reset their certificates a few times for unknown reasons using the certificate-manager utility. The problem is the PSC certificate manager web interface and the zip file to install them on users PC contain all the old unused ones still.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to clean this up? When you click delete in the PSC web interface they just come right back.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Dec 2017 22:20:20 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472291#M5336</guid>
      <dc:creator>wreedMH</dc:creator>
      <dc:date>2017-12-06T22:20:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cleanup old trusted root certificates from PSC</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472292#M5337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://docs.vmware.com/en/VMware-vSphere/6.0/com.vmware.vsphere.security.doc/GUID-E0609A99-A8D1-4336-BD3B-DE707E261A63.html" title="https://docs.vmware.com/en/VMware-vSphere/6.0/com.vmware.vsphere.security.doc/GUID-E0609A99-A8D1-4336-BD3B-DE707E261A63.html"&gt;Managing Certificates with the Platform Services Controller Web Interface&lt;/A&gt;&amp;nbsp; and &lt;A href="https://docs.vmware.com/en/VMware-vSphere/6.5/com.vmware.psc.doc/GUID-5572C39C-1556-4ACC-B12D-26E3BCBC4D56.html" title="https://docs.vmware.com/en/VMware-vSphere/6.5/com.vmware.psc.doc/GUID-5572C39C-1556-4ACC-B12D-26E3BCBC4D56.html"&gt;Reset All Certificates&lt;/A&gt;&amp;nbsp; might be of help to you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Jan 2018 07:38:11 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472292#M5337</guid>
      <dc:creator>AishR</dc:creator>
      <dc:date>2018-01-02T07:38:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cleanup old trusted root certificates from PSC</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472293#M5338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That didn't help. I am looking for a much simple solution. I used webui and vecs-cli to delete old certs from trusted store but unable to. The certs come back as soon as you delete them. Please help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Farooq Ahmed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Mar 2018 16:32:52 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472293#M5338</guid>
      <dc:creator>fm2ahmed</dc:creator>
      <dc:date>2018-03-09T16:32:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cleanup old trusted root certificates from PSC</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472294#M5339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #666666; font-family: proxima-nova, Arial, sans-serif;"&gt;Farooq Ahmed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #666666; font-family: proxima-nova, Arial, sans-serif;"&gt;I have the same problem!&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Mar 2018 16:34:12 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472294#M5339</guid>
      <dc:creator>wreedMH</dc:creator>
      <dc:date>2018-03-09T16:34:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cleanup old trusted root certificates from PSC</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472295#M5340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did u manage to resolve the issue??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Mar 2018 22:23:27 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472295#M5340</guid>
      <dc:creator>fm2ahmed</dc:creator>
      <dc:date>2018-03-09T22:23:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cleanup old trusted root certificates from PSC</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472296#M5341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I rebuilt the vCenter, not because of this problem, but for other reasons.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I still would like to know how to clean the certs up in case I run into this in the future though!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2018 02:13:43 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472296#M5341</guid>
      <dc:creator>wreedMH</dc:creator>
      <dc:date>2018-03-12T02:13:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cleanup old trusted root certificates from PSC</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472297#M5342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://kb.vmware.com/s/article/2151145" title="https://kb.vmware.com/s/article/2151145"&gt;VMware Knowledge Base&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kb to cleanup trusted root store certificates . Please be careful and take certificates copied on different locations for safety precautions.. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Mar 2018 00:08:33 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472297#M5342</guid>
      <dc:creator>msripada</dc:creator>
      <dc:date>2018-03-14T00:08:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cleanup old trusted root certificates from PSC</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472298#M5343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried all of the steps listed to no avail. Finally I opened a case with VMware and they walked me through using the certool in order to export the certificates, then run a script that revokes all the expired certificates. This is not officially supported by VMware yet, so try at your own risk. &lt;A href="https://tuneinerror.blogspot.com/2019/04/revoke-expired-certificates-from-vmware.html" title="https://tuneinerror.blogspot.com/2019/04/revoke-expired-certificates-from-vmware.html"&gt;Tune in Error: Revoke expired certificates from VMware VCSA with Embedded PSC&lt;/A&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Apr 2019 19:13:05 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472298#M5343</guid>
      <dc:creator>JesusRulesMe2</dc:creator>
      <dc:date>2019-04-04T19:13:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cleanup old trusted root certificates from PSC</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472299#M5344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To remove the old Certificates from the Trusted Root you may want to follow the next steps:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;Backup the PSC and the vCenter Server&lt;/LI&gt;&lt;LI&gt;Get the list of the current TRUSTED_ROOTS in use&lt;OL style="list-style-type: lower-alpha;"&gt;&lt;LI&gt;Check the Certificates in the vecs on the PSC and VCSA&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-top: 5.0pt; margin-bottom: 5.0pt; margin-left: 54.0pt;"&gt;&lt;SPAN lang="EN-IE" style="font-family: Consolas;"&gt;for store in $(/usr/lib/vmware-vmafd/bin/vecs-cli store list | grep -v TRUSTED_ROOT_CRLS); do echo "[*] Store :" $store;\&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 5.0pt; margin-bottom: 5.0pt; margin-left: 54.0pt;"&gt;&amp;nbsp; &lt;SPAN lang="EN-IE" style="font-family: Consolas;"&gt;/usr/lib/vmware-vmafd/bin/vecs-cli entry list --store $store --text | grep -ie -ie "Alias" "Subject" -ie "Issuer"; \&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 5.0pt; margin-bottom: 5.0pt; margin-left: 54.0pt;"&gt;&lt;SPAN lang="EN-IE" style="font-family: Consolas;"&gt;done;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 5.0pt; margin-bottom: 5.0pt; margin-left: 54.0pt;"&gt;&lt;SPAN lang="EN-IE" style="font-family: Consolas;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;Export the Certificates not in use form the TRUSTED_ROOTS on the PSC&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-left: 27.0pt;"&gt;&lt;SPAN lang="EN-IE" style="font-family: Consolas;"&gt;/usr/lib/vmware-vmafd/bin/vecs-cli entry getcert --store TRUSTED_ROOTS --alias "alias from the vecs entry" --output /tmp/"filename"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-IE" style="font-family: Consolas;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;Unpublish the Certificates from the vmdir on the PSC&lt;/LI&gt;&lt;/OL&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" style="margin-left: 24.0pt;" summary="" title=""&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="padding: 4.0pt 4.0pt 4.0pt 4.0pt;" valign="top" width="1050"&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: Consolas;"&gt;/usr/lib/vmware-vmafd/bin/dir-cli trustedcert unpublish --cert &amp;lt;file&amp;gt; --login &amp;lt;admin_user_id&amp;gt; --password &amp;lt;admin_password&amp;gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;Use the Alias from the unused Certificates to delete the CRL on the PSC&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN lang="EN-IE" style="font-size: 10.0pt; font-family: Consolas;"&gt; /usr/lib/vmware-vmafd/bin/vecs-cli entry delete --store TRUSTED_ROOT_CRLS -y --alias "alias from the vecs entry"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;Force a vecs sync on all nodes&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN lang="EN-IE" style="font-size: 10.0pt; font-family: Consolas;"&gt;/usr/lib/vmware-vmafd/bin/vecs-cli force-refresh&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2019 11:00:57 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472299#M5344</guid>
      <dc:creator>BenediktFrenzel</dc:creator>
      <dc:date>2019-04-05T11:00:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cleanup old trusted root certificates from PSC</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472300#M5345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the only interesting store is TRUSTED_ROOTS, wouldn't it be easier to just display that, rather than all the stores in your second step?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There's also a typo in the "grep" line, where you have two "-ie" arguments together, and then two parameters together, rather than alternating.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So to just show the TRUSTED_ROOTS store, and with the grep fixes, I used:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;STORE="TRUSTED_ROOTS" ;&amp;nbsp; echo "[*] Store :" $STORE; /usr/lib/vmware-vmafd/bin/vecs-cli entry list --store $STORE --text | grep -ie "Alias" -ie "Subject" -ie "Issuer"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(the "echo" is obviously not that useful any more)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, is it possible to get the system to prompt for the password in the "unpublish" command, rather than having to include it in clear text on the command line?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2019 13:43:19 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/472300#M5345</guid>
      <dc:creator>mfirth</dc:creator>
      <dc:date>2019-04-19T13:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cleanup old trusted root certificates from PSC</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/2936534#M46624</link>
      <description>&lt;P&gt;Thanks so much! I had to tweak your for-loop to get it to work on vCenter 8:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;for store in $(/usr/lib/vmware-vmafd/bin/vecs-cli store list | grep -v TRUSTED_ROOT_CRLS); do
  echo "[*] Store :" $store;
  /usr/lib/vmware-vmafd/bin/vecs-cli entry list --store $store --text | egrep -i "Alias|Subject:|Issuer:";
done&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 03 Nov 2022 00:14:14 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Cleanup-old-trusted-root-certificates-from-PSC/m-p/2936534#M46624</guid>
      <dc:creator>BrianCunnie</dc:creator>
      <dc:date>2022-11-03T00:14:14Z</dc:date>
    </item>
  </channel>
</rss>

