When you are configuring a standard key provider in VMware vCenter, you can authenticate vCenter to the key provider using any of the following options:

- vCenter Root CA Certificate
- vCenter Certificate
- Upload [a custom] certificate and private key
- New Certificate Signing Request (CSR) [to be processed by the key provider]
I commonly choose “vCenter certificate.” This uses a certificate signed by the vCenter CA. The certificate is generated specifically for use with KMIP and it has a 10-year expiration.
Importantly, a new certificate is generated by vCenter for each key provider that you configure.
Furthermore, if you cancel the trust process before completing it, vCenter will generate a new certificate the next time you perform the trust process. I’ve been bitten by this in the past—I generated a certificate, cancelled the dialog, and sent the certificate to my cryptographic administrator. When I received confirmation the certificate had been configured, I re-initiated the trust process, but this time it used a new certificate. This took quite some time to debug. Make sure that you complete the trust process even if you expect there to be a waiting period before the certificate is configured in your key provider!
4 thoughts on “vCenter key provider client certificates”