Certificate expiry and renewal
How to renew and replace TLS certificates in your VMware deployment.
All ingress certificates in API Connect have a duration of 2 years. To avoid an outage when they expire, they must be manually renewed before expiration.
The ingress-ca
CA certificate has a duration of 10 years and also requires manual steps to renew it before
expiry.
Intra-subsystem certificates are renewed automatically.
If you have a two data center disaster recovery deployment, then when you renew certificates in one data center, you must copy the renewed certificates to the other data center. See Extracting and copying certificates.
Identifying expired certificates
apicup certs list <subsystem>Any certificates that
are expired or near to expiry are indicated in the Validation errors column.Follow the step in Renewing certificates to renew expired or nearly expired certificates.
Renewing certificates
ingress-ca certificate, then
see Renewing ingress-ca.- Clear the existing certificate with the
apicup certs clearcommand:
Repeat for all ingress certificates that you want to renew.apicup certs set --clear <subsystem> <certificate name> - Generate new certificates for all the certificates that you cleared in step 1:
You do not need to specify the certificates with the apicup certs generate, the command identifies all empty (cleared) certificates in the subsystem and generates new ones.apicup certs generate <subsystem> - Apply the updated certificates to the
subsystem:
apicup subsys install <subsystem>
Renewing ingress-ca
ingress-ca, and then renew
all the end-entity certificates the are signed by ingress-ca.- Clear the
ingress-cacertificate:apicup certs set --clear <management subsystem> ingress-caAlthough this command specifies <management subsystem>, because
ingress-cais a common certificate, it is cleared for all subsystems. You do not need to repeat this command for every portal or analytics subsystem that is managed from the same project directory. - Generate a new
ingress-ca:
The generate command creates certificates for all previously cleared certificates, you do not need to specifyapicup certs generate <subsystem>ingress-cain this command. - Clear all the ingress end-entity certificates that are signed by
ingress-ca:
For a list of the ingress certificates, see Ingress certificates.apicup certs set --clear <subsystem> <certificate name> - Generate new ingress end-entity certificates for each
subsystem:
apicup certs generate <subsystem> - Apply the updated certificates to all
subsystems:
apicup subsys install <subsystem>