Manually Updating the CA Certificate on a Data Encrypted VM
When you install a new SSL certificate on Cryptographic Security Platform Vault, Cryptographic Security Platform Vault automatically updates the associated CA certificate on all registered VMs. If a data-drive encrypted VM was inaccessible during this process, the encrypted drives may become inaccessible because the CA certificate the VM is using can no longer verify the Cryptographic Security Platform Vault SSL certificate. This means that the VM cannot retrieve the proper keys from Cryptographic Security Platform Vault because it cannot verify the communication coming from Cryptographic Security Platform Vault.
To fix this issue you need to manually update the CA certificate on the VM so that it can verify the SSL certificate Cryptographic Security Platform Vault is currently using. This allows the VM to verify Cryptographic Security Platform Vault's identity and to retrieve the appropriate keys.
The following procedure is for VMs with encrypted data drives only. For other types of VMs, see Manually Updating the CA Certificate on a Windows Boot Drive Encrypted VM or Manually Updating the CA Certificate on a Linux Root Drive Encrypted VM.
Procedure
-
If you need a copy of the CA certificate that can verify the SSL certificate that Cryptographic Security Platform Vault is currently using:
- Log into the Cryptographic Security Platform Vault for VM Encryption using an account with Cloud Admin privileges.
- In the top menu bar, click Workloads.
-
Select Actions > Download CA Certificate.
The Cryptographic Security Platform Vault for VM Encryption downloads a
pem
file to your browser's default download location.
Note: If you are using an externally signed SSL certificate for Cryptographic Security Platform Vault, make sure that you use the CA certificate you download from the Cryptographic Security Platform Vault for VM Encryption on all registered VMs. Do not use the CA certificate that you received from the external certificate authority.
root
. For Windows, log in as a System Administrator and open a Command Prompt or start Windows PowerShell.pem
file to the VM.Enter the command hcl update_ca -f /path/to/cert.pem
, where /path/to/cert.pem
is the path to the CA certificate file.
# hcl update_ca -f /etc/ssl/certs/171012172410_cacert.pem Updating using cert file at: 171012172410_cacert.pem Updated CA certificate
hcl heartbeat
to prompt the VM to contact Cryptographic Security Platform Vault. This updates the status information for the VM. hcl status
to confirm that the last heartbeat between the VM and Cryptographic Security Platform Vault was successful.