Locker CA의 자체 인증서는 UI에서 확인이 되지 않습니다. 이에 Locker CA가 발급한 인증서를 이용하여, CA 인증서 정보를 조회할 수 있습니다.
1. 먼저, vRealize Lifecycle Manager에서 접속해서 Locker 메뉴로 이동한 후 기존에 발급한 인증서를 Download 합니다.
2. 다운로드한 인증서를 VI Editor를 이용하여, BEGIN CERTIFICATE과 END CERTIFICATE을 기준으로 텍스트를 잘라서 각각 확장자 crt로 저장합니다.
다운로드한 인증서
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----
첫 번째 인증서
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
두 번째 인증서
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
3. 확장자 crt로 저장된 인증서를 Openssl 도구를 이용하여 인증서 정보를 확인합니다.
Locker CA certificate
root@vrlcm01 [ ~ ]# openssl x509 -in cainfo.crt -text -noout
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1661174113535 (0x182c5b164ff)
Signature Algorithm: sha256WithRSAEncryption
Issuer: CN=vRealize Suite Lifecycle Manager Locker CA, O=VMware, C=IN
Validity
Not Before: Aug 22 13:15:13 2022 GMT
Not After : Aug 19 13:15:13 2032 GMT
Subject: CN=vRealize Suite Lifecycle Manager Locker CA, O=VMware, C=IN
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:d4:a4:79:ab:8a:cb:68:67:14:c9:ea:e6:93:cf:
d9:f9:5a:08:fe:bc:dd:30:32:26:da:2d:bf:a2:e6:
82:a7:6b:13:1b:ac:77:93:78:a8:ba:d4:59:42:cf:
7d:a1:c3:95:b0:13:c2:a8:93:b3:76:7f:20:42:e2:
dd:f7:90:9a:19:0d:c2:6b:2f:53:5d:ed:2b:32:32:
f2:42:88:7b:24:c3:bc:5c:a7:cd:49:27:fb:47:18:
a1:25:49:13:85:97:0b:0b:b6:23:63:6b:05:ec:25:
f1:36:14:8a:a5:d8:6a:05:c4:14:dc:1a:c3:f1:1d:
3e:86:8d:27:05:a7:c7:34:3d:95:1c:59:d6:4e:0f:
38:30:86:e4:4e:e9:7b:fb:66:be:6c:1e:68:6b:02:
07:23:92:7f:4e:35:ba:ff:c0:61:54:71:29:8d:a1:
c6:12:98:49:8b:08:e9:3e:9c:46:11:4e:cb:da:d3:
03:eb:01:ab:64:c4:02:a2:8b:cf:fc:8e:81:2b:a6:
77:ca:ff:c9:d8:8f:b8:81:33:74:f1:a5:7d:d5:38:
97:61:35:37:06:76:65:97:56:3e:be:0f:26:d7:23:
53:97:09:5f:a1:b7:53:1c:1f:33:06:34:9b:4b:41:
ed:6b:00:e3:d5:68:68:81:7a:99:4c:75:d5:29:8c:
74:97
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
CA:85:97:9F:AB:97:4C:6A:01:B7:8F:81:CB:B6:2D:AD:43:BC:0B:86
X509v3 Authority Key Identifier:
keyid:CA:85:97:9F:AB:97:4C:6A:01:B7:8F:81:CB:B6:2D:AD:43:BC:0B:86
X509v3 Basic Constraints: critical
CA:TRUE
X509v3 Key Usage: critical
Digital Signature, Certificate Sign, CRL Sign
Signature Algorithm: sha256WithRSAEncryption
0b:da:0b:f8:0c:59:5c:cf:9c:da:f8:24:eb:05:59:a0:5e:e2:
56:58:0c:b0:30:1f:8a:5d:15:45:30:56:5f:ca:a7:9c:5c:cf:
b9:ec:29:74:35:fe:31:d7:ff:1e:a7:f7:70:53:e9:f2:36:79:
53:fe:07:35:08:37:b2:d6:20:ae:e6:1e:25:14:8d:24:23:c1:
35:56:6f:d1:df:79:82:66:c8:5c:a4:ff:52:0b:3d:4c:dd:c6:
8a:59:a4:b7:00:6a:58:7b:e7:37:e6:d0:36:8b:74:5f:91:13:
b4:ff:03:da:b9:de:48:9f:e1:cc:a9:4c:6a:a9:ca:86:7a:93:
d3:f8:4f:f5:43:60:90:69:9d:b0:06:57:2d:fa:b7:26:a0:5f:
87:ac:d3:4b:59:7d:ce:6b:88:d6:95:a3:59:99:23:fb:a4:5e:
ef:99:d0:00:4c:4c:f5:57:50:29:c1:1c:ca:60:a5:59:b5:24:
e1:02:72:20:09:73:af:29:dd:c8:35:e9:c4:dd:ec:f7:8b:d3:
c0:15:90:5e:ba:39:08:f4:7d:de:78:34:4b:ad:01:98:c2:5b:
57:d8:cc:25:8d:67:f4:8e:1c:0a:6d:f5:01:05:80:ff:c1:b4:
70:21:32:4b:ef:fb:bc:fd:09:97:95:a4:e0:58:a0:80:c1:cb:
fc:49:84:d2
Locker CA가 발급한 certificate
root@vrlcm01 [ ~ ]# openssl x509 -in cainfo2.crt -text -noout
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1661437810572 (0x182d569178c)
Signature Algorithm: sha256WithRSAEncryption
Issuer: CN=vRealize Suite Lifecycle Manager Locker CA, O=VMware, C=IN
Validity
Not Before: Aug 25 14:30:10 2022 GMT
Not After : Aug 24 14:30:10 2024 GMT
Subject: CN=*.contoso.com, OU=vmware, O=vmware, C=KR
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:c0:8e:19:62:71:c6:cb:cc:b5:01:35:e5:28:e1:
8a:f2:40:ec:f5:c8:db:61:d6:60:b5:9c:35:3e:0a:
c9:8c:de:a4:78:54:19:c1:a8:54:09:dd:6a:08:19:
6c:7c:8c:54:5d:0b:42:28:91:92:17:b2:91:7d:4b:
3e:7e:51:97:52:35:11:8c:aa:1d:da:75:9e:20:3d:
6c:68:21:72:c4:68:39:5c:4e:41:95:e5:52:72:f1:
9d:23:08:4a:78:92:c0:f7:d2:e3:c2:d0:70:15:6f:
b9:f2:94:45:2c:30:68:8c:0d:a7:40:08:b7:2e:f2:
32:31:fa:3c:6e:eb:81:2b:0b:a1:03:11:94:58:30:
17:7c:81:bc:20:d9:06:d8:db:11:a3:e7:40:2e:29:
1e:ad:87:45:11:7b:90:4a:ff:44:a8:90:f5:41:67:
cf:76:bc:a1:eb:ad:57:6b:c0:8a:48:76:ae:a9:b3:
64:0e:e7:bf:69:87:d8:cd:c7:34:6c:f3:43:16:07:
a3:75:70:61:89:28:df:b5:10:6c:68:64:dc:82:0d:
fe:e8:75:33:24:63:5d:b2:37:38:e7:fa:b8:1f:dd:
8b:4d:d9:85:ca:66:34:84:27:4d:2b:e6:f2:df:f7:
8e:88:74:e9:c2:b9:f9:01:fc:d0:fe:70:8f:d8:66:
5b:2b
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
6B:08:D1:C5:46:88:81:5E:53:D2:84:08:C2:F4:78:EB:C5:03:CE:DB
X509v3 Authority Key Identifier:
keyid:CA:85:97:9F:AB:97:4C:6A:01:B7:8F:81:CB:B6:2D:AD:43:BC:0B:86
X509v3 Subject Alternative Name:
IP Address:192.168.1.41, IP Address:192.168.1.51, IP Address:192.168.1.61, DNS:*.contoso.com
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Extended Key Usage: critical
TLS Web Client Authentication, TLS Web Server Authentication
X509v3 Basic Constraints: critical
CA:FALSE
Signature Algorithm: sha256WithRSAEncryption
6c:b1:b4:60:c0:73:bf:be:47:98:f9:1a:41:1d:91:f1:73:9b:
ff:b4:7d:a1:64:b5:5c:3d:b1:fe:74:ec:91:4b:1f:6c:4f:b7:
2a:62:27:c7:ab:36:67:3f:52:2b:2a:33:0a:f3:90:24:34:27:
88:bb:4a:46:1d:1a:2f:97:3e:0b:a5:65:01:89:c5:24:5b:7c:
6b:11:38:9f:00:59:f9:05:6f:c9:cb:c2:d5:cd:bf:df:0d:1d:
d3:4f:84:a9:cb:a5:80:21:ce:92:3f:bc:38:2c:93:83:53:13:
f5:76:ce:9c:e8:92:01:64:9a:24:0f:65:49:ce:48:7b:0c:20:
58:15:c0:54:f6:dd:2a:ab:62:62:75:ea:d3:5e:9c:55:22:ec:
43:0c:2e:02:38:af:5e:39:94:0d:21:73:6d:8e:d9:1e:f7:55:
23:f6:4d:ae:0e:2e:0b:52:fa:fa:ee:db:ce:f2:72:9b:4a:9e:
96:0c:63:7a:51:4f:d1:5a:6f:cb:55:a2:e9:75:62:08:ef:25:
9f:a2:1f:f3:e0:d0:7d:4c:ea:0d:74:0a:6b:05:b7:08:c4:ce:
33:65:e9:73:6d:00:3f:9a:27:88:01:2b:fd:ff:40:9b:ed:9b:
26:87:20:9b:74:5e:8b:62:6d:8d:a9:25:84:74:0f:8e:a4:88:
97:10:d3:b0
Issuer와 Subject가 동일하게 "CN=vRealize Suite Lifecycle Manager Locker CA, O=VMware, C=IN"로 되어 있는 인증서가 Locker CA의 CA Certificate 입니다.
나머지 인증서는 Issuer가 "Issuer: CN=vRealize Suite Lifecycle Manager Locker CA, O=VMware, C=IN"이고, Subject가 "Subject: CN=*.contoso.com, OU=vmware, O=vmware, C=KR" 이므로 Locker CA를 통해 신규로 발급한 Certificate 입니다.
'Management' 카테고리의 다른 글
[LogInsight] How to configure AVI compatible with Syslog RFC (0) | 2022.10.27 |
---|---|
[Automation] How to unregister the specific resource from the deployment (0) | 2022.10.07 |
[Automation] How to login vRealize Automation API Server (0) | 2022.09.30 |
[LCM] Root/Intermediate certificate already expired (0) | 2022.09.07 |
Postman을 사용하여 Locker에서 발급한 인증서 확인 (0) | 2022.08.30 |