<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CA authority Archives - VM and Cloud Hosting</title>
	<atom:link href="https://vmme.org/tag/ca-authority/feed/" rel="self" type="application/rss+xml" />
	<link>https://vmme.org/tag/ca-authority/</link>
	<description></description>
	<lastBuildDate>Tue, 03 Dec 2024 04:03:48 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://vmme.org/wp-content/uploads/2024/09/cropped-vmware-cloud-director-10-5-0-unable-to-create-a-new-edge-gateway-firewall-rule-vexpert-consultancy-32x32.png</url>
	<title>CA authority Archives - VM and Cloud Hosting</title>
	<link>https://vmme.org/tag/ca-authority/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Step-by-Step: Generate vRealize Automation Certificate via CertGenVVD Tool</title>
		<link>https://vmme.org/step-by-step-generate-vrealize-automation-certificate-via-certgenvvd-tool/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 03 Dec 2024 04:03:37 +0000</pubDate>
				<category><![CDATA[Cloud Hosting]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[CA authority]]></category>
		<category><![CDATA[CA Server]]></category>
		<category><![CDATA[certificate]]></category>
		<category><![CDATA[certificate authority]]></category>
		<category><![CDATA[Certificate Signing Request]]></category>
		<category><![CDATA[Certificate template]]></category>
		<category><![CDATA[iaas]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[openssl]]></category>
		<category><![CDATA[Organization]]></category>
		<category><![CDATA[OTHER]]></category>
		<category><![CDATA[POST]]></category>
		<category><![CDATA[powershell]]></category>
		<category><![CDATA[SDDC]]></category>
		<category><![CDATA[Template]]></category>
		<category><![CDATA[Validity Period]]></category>
		<category><![CDATA[VMware]]></category>
		<category><![CDATA[VMware vRealize Automation]]></category>
		<category><![CDATA[vra]]></category>
		<category><![CDATA[vRealize]]></category>
		<category><![CDATA[vrealize automation]]></category>
		<category><![CDATA[vsphere template]]></category>
		<guid isPermaLink="false">https://vmme.org/step-by-step-generate-vrealize-automation-certificate-via-certgenvvd-tool/</guid>

					<description><![CDATA[<p>Introduction In order to centralize certificate management and unify the procedure of generation of certificates for VMware management components in the whole SDDC stack, the VMware Validated Design Certificate Generation...</p>
<p><a href="https://vmme.org/step-by-step-generate-vrealize-automation-certificate-via-certgenvvd-tool/">Source</a></p>
<p>The post <a href="https://vmme.org/step-by-step-generate-vrealize-automation-certificate-via-certgenvvd-tool/">Step-by-Step: Generate vRealize Automation Certificate via CertGenVVD Tool</a> appeared first on <a href="https://vmme.org">VM and Cloud Hosting</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>SRM 8.2: Failed to Validate Custom Certificate – Certificate Host Name Mismatch</title>
		<link>https://vmme.org/srm-8-2-failed-to-validate-custom-certificate-certificate-host-name-mismatch/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 19 Nov 2024 21:01:06 +0000</pubDate>
				<category><![CDATA[Cloud Hosting]]></category>
		<category><![CDATA[CA authority]]></category>
		<category><![CDATA[certificate]]></category>
		<category><![CDATA[Certificate host name mismatch]]></category>
		<category><![CDATA[custom pkcs#12 certificate]]></category>
		<category><![CDATA[error]]></category>
		<category><![CDATA[Failed to validate certificate]]></category>
		<category><![CDATA[POST]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Site Recovery Manager]]></category>
		<category><![CDATA[srm]]></category>
		<category><![CDATA[Troubleshooting]]></category>
		<category><![CDATA[VMware Site Recovery Manager]]></category>
		<guid isPermaLink="false">https://vmme.org/srm-8-2-failed-to-validate-custom-certificate-certificate-host-name-mismatch/</guid>

					<description><![CDATA[<p>Recently I installed site recovery manager SRM version 8.2 for one of our customers where there is a requirement for all solutions to use a custom certificate signed by their...</p>
<p><a href="https://vmme.org/srm-8-2-failed-to-validate-custom-certificate-certificate-host-name-mismatch/">Source</a></p>
<p>The post <a href="https://vmme.org/srm-8-2-failed-to-validate-custom-certificate-certificate-host-name-mismatch/">SRM 8.2: Failed to Validate Custom Certificate – Certificate Host Name Mismatch</a> appeared first on <a href="https://vmme.org">VM and Cloud Hosting</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>NSX-T 3.x Certificate Replacement Series – Part3: Activate CA-Signed Certificates</title>
		<link>https://vmme.org/nsx-t-3-x-certificate-replacement-series-part3-activate-ca-signed-certificates/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 05 Nov 2024 13:25:28 +0000</pubDate>
				<category><![CDATA[Cloud Hosting]]></category>
		<category><![CDATA[API]]></category>
		<category><![CDATA[CA authority]]></category>
		<category><![CDATA[Certificate chain]]></category>
		<category><![CDATA[Certificate ID]]></category>
		<category><![CDATA[Certificate Replacement]]></category>
		<category><![CDATA[cluster]]></category>
		<category><![CDATA[Import CA Certificate]]></category>
		<category><![CDATA[Import Certificate]]></category>
		<category><![CDATA[NSX]]></category>
		<category><![CDATA[NSX-T]]></category>
		<category><![CDATA[NSX-T manager]]></category>
		<category><![CDATA[NSX-T Manager Cluster]]></category>
		<category><![CDATA[POST]]></category>
		<category><![CDATA[postman]]></category>
		<category><![CDATA[Request URL]]></category>
		<category><![CDATA[Rest API]]></category>
		<category><![CDATA[root]]></category>
		<category><![CDATA[VMware NSX-T Data Center]]></category>
		<guid isPermaLink="false">https://vmme.org/nsx-t-3-x-certificate-replacement-series-part3-activate-ca-signed-certificates/</guid>

					<description><![CDATA[<p>This is part3 of my 3-parts NSX-T series that illustrates the complete step-by-step procedure to replace the self-signed certificates for NSX-T 3.x manager cluster with MS-based CA-signed certificates. In part1...</p>
<p><a href="https://vmme.org/nsx-t-3-x-certificate-replacement-series-part3-activate-ca-signed-certificates/">Source</a></p>
<p>The post <a href="https://vmme.org/nsx-t-3-x-certificate-replacement-series-part3-activate-ca-signed-certificates/">NSX-T 3.x Certificate Replacement Series – Part3: Activate CA-Signed Certificates</a> appeared first on <a href="https://vmme.org">VM and Cloud Hosting</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
