Přeskočit na hlavní obsah
  • Vkládejte objednávky snadno a rychle
  • Zobrazit objednávky a sledovat stav expedice
  • Vytvořte a přistupujte k seznamu svých produktů
  • Spravujte své profily, produkty a kontakty na úrovni produktů na stránkách Dell EMC pomocí správy společnosti.

OpenManage Integration for VMware vCenter Version 4.0 Web Client User's Guide

Extracting Thumbprint by using the command line

You can see the following sections for extracting thumbprint by using the command line on the appliance and Windows installation.

Extracting thumbprint by using the Command Line on the vCenter server appliance

Perform the following steps:

  1. Move or upload the old_machine.crt certificate to PSC in the C:\certificates\old_machine.crt location that is created in step 1 of retrieving the old certificate procedure. You can use Windows Secure Copy (WinSCP) or another SCP client to move or upload the certificate.
  2. Log in to the External Platform Services Controller appliance through Secure Shell (SSH).
  3. Run the following command to enable accessing the Bash shell: shell.set --enabled true.
  4. Type shell and press Enter.
  5. Run the following command to extract the thumbprint: openssl x509 -in /certificates/old_machine.crt -noout -sha1 –fingerprint
NOTE: The thumbprint appears as a sequence of numbers and letters after the equal sign, which is as follows: SHA1 Fingerprint= ea:87:e1:50:bb:96:fb:be:1f:a9:5a:3c:1d:75:b4:8c:30:db:79:71

Extracting thumbprint by using the Command Line on Windows installation

Perform the following steps:

  1. Move or upload the old_machine.crt certificate to PSC in the C:\certificates\old_machine.crt location that is created in step 1 of retrieving the old certificate procedure. You can use Windows Secure Copy (WinSCP) or another SCP client to move or upload the certificate.
  2. Connect to External Platform Services Controller through remote desktop connection.
  3. Open command prompt in administrative mode.
  4. Run the following command to extract the thumbprint: "%VMWARE_OPENSSL_BIN%" x509 -in c:\certificates\old_machine.crt -noout -sha1 –fingerprint
NOTE: The thumbprint appears as a sequence of numbers and letters after the equal sign, which is as follows: SHA1 Fingerprint=09:0A:B7:53:7C:D9:D2:35:1B:4D:6D:B8:37:77:E8:2E:48:CD:12:1B
Run the ls_update_certs.py with the old thumbprint. Log out and log in to the vCenter Web client after the services are updated successfully. The Dell plug-in launches successfully.

Hodnoťte tento obsah

Přesné
Užitečné
Snadno srozumitelné
Byl tento článek užitečný?
0/3000 characters
  Zadejte hodnocení (1 až 5 hvězdiček).
  Zadejte hodnocení (1 až 5 hvězdiček).
  Zadejte hodnocení (1 až 5 hvězdiček).
  Vyberte, zda vám článek pomohl či nikoli.
  Komentáře nesmí obsahovat tyto speciální znaky: <>() \