Getting root certificates

The Get-HPESvtRootCertificate cmdlet returns an array of X509Certificate2 objects from the vCenter Server. This cmdlet does not require that you authenticate.

When you use this cmdlet, you must independently verify that the certificate is what you expect it to be because the command does not perform validation checks on the certificate.

Get-HPESvtRootCertificate -hmsHostname | Format-list

Subject      : OU=VMware Engineering, O=vc-147-50-53, S=California, C=US, DC=local, DC=vsphere, CN=CA
Issuer       : OU=VMware Engineering, O=vc-147-50-53, S=California, C=US, DC=local, DC=vsphere, CN=CA
Thumbprint   : 83754908A5088D883FBC86275EF1FD964E2153C0
FriendlyName :
NotBefore    : 7/9/2017 10:48:12 PM
NotAfter     : 7/7/2027 10:48:12 PM
Extensions   : {System.Security.Cryptography.Oid, System.Security.Cryptography.Oid, System.Security.Cryptography.Oid, System.Security.Cryptography.Oid}

Use the Get-HPESvtRootCertificate cmdlet in conjunction with the Add-HPESvtCertificate cmdlet to populate the certificate trust store on the Virtual Controller.

Related Blogs

Roy Atkins

HPE SimpliVity PowerShell Module

May 16, 2019
Ron Dharma

Using Postman with HPE SimpliVity

Nov 9, 2018

HPE Developer Newsletter

Stay in the loop.

Sign up for the HPE Developer Newsletter or visit the Newsletter Archive to see past content.

By clicking on “Subscribe Now”, I agree to HPE sending me personalized email communication about HPE and select HPE-Partner products, services, offers and events. I understand that my email address will be used in accordance with HPE Privacy Statement. You may unsubscribe from receiving HPE and HPE-Partner news and offers at any time by clicking on the Unsubscribe button at the bottom of the newsletter.

For more information on how HPE manages, uses, and protects your personal data please refer to HPE Privacy Statement.