Answer : A
The requirements focus on trust, encryption, and lifecycle management for a VMware Cloud Foundation (VCF) 5.2 solution. VCF leverages SDDC Manager, vCenter Server, NSX, and ESXi hosts as core management components, and their security and manageability are critical. Let's evaluate each option against the requirements:
Option A: Integrate the SDDC Manager with a supported 3rd-party certificate authority (CA)
This is the correct answer. In VCF 5.2, integrating SDDC Manager with a 3rd-party CA (e.g., Microsoft CA, OpenSSL) allows it to manage and deploy trusted certificates across all management components (e.g., vCenter, NSX Manager, ESXi hosts). This ensures:
Trusted administrative access: Certificates from a trusted CA secure administrative interfaces (e.g., HTTPS access to SDDC Manager and vCenter), ensuring authenticated and verified connections.
Encrypted communications: All management component interactions (e.g., API calls, UI access) use TLS with CA-signed certificates, encrypting data in transit.
Lifecycle management enhancement: SDDC Manager automates certificate lifecycle operations (e.g., issuance, renewal, replacement), reducing manual effort and improving operational efficiency.
The VMware Cloud Foundation documentation explicitly supports this integration as a best practice for security and scalability, fulfilling all three requirements comprehensively.
Option B: Integrate the SDDC Manager with the vCenter Server in VMCA mode
This is incorrect. The vCenter Server's VMware Certificate Authority (VMCA) can issue certificates for vSphere components (e.g., ESXi hosts, vCenter itself), but it operates within the vSphere domain, not across the broader VCF stack. SDDC Manager requires a higher-level CA integration to manage certificates for all components (including NSX and itself). VMCA mode doesn't extend trust to SDDC Manager or NSX Manager natively, nor does it enhance lifecycle management across the entire VCF solution---it's limited to vSphere. This option fails to fully address the requirements.
Option C: Write a PowerCLI script to run on all virtual appliances and force a redirection on port 443
This is incorrect. Forcing redirection to port 443 (HTTPS) via a PowerCLI script might enable encrypted communication for some components, but it's a manual, ad-hoc solution that:
Doesn't ensure trusted access (no mention of certificate trust).
Doesn't integrate with a CA for certificate management.
Contradicts lifecycle enhancement, as it requires ongoing manual intervention rather than automation.
This approach is not scalable or supported in VCF 5.2 for meeting security requirements.
Option D: Write an Aria Orchestrator Workflow to change the ESXi hosts' certificates in bulk
This is incorrect. While VMware Aria Orchestrator (formerly vRealize Orchestrator) can automate certificate updates for ESXi hosts, it's a partial solution that:
Only addresses ESXi hosts, not all management components (e.g., SDDC Manager, NSX).
Doesn't inherently ensure trust unless tied to a trusted CA (not specified here).
Improves lifecycle management only for ESXi certificates, not the broader VCF stack.
This option lacks the holistic scope required by the question and isn't a native VCF design decision.
Conclusion:
Integrating SDDC Manager with a 3rd-party CA (Option A) is the only design decision that fully satisfies all requirements. It leverages VCF 5.2's built-in certificate management capabilities to ensure trust, encryption, and lifecycle efficiency across the entire solution.
VMware Cloud Foundation 5.2 Architecture and Deployment Guide (Section: Certificate Management)
VMware Cloud Foundation 5.2 Planning and Preparation Guide (Section: Security Design Considerations)
vSphere 7.0U3 Security Configuration Guide (integrated in VCF 5.2): Certificate Authority Integration