I have a Server 2012R2 machine that hosts System Center. During SCVMM installation, it created itself a self-signed certificate for use with SCVMM connections. Unfortunately, it created one with a SHA-1 hash, which trips our vulnerability scanners and needs fixed.
I know there's a way to use the MMC's Certificate Manager console to generate a certificate request, but I have only done this to submit the request to a higher organization for cert generation and distribution. While I'm sure I can find a way to create a fully self-signed cert manually, I did have a few questions that are a little more SCVMM specific.
Does SCVMM really need a self-signed certificate? The Machine has a Client/Server Authentication certificate, as required by a higher organization, already installed (and it's SHA-256). Can I use this instead, or does the "Friendly name" have to include "SCVMM_CERTIFICATE_KEY_CONTAINER(serverFQDN)?
Once the SHA-1 cert is replaced (either with a new SHA-256 self-signed or the existing SHA-256 cert), does SCVMM need configuration in some way? I do not normally manage this application directly, but the individual who does did not seem to be able to find a console where you dictate what cert it is supposed to use, and neither did I.