I'll answer this in a few posts as I get a chance to test them. As you have noticed, all of the information that seems to be available has to do with the Windows version of vCenter.
I realized this morning that the above procedure seems to only update the key for the web service portion of the appliance. In order to update the vCenter client portion, you'd need to also update the
/etc/vmware-vpx/ssl/rui.crt
/etc/vmware-vpx/ssl/rui.key
files. If you want to update the pfx, you can, but that's supposed to be a Windows thing (not sure why the file is included on the appliance).
This is best done before you create the database or add anything to it. Unfortunately, I had already populated my database and got an "invalid key, fail" message in the log when I tried to restart the vpxd.
NOTE: you can run
# service vmware-vpxd restart
to get the service to reload w/o rebooting the appliance
In poking around, I found a command called vpxd_servicecfg that has an option to replace certificates:
# vpxd_servicecfg certificate change new-rui.crt new-rui.key
I think that may be useful, but it doesn't have much (any) UI and I can't find any documentation on it. When I run that command, I get the following:
VC_CFG_RESULT=653
Not sure what that means, and restarting vmware-vpxd after that seems to use the new certs for a portion of the vSphere client login, but there is another one being presented as well. I'm looking into that.
As for the host certs, I'll get there eventually...