diff --git a/docs/user_doc/vic_vsphere_admin/vch_cert_reqs.md b/docs/user_doc/vic_vsphere_admin/vch_cert_reqs.md
index a83192a5db..d5bf31835f 100644
--- a/docs/user_doc/vic_vsphere_admin/vch_cert_reqs.md
+++ b/docs/user_doc/vic_vsphere_admin/vch_cert_reqs.md
@@ -100,7 +100,7 @@ For information about how to automatically generate a server certificate during
Custom server certificates for VCHs must meet the following requirements:
- You must use an X.509 server certificate.
-- The Common Name (CN) in the server certificate must match the FQDN or IP address of the system from which the Docker client accesses the server, or a wildcard domain that matches all of the FQDNs in a specific subdomain.
+- The Common Name (CN) in the server certificate must match the FQDN or IP address of the system from which the Docker client accesses the server, or a wildcard domain that matches all of the FQDNs in a specific subdomain.
- Server certificates must have the following certificate usages:
- `KeyEncipherment`
- `DigitalSignature`
@@ -110,8 +110,6 @@ Custom server certificates for VCHs must meet the following requirements:
If you use certificates that are not signed by a trusted certificate authority, container developers might require the server certificate when they run Docker commands in `--tlsverify` client mode. You can download the server certificate for a VCH from the vSphere Client. For information about downloading server certificates, see [View All VCH and Container Information in the HTML5 vSphere Client](access_h5_ui.md).
-For information about how to upload custom client certificates during VCH deployment, see the section [Server Certificates](vch_cert_options.md#server) in *Virtual Container Host Certificate Options*.
-
## VCH Client Certificate
vSphere Integrated Containers Management Portal uses a client certificate to authenticate with the VCH when you add it to a project.
@@ -128,17 +126,13 @@ For information about how to automatically generate a client certificate during
### Custom Client Certificate
-For the VCH to trust the CA that you use to sign the client certificate, the CA must include the following elements:
-
-- The name or address of the system from which the Docker client accesses the server in the subject or subject alternative name. This can be an FQDN or a wildcard domain.
-- Key usage in the v3 extensions that match the key usage chosen for the VCH server certificate:
+Key usage in the v3 extensions that match the key usage chosen for the VCH server certificate:
- `KeyEncipherment`
- `KeyAgreement`
+ - `clientAuth`
You cannot download client certificates for VCHs from the vSphere Client. vSphere administrators distribute client certificates directly.
-For information about how to upload custom client certificates during VCH deployment, see the section [Client Certificates](vch_cert_options.md#client) in *Virtual Container Host Certificate Options*.
-
## vSphere Integrated Containers Registry Root CA
VCH requires registry root CA to pull images from vSphere Integrated Containers Registry