>I also tried syncing the /opt/opendj/config/keystore and /opt/opendj/config/keystore.pin but that did not help
It's not enough. The most important part is you must ensure that it also added to the default java keystore. As you said you already synced Apache's and Tomcat's certs using this guide, you should know procedure very well already. So, for example, if you decide to use certs from 1st node as source, you need:
1. Copy the `keystore` and `pin` files from there to the 2nd node (what you've done already)
2. At the 2nd node, remove previous OpenDJ's certificate from default java store, and add here the one you will get from the 1st node
My guess is that because all these tools are java applications, when they try to establish initial connections for setting up replication, they use SSL and fail because LDAP server at other node provides them a self-signed certificate they can't verify (because the only way to make it trust self-signed cert is to have it added to some trustable cert/key storage on the node, like, default java storage)
The strange thing is that I haven't experienced this kind of issue when creating a cluster using Ubuntu-based instances. It seems whatever it uses for providing SSL layer verifies certificates differently on different distros
>Is the global admin "admin" and the password that was set by setup.py and displayed post-install?
No, those are creds for "cn=directory manager" user, which is unique for each of the instance (until replication will start to function, at least). When you enable replication, it asks you to provide password for global admin user, it's an administrator account that can be used to access any LDAP node in your replication topology as an admin - it will initialize this account for you and will assign it a password you'll provide there. By default it should has name "cn=admin,cn=Administrators,cn=admin data".