6.5

Table Of Contents
credential store usage 39
direct host authentication 34
direct host targeting 32
lockdown mode 38
managed host targeting 32
order of precedence 33
overview 32
password protection 32
running on Linux 43
running on Windows 43
scripts 42
session file creation 34
session file usage 34
thumbprint usage 39
vCenter Server authentication 34
vCenter Server certificate installation 38
vCenter Single Sign-On authentication 34
Windows SSPI usage 37
vMA, deployment 24
vSphere management with CLI 7
Getting Started with vSphere Command-Line Interfaces
54 VMware, Inc.