6.0.3

Table Of Contents
PartnerSupported
VIBs with the PartnerSupported acceptance level are published by a partner
that VMware trusts. The partner performs all testing. VMware does not
verify the results. This level is used for a new or nonmainstream technology
that partners want to enable for VMware systems. Today, driver VIB
technologies such as Inniband, ATAoE, and SSD are at this level with
nonstandard hardware drivers. VMware directs support calls for VIBs with
this acceptance level to the partner's support organization.
CommunitySupported
The CommunitySupported acceptance level is for VIBs created by
individuals or companies outside of VMware partner programs. VIBs at this
level have not gone through any VMware-approved testing program and are
not supported by VMware Technical Support or by a VMware partner.
Procedure
1 Connect to each ESXi host and verify that the acceptance level is set to VMwareCertied or
VMwareAccepted by running the following command.
esxcli software acceptance get
2 If the host acceptance level is not VMwareCertied or VMwareAccepted, determine whether any of the
VIBs are not at the VMwareCertied or VMwareAccepted level by running the following commands.
esxcli software vib list
esxcli software vib get -n vibname
3 Remove any VIBs that are at the PartnerSupported or CommunitySupported level by running the
following command.
esxcli software vib remove --vibname vib
4 Change the acceptance level of the host by running the following command.
esxcli software acceptance set --level acceptance_level
Assigning Permissions for ESXi
In most cases, you give privileges to users by assigning permissions to ESXi host objects that are managed
by a vCenter Server system. If you are using a standalone ESXi host, you can assign privileges directly.
Assiging Permissions to ESXi Hosts that Are Managed by vCenter Server
If your ESXi host is managed by a vCenter Server, perform management tasks through the
vSphere Web Client.
You can select the ESXi host object in the vCenter Server object hierarchy and assing the administrator role
to a limited number of users who might perform direct management on the ESXi host. See “Using Roles to
Assign Privileges,” on page 147.
Best practice is to create at least one named user account, assign it full administrative privileges on the host,
and use this account instead of the root account. Set a highly complex password for the root account and
limit the use of the root account. (Do not remove the root account.)
Assigning Permissions to Standalone ESXi Hosts
If your environment does not include a vCenter Server system, the following users are predened.
n
root user. See “root User Privileges,” on page 188.
n
vpxuser. See “vpxuser Privileges,” on page 188.
n
dcui user. See “dcui User Privileges,” on page 189.
Chapter 5 Securing ESXi Hosts
VMware, Inc. 187