6.7

Table Of Contents
Table 111. Required Privileges for Common Tasks (Continued)
Task Required Privileges Applicable Role
On a datastore that contains the installation media ISO image:
Datastore.Browse datastore (if installing from an ISO image on a
datastore)
On the datastore to which you upload the installation media ISO image:
n
Datastore.Browse datastore
n
Datastore.Low level file operations
Virtual Machine
Power User or
Administrator
Migrate a virtual machine with
vMotion
On the virtual machine or folder of virtual machines:
n
Resource.Migrate powered on virtual machine
n
Resource.Assign Virtual Machine to Resource Pool (if destination is
a different resource pool from the source)
Resource Pool
Administrator or
Administrator
On the destination host, cluster, or resource pool (if different from the
source):
Resource.Assign virtual machine to resource pool
Resource Pool
Administrator or
Administrator
Cold migrate (relocate) a virtual
machine
On the virtual machine or folder of virtual machines:
n
Resource.Migrate powered off virtual machine
n
Resource.Assign virtual machine to resource pool (if destination is
a different resource pool from the source)
Resource Pool
Administrator or
Administrator
On the destination host, cluster, or resource pool (if different from the
source):
Resource.Assign virtual machine to resource pool
Resource Pool
Administrator or
Administrator
On the destination datastore (if different from the source):
Datastore.Allocate space
Datastore
Consumer or
Administrator
Migrate a virtual machine with
Storage vMotion
On the virtual machine or folder of virtual machines:
Resource.Migrate powered on virtual machine
Resource Pool
Administrator or
Administrator
On the destination datastore:
Datastore.Allocate space
Datastore
Consumer or
Administrator
Move a host into a cluster On the host:
Host.Inventory.Add host to cluster
Administrator
On the destination cluster:
Host.Inventory.Add host to cluster
Administrator
Encrypt a virtual machine Encryption tasks are possible only in environments that include
vCenter Server. In addition, the ESXi host must have encryption mode
enabled for most encryption tasks. The user who performs the task must
have the appropriate privileges. A set of Cryptographic Operations
privileges allows fine-grained control. For more information, see the
vSphere Security documentation.
Administrator
vSphere Virtual Machine Administration
VMware, Inc. 284