6.5.1

Table Of Contents
Option Value
Server address IP address or FQDN of the KMS.
Server port Port on which vCenter Server connects to the KMS.
Proxy address Optional proxy address for connecting to the KMS.
Proxy port Optional proxy port for connecting to the KMS.
User name Some KMS vendors allow users to isolate encryption keys that are used by
different users or groups by specifying a user name and password. Specify a user
name only if your KMS supports this functionality, and if you intend to use it.
Password Some KMS vendors allow users to isolate encryption keys that are used by
different users or groups by specifying a user name and password. Specify a
password only if your KMS supports this functionality, and if you intend to use it.
Establish a Trusted Connection by Exchanging Certificates
After you add the KMS to the vCenter Server system, you can establish a trusted connection. The exact
process depends on the certificates that the KMS accepts, and on company policy.
Prerequisites
Add the KMS cluster.
Procedure
1 Log in to the vSphere Web Client, and select a vCenter Server system.
2 Click Configure and select Key Management Servers.
3 Select the KMS instance with which you want to establish a trusted connection.
4 Click Establish trust with KMS.
5 Select the option appropriate for your server and complete the steps.
Option See
Root CA certificate Use the Root CA Certificate Option to Establish a Trusted Connection.
Certificate Use the Certificate Option to Establish a Trusted Connection.
New Certificate Signing Request Use the New Certificate Signing Request Option to Establish a Trusted
Connection.
Upload certificate and private key Use the Upload Certificate and Private Key Option to Establish a Trusted
Connection.
vSphere Security
VMware, Inc. 158