6.5.1

Table Of Contents
Figure 71. Connecting from vCenter Server to the KMS for Two Dierent Users
vCenter Server
KMS Cluster C1
KMS Cluster C2
KMS
C1 username/pwd
C2 username/pwd
C1
keys
C2
keys
Prerequisites
Set up the connection with the KMS. See Set up the Key Management Server Cluster.
Procedure
1 Create the two users with corresponding user names and passwords, for example C1 and C2, on the
KMS.
2 Log in to vCenter Server and create the first KMS cluster.
3 When prompted for a user name and password, give information that is unique to the first user.
4 Create a second KMS cluster and add the same KMS, but use the second user name and password
(C2).
The two clusters have independent connections to the KMS and use a different set of keys.
Create an Encryption Storage Policy
Before you can create encrypted virtual machines, you must create an encryption storage policy. You
create the storage policy once, and assign it each time you encrypt a virtual machine or virtual disk.
If you want to use virtual machine encryption with other I/O filters, see the vSphere Storage
documentation for details.
Prerequisites
n
Set up the connection to the KMS.
Although you can create a VM Encryption storage policy without the KMS connection in place, you
cannot perform encryption tasks until trusted connection with the KMS server is established.
n
Required privileges: Cryptographic operations.Manage encryption policies.
Procedure
1 Log in to the vCenter Server by using the vSphere Web Client.
2 Select Home, click Policies and Profiles, and click VM Storage Policies.
3 Click Create VM Storage Policy.
vSphere Security
VMware, Inc. 163