6.5.1

Table Of Contents
Note that losing the connection to the KMS does not automatically lock the virtual machine. The
virtual machine only enters a locked state if the following conditions are met:
n
The key has to be validated.
n
The key is not available on the ESXi host.
n
The ESXi host cannot retrieve the key from the vCenter Server system.
After each reboot, an ESXi host must be able to reach vCenter Server and retrieve keys.
2 If the connection is restored and an error results when you attempt to register the virtual machine,
verify that you have the Cryptographic operations.Manage keys privilege for the vCenter Server
system.
This privilege is not required for powering on an encrypted virtual machine if the key is available. This
privilege is required for registering the virtual machine if the key has to be retrieved again.
3 If the key is no longer active on the KMS, ask the KMS administrator to restore the key.
You might encounter an inactive key if you are powering on a virtual machine that had been removed
from the inventory and that had not been registered for a long time. It also happens if you reboot the
ESXi host, and the KMS is not available.
a Retrieve the key ID by using the Managed Object Browser (MOB) or the vSphere API.
Retrieve the keyId from VirtualMachine.config.keyId.keyId.
b Ask the KMS administrator to reactivate the key that is associated with that key ID.
If the key can be restored on the KMS, vCenter Server retrieves it and pushes it to the ESXi host the
next time it is needed.
4 If the KMS is accessible and the ESXi host is powered on, but the vCenter Server system is
unavailable, follow these steps to unlock virtual machines.
a Restore the vCenter Server system, or set up a different vCenter Server system as a KMS client.
You must use the same cluster name, but the IP address can be different.
b Reregister all virtual machines that are locked.
The new vCenter Server instance retrieves the keys from the KMS and the virtual machines are
unlocked.
vSphere Virtual Machine Encryption and Core Dumps
If your environment uses vSphere Virtual Machine Encryption, and if an error occurs on the ESXi host, the
resulting core dump is encrypted to protect customer data. Core dumps that are included in the vm-
support package are also encrypted.
Note Core dumps can contain sensitive information. Follow your organization's data security and privacy
policy when handling core dumps.
vSphere Security
VMware, Inc. 170