6.5.1

Table Of Contents
Table 114. Content Library Privileges (Continued)
Privilege Name Description Required On
Content library.Sync
library item
Allows synchronization of library items. Library. Set this
permission to propagate to
all library items.
Content library.Sync
subscribed library
Allows synchronization of subscribed libraries. Library
Content library.Type
introspection
Allows a solution user or API to introspect the type support plugins for
the content library service.
Library
Content library.Update
configuration settings
Allows you to update the configuration settings.
No vSphere Web Client user interface elements are associated with
this privilege.
Library
Content library.Update
files
Allows you to upload content into the content library. Also allows you
to remove files from a library item.
Library
Content library.Update
library
Allows updates to the content library. Library
Content library.Update
library item
Allows updates to library items. Library. Set this
permission to propagate to
all library items.
Content library.Update
local library
Allows updates of local libraries. Library
Content library.Update
subscribed library
Allows you to update the properties of a subscribed library. Library
Content library.View
configuration settings
Allows you to view the configuration settings.
No vSphere Web Client user interface elements are associated with
this privilege.
Library
Cryptographic Operations Privileges
Cryptographic operations privileges control who can perform which type of cryptographic operation on
which type of object.
You can set this privilege at different levels in the hierarchy. For example, if you set a privilege at the
folder level, you can propagate the privilege to one or more objects within the folder. The object listed in
the Required On column must have the privilege set, either directly or inherited.
Table 115. Cryptographic Operations Privileges
Privilege Name Description Required On
Cryptographic operations.Direct Access Allows users access to encrypted
resources. For example, users can
export virtual machines, have NFC
access to virtual machines, and so
on.
Virtual machine, host, or
datastore
Cryptographic operations.Add disk Allows users to add a disk to an
encrypted virtual machine.
Virtual machine
vSphere Security
VMware, Inc. 230