6.7

Table Of Contents
Virtual Machine Encryption 6
Starting with vSphere 6.5, you can take advantage of virtual machine encryption. Encryption protects not
only your virtual machine but also virtual machine disks and other files. You set up a trusted connection
between vCenter Server and a key management server (KMS). vCenter Server can then retrieve keys
from the KMS as needed.
You manage different aspects of virtual machine encryption in different ways.
n
Manage setup of the trusted connection with the KMS and perform most encryption workflows from
the vSphere Web Client.
n
Manage automation of some advanced features from the vSphere Web Services SDK. See vSphere
Web Services SDK Programming Guide and VMware vSphere API Reference.
n
Use the crypto-util command-line tool directly on the ESXi host for some special cases, for
example, to decrypt the core dumps in a vm-support bundle.
vSphere Virtual Machine Encryption Overview
(http://link.brightcove.com/services/player/bcpid2296383276001?
bctid=ref:video_vsphere_virtual_machine_encryption_overview)
This chapter includes the following topics:
n
How vSphere Virtual Machine Encryption Protects Your Environment
n
vSphere Virtual Machine Encryption Components
n
Encryption Process Flow
n
Virtual Disk Encryption
n
Prerequisites and Required Privileges for Encryption Tasks
n
Encrypted vSphere vMotion
n
Encryption Best Practices, Caveats, and Interoperability
VMware, Inc.
139