6.7

Table Of Contents
Table 61. Interfaces for Performing Cryptographic Operations
Interface Operations Information
vSphere Web Client Create encrypted virtual machine
Encrypt and decrypt virtual machines
This book.
vSphere Web Services SDK Create encrypted virtual machine
Encrypt and decrypt virtual machines
Perform a deep recrypt of a virtual machine (use a
different DEK).
Perform a shallow recrypt of a virtual machine (use a
different KEK).
vSphere Web Services SDK
Programming Guide
VMware vSphere API Reference
crypto-util
Decrypt encrypted core dumps, check whether files
are encrypted, and perform other management tasks
directly on the ESXi host.
Command-line help.
vSphere Virtual Machine Encryption
and Core Dumps
vSphere Virtual Machine Encryption Components
An external KMS, the vCenter Server system, and your ESXi hosts are contributing to the vSphere Virtual
Machine Encryption solution.
Figure 61. vSphere Virtual Encryption Architecture
Third-Party Key
Management Server
vCenter Server
Managed
VM Keys
Managed VM
key IDs
ESXi
Encrypted VM
vSphere
Managed VM keys
protect internal
encryption keys
Key Management Server
vCenter Server requests keys from an external KMS. The KMS generates and stores the keys, and
passes them to vCenter Server for distribution.
You can use the vSphere Web Client or the vSphere API to add a cluster of KMS instances to the
vCenter Server system. If you use multiple KMS instances in a cluster, all instances must be from the
same vendor and must replicate keys.
vSphere Security
VMware, Inc. 142