6.7

Table Of Contents
Use Encryption in Your vSphere
Environment 7
Using encryption in your vSphere environment requires some preparation. After your environment is set
up, you can create encrypted virtual machines and virtual disks and encrypt existing virtual machines and
disks.
You can perform additional tasks by using the API and by using the crypto-util CLI. See the vSphere
Web Services SDK Programming Guide for API documentation and the crypto-util command-line help
for details about that tool.
This chapter includes the following topics:
n
Set up the Key Management Server Cluster
n
Create an Encryption Storage Policy
n
Enable Host Encryption Mode Explicitly
n
Disable Host Encryption Mode
n
Create an Encrypted Virtual Machine
n
Clone an Encrypted Virtual Machine
n
Encrypt an Existing Virtual Machine or Virtual Disk
n
Decrypt an Encrypted Virtual Machine or Virtual Disk
n
Change the Encryption Policy for Virtual Disks
n
Resolve Missing Key Issues
n
Unlock Locked Virtual Machines
n
Resolve ESXi Host Encryption Mode Issues
n
Re-Enable ESXi Host Encryption Mode
n
Set Key Management Server Certificate Expiration Threshold
n
vSphere Virtual Machine Encryption and Core Dumps
VMware, Inc.
154