6.7

Table Of Contents
PartnerSupported VIBs with the PartnerSupported acceptance level are published by a
partner that VMware trusts. The partner performs all testing. VMware does
not verify the results. This level is used for a new or nonmainstream
technology that partners want to enable for VMware systems. Today, driver
VIB technologies such as Infiniband, ATAoE, and SSD are at this level with
nonstandard hardware drivers. VMware directs support calls for VIBs with
this acceptance level to the partner's support organization.
CommunitySupported The CommunitySupported acceptance level is for VIBs created by
individuals or companies outside of VMware partner programs. VIBs at this
level have not gone through any VMware-approved testing program and
are not supported by VMware Technical Support or by a VMware partner.
Procedure
1 Connect to each ESXi host and verify that the acceptance level is set to VMwareCertified,
VMwareAccepted, or PartnerSupported by running the following command.
esxcli software acceptance get
2 If the host acceptance level is CommunitySupported, determine whether any of the VIBs are at the
CommunitySupported level by running the following commands.
esxcli software vib list
esxcli software vib get -n vibname
3 Remove any CommunitySupported VIBs by running the following command.
esxcli software vib remove --vibname vib
4 Change the acceptance level of the host by using one of the following methods.
Option Description
CLI command
esxcli software acceptance set --level acceptance_level
vSphere Client (HTML5-based client) or
vSphere Web Client
a Select a host in the inventory.
b Select the Configure tab.
c Expand System and select Security Profile.
d Click the Edit button for Host Image Profile Acceptance Level and choose the
acceptance level.
Assigning Privileges for ESXi Hosts
In most cases, you give privileges to users by assigning permissions to ESXi host objects that are
managed by a vCenter Server system. If you are using a standalone ESXi host, you can assign privileges
directly.
vSphere Security
VMware, Inc. 83