VMware vSphere 5 – Part 2: vSphere Security
Systems engineers, system administrators, vSphere operators and support personnel working in virtualized server environments who have completed Datacenter Virtualization with vSphere 5: Part 1. Candidates who are seeking to learn about advanced features and configuration options available in the vSphere Enterprise product. This includes, configuring High Availability, Distributed Resource Scheduling, upgrading to vSphere 5 and auto deployment. A solid technical foundation in virtualization using vSphere coupled with strong network and administration skills are required as a prerequisite for this path.
Please contact us for information about prerequisites.
Security is a vital consideration when setting up and managing a vSphere environment. Like most other areas of security within information technology, securing a vSphere environment means securing several different components of vSphere. This course examines vSphere security considerations, points of vulnerability, as well as VMware security resources.
The majority of what you need to do as a vSphere administrator involves working with vCenter Server. Even so, it’s still necessary to discuss how ESXi handles user authentication, because the mechanism vCenter Server uses to manage ESXi hosts also relies on ESXi authentication. And because the need to authenticate to ESXi still exists (even if you are authenticating indirectly through vCenter Server), you need to understand what options exist for managing users and groups on ESXi hosts. There are two basic options: managing users and groups locally on each host or integrating with Active Directory. This course explains roles, privileges, groups and users (RPGU) as well as Active Directory integration.
This course can be used in preparation for the VCP5 exam. However, it is not sponsored or authorized by VMware so does not fully satisfy the training requirements to achieve the certification.
vSphere Security Management
- describe the characteristics of vSphere security
- describe local options that exist for managing users and groups on ESXi hosts
- sequence the steps to add and edit a role
Active Directory Integration
- distinguish between the ESXi and vCenter server active directory integration processes
- identify the characteristics of the vSphere Authentication Proxy mechanism
- describe how the vSphere Authentication Proxy mechanism operates
- Not Applicable