Procedures
Prerequisites
-
Entrust KeyControl has been deployed and configured.
-
VMware vSphere has been deployed and configured using vCenter.
-
You have administrator rights to manage the KMS configuration in vCenter.
Create the KMS cluster in vCenter
For more detail on how to do this, see Adding a KMS Cluster in vSphere in the Entrust online documentation.
-
Launch the vSphere Web Client and log into the vCenter server that you want to add to Entrust KeyControl.
-
Select the required vCenter Server in the Global Inventory Lists.
-
Select the Configure tab.
-
In the left-hand pane, select Security > Key Providers.
-
Select Add Standard Key Provider.
-
In the Add Standard Key Provider dialog, set the following configuration options:
-
For Name, enter the name of the cluster.
-
For each node in the KeyControl cluster, enter the KMS (node name), IP Address and Port. The default port is 5696.
Make sure that the KMIP server resides on a device that is not encrypted using the KeyControl cluster. The KMIP server must be available to provide the keys for the encrypted devices before the encrypted devices can be accessed. To add an extra node line, select Add KMS. -
Open and set Proxy Configuration if you are using a proxy.
-
Password protection is optional.
-
-
Select Add Key Provider.
-
In the Make vCenter Trust Key Provider dialog, confirm the details for each node and then select Trust. For example:
This adds the KMS cluster to vCenter but the connection status will be KMS not connected with Certificate issues. For example:
Establish a trusted connection between the KMS cluster and the Entrust KeyControl server
To establish a trusted connection between the KMS cluster and the Entrust KeyControl server:
-
Continuing from the previous section, select the KeyControl KMS cluster in the list, then scroll down to where the nodes are displayed.
-
Select one of the nodes, then select on Establish Trust > Make KMS trust vCenter. For example:
-
In the Choose method pane of the Make KMS Trust vCenter dialog, select KMS certificate and private key.
-
Select Next.
-
In the Upload KMS Credentials pane of the Make KMS Trust vCenter dialog, you need to upload the
certname.pem
file created during the certificate creation process described in theEntrust KeyControl nShield Integration guide
. This file needs to be uploaded for the KMS certificate, and then uploaded again for the private key. To do this:-
For KMS certificate, select Upload file. Then select the
certname.pem
file and select Open. -
For Private key, select Upload file. Then select the
certname.pem
file again and select Open. -
Select Establish Trust.
-
-
Wait until vCenter reports that the connection status for the KMS cluster has changed to Connected. For example:
Enable Encryption for virtual machines
Enable encryption using VMware Storage Policies.
-
Launch the vSphere Web Client and log into the vCenter server.
-
Locate a VM that you would like to encrypt.
-
Make sure the Power state of the VM is Powered Off.
-
Right-click the VM for which you would like to enable encryption, and select VM Policies > Edit VM Storage Policies.
-
Select the storage policy VM Encryption Policy and select OK.
This will trigger a reconfiguration of the VM.
After the reconfiguration is complete, the disks are encrypted and the keys are managed by the configured KMS (KeyControl).
Check encryption at the VM level
-
Launch the vSphere Web Client and log into the vCenter server.
-
Locate a VM, and select it.
-
In VM View, select the Summary tab.
-
Under VM Hardware > Encryption, the status should be:
VM configuration files are encrypted. Hard disk is encrypted.
Check encryption by looking for the Keys in the Entrust KeyControl KMS
-
Log into the KeyControl web user interface using the Tenant Login URL.
-
Select the Objects tab to view a list of KMIP Objects. This will include the newly created keys. For example:
-
Select one of the keys to display its details. For example:
-
In the main screen, select the Audit Logs tab to view the log records related to the key creation process. For example:
For more information on this topic, refer to Virtual Machine Encryption on the VMware documentation site.
Enable Data-At-Rest encryption on an existing vSAN cluster
To enable Data-At-Rest encryption on an existing vSAN cluster, refer to Using Encryption in a vSAN Cluster on the VMware documentation site.