VMware vSphere and Entrust KeyControl: Integration Guide
Table of Contents
Introduction
This guide describes the integration of the Entrust KeyControl Key Management Solution (KMS) with VMware encryptions solutions, vSAN, and VM encryption. Entrust KeyControl can serve as a KMS in vCenter using the open standard Key Management Interoperability Protocol (KMIP).
Documents to read first
This guide describes how to configure the Entrust KeyControl server as a KMS in vCenter.
To install and configure the Entrust KeyControl server as a KMIP server, see the
Entrust KeyControl nshield HSM Integration Guide
.
You can access this in the Entrust Document Library.
Also refer to the following documents in the VMware online documentation :
-
Using Encryption in a vSAN Cluster.
-
Virtual Machine Encryption.
Product configuration
Product | Version |
---|---|
VMware vSphere |
7.0.2 |
KeyControl |
5.5.1 |
Procedures
Prerequisites
-
Entrust KeyControl has been deployed and configured.
-
VMware vSphere has been deployed and configured using vCenter.
-
You have administrator rights to manage the KMS configuration in vCenter.
Create the KMS cluster in vCenter
For more detail on how to do this, see Creating the KMS Cluster in vSphere .
-
Launch the vSphere Web Client and log into the vCenter server that you want to add to Entrust KeyControl.
-
Select the required vCenter Server in the Global Inventory Lists .
-
Select the Configure tab.
-
In the left-hand pane, select Security > Key Providers .
-
Select Add Standard Key Provider .
-
In the Add Standard Key Provider dialog, set the following configuration options:
-
For Name , enter the name of the cluster.
-
For each node in the KeyControl cluster, enter the KMS (node name), IP Address and Port . The default port is 5696.
ImportantMake sure that the KMIP server resides on a device that is not encrypted. The KMIP server must be available to provide the keys for the encrypted devices before the encrypted devices can be accessed. NoteTo add an extra node line, select Add KMS . -
Open and set Proxy Configuration if you are using a proxy.
-
Password protection is optional.
-
-
Select Add Key Provider .
-
In the Make vCenter Trust Key Provider dialog, confirm the details for each node and then select Trust . For example:
This adds the KMS cluster to vCenter but the connection status will be KMS not connected with Certificate issues . For example:
Establish a trusted connection between the KMS cluster and the Entrust KeyControl server
-
Launch the vCenter vSphere Web Client and log into the vCenter server to which you added the KeyControl KMS cluster.
-
Select the Configure tab for the server.
-
In the left-hand pane, select Security > Key Providers .
-
Select the KeyControl KMS cluster in the list, then scroll down to where the nodes are displayed.
-
Select one of the nodes, then select on Establish Trust > Make KMS trust vCenter . For example:
-
In the Choose method pane of the Make KMS Trust vCenter dialog, select KMS certificate and private key .
-
Select Next .
-
In the Upload KMS Credentials pane of the Make KMS Trust vCenter dialog, you need to upload the
certname.pem
file created during the certificate creation process described in theEntrust KeyControl nshield Integration guide
. This file needs to be uploaded for the KMS certificate, and then uploaded again for the private key. To do this:-
For KMS certificate , select Upload file . Then select the
certname.pem
file and select Open . -
For Private key , select Upload file . Then select the
certname.pem
file again and select Open . -
Select Establish Trust .
-
-
Wait until vCenter reports that the connection status for the KMS cluster has changed to Connected . For example:
Enable Encryption for target servers
Enable encryption using VMware Storage Policies.
-
Launch the vSphere Web Client and log into the vCenter server.
-
Locate a VM that you would like to encrypt.
-
Make sure the Power state of the VM is Powered Off .
-
Right-click the VM for which you would like to enable encryption, and select VM Policies > Edit VM Storage Policies .
-
Select the storage policy VM Encryption Policy and select OK .
This will trigger a reconfiguration of the VM.
After the reconfiguration is complete, the disks are encrypted and the keys are managed by the configured KMS (KeyControl).
Check encryption at the VM level
-
Launch the vSphere Web Client and log into the vCenter server.
-
Locate a VM, and select it.
-
In VM View , select the Summary tab.
-
Under VM Hardware > Encryption , the status should be:
VM configuration files are encrypted. Hard disk is encrypted.
Check encryption by looking for the Keys in the Entrust KeyControl KMS
-
Log into the KeyControl web user interface using the Tenant Login URL.
-
Select the Objects tab to view a list of KMIP Objects . This will include the newly created keys. For example:
-
Select one of the keys to display its details. For example:
-
In the main screen, select the Audit Logs tab to view the log records related to the key creation process. For example:
For more information on this topic, refer to Virtual Machine Encryption on the VMware documentation site.
Enable Data-At-Rest encryption on an existing vSAN cluster
To enable Data-At-Rest encryption on an existing vSAN cluster, refer to Using Encryption in a vSAN Cluster . on the VMware documentation site.
-
Integration GuideVMware vSphere and Entrust KeyControl Integration Guide
-
Web PageEntrust KeyControl Integration with VMware vCenter
-
ProductsKeyControl
-
ProductsnShield Connect
-
ProductsnShield as a Service