VSphere ICM 8 Lab 06
VSphere ICM 8 Lab 06
0
INSTALL, CONFIGURE, MANAGE
Contents
Introduction .............................................................................................................................................. 3
Objective ................................................................................................................................................... 3
Lab Topology ............................................................................................................................................. 4
Lab Settings ............................................................................................................................................... 5
1 Prepare the Lab Environment ........................................................................................................... 6
2 View Active Directory Users ............................................................................................................ 14
3 Assign Root-Level Global Permission to an Active Directory User ................................................... 17
4 Add an ESXi Host to Active Directory and Assign Object Permission to an Active Directory User ... 19
5 Verify that the cladmin User Can Access Content Library ............................................................... 23
6 Verify that the studentadmin User Can Perform Virtual Machine Actions...................................... 27
Introduction
In this lab, you will view the list of Active Directory (AD) users to verify that the ad.vclass.local users
exist, and assign roles and permissions so that an AD user can perform functions in vCenter Server.
In vCenter 8, users, groups, and permissions are used to control access to the vCenter Server and its
resources.
• Users: Individual accounts that are created and managed within c. Each user is assigned a
unique username and password and can be a member of one or more groups.
• Groups: Collections of users that are used to manage permissions. Permissions can be assigned
to groups, rather than individual users, making it easier to manage access for a large number of
users.
• Permissions: Used to control access to the vCenter Server and its resources. They determine
what actions a user or group can perform within the vCenter environment. For example, a user
with the appropriate permissions may be able to create and manage Virtual Machines (VMs),
while another user may only be able to view the existing VMs.
• Roles: Used to control access and define the actions that users can perform within the virtual
environment. Roles are assigned to users or groups, and the permissions and privileges
associated with a role determine what a user can do within vCenter Server. There are several
predefined roles in vCenter Server, such as Administrator, No Access, Read Only, etc., and
administrators can also create custom roles to meet their specific requirements. By assigning
appropriate roles to users, administrators can ensure that users have the right level of access
and permissions to perform their tasks, while limiting their ability to cause unintended changes
or disruptions.
In vCenter 8, permissions can be assigned at different levels of the vCenter Server hierarchy, such as
the vCenter Server level, the Datacenter level, and the VM level. This allows for granular control over
access to resources.
In addition, vCenter 8 also supports the use of Role-based access control (RBAC) where permissions are
assigned to predefined roles and users are assigned to those roles. This allows for a more efficient way
to manage access control, by not having to create custom permissions every time a new user is added.
Objective
• View AD users
• Assign root-level global permission to an AD user
• Assign Object Permission to an AD user
• Verify that the cladmin user can access the Content Library
• Verify that the studentadmin user can create a VM
Lab Topology
Lab Settings
The information in the table below will be needed to complete the lab. The task sections further below
provide details on the use of this information.
In this task, you will utilize the techniques learned in Lab 5. You will join sa-vcsa.vclass.local to the
ad.vclass.local domain, and set ad.vclass.local as the default identity source.
To launch the console window for a VM, either click on the machine’s
graphic image from the topology page, or click on the machine’s
respective tab from the Navigator.
2. Launch the Mozilla Firefox web browser by either clicking on the icon found in the bottom toolbar
or by navigating to Start Menu > Internet > Firefox Web Browser.
If the VMware Getting Started webpage does not load, please wait an
additional 3 - 5 minutes, and refresh the page to continue. This is
because the vCenter Server Appliance is still booting up and requires
extra time to initialize.
4. To log in to the vCenter Server Appliance, enter [email protected] for the username and
NDGlabpass123! for the password. Click LOGIN.
7. In the Configuration pane, select Identity Provider and click Active Directory Domain. Verify that
the sa-vcsa.vclass.local node is selected. Click JOIN AD.
8. In Join Active Directory Domain window, enter ad.vclass.local for the Domain, administrator for the
Username, and NDGlabpass123! for the Password. Click JOIN.
9. Verify that sa-vcsa.vclass.local has successfully joined the ad.vclass.local AD. Click Acknowledge on
the pop-up dialog box.
10. Restart the vCenter Server Appliance using the vCenter Server Appliance Management Interface.
Port 5480 is the default port used to access the vCenter Server
Appliance Web User Interface. The VMware vCenter Server Appliance
Management Interface (VAMI) is used to perform administrative tasks
such as changing the host name, network configurations, and
applying updates and patches.
b. In the Username text field, type [email protected] and in the Password text field, type
NDGlabpass123!. Click LOGIN.
c. From the Actions drop-down menu in the top right corner, select Reboot.
11. Go back to the vSphere Client tab, and refresh the screen periodically until the vSphere Client login
page appears.
The reboot process takes 5 - 10 minutes to complete. During this time, the
vSphere Client is unavailable. You will not be able to add ad.vclass.local as an
identity source until the reboot process is complete.
12. Log in to the vCenter Server Appliance, enter [email protected] for the username and
NDGlabpass123! for the password. Click LOGIN.
15. In the Configuration pane, select Identity Provider and click Identity Sources. Notice the
vclass.local and localos domains appear as identity sources.
17. In the Add Identity Source window, verify that Active Directory (Integrated Windows
Authentication) is selected. Verify that AD.VCLASS.LOCAL is listed as the Domain name. Ensure
that Use machine account it selected, and click ADD.
18. In the Identity Source window, verify that AD.VCLASS.LOCAL is listed as an identity source. Select
the AD.VCLASS.LOCAL, and click SET AS DEFAULT.
20. Leave the vSphere Client open and continue to the next task.
In this task, you will view the list of AD users and confirm that the studentadmin and cladmin single
sign-on accounts exist.
It is good practice to review AD users in vCenter because it helps ensure that only authorized users
have access to the virtual environment and that user permissions are configured correctly.
• Security: Reviewing AD users helps prevent unauthorized access to the virtual environment and
helps ensure that sensitive data and systems are protected.
• Compliance: Regularly reviewing AD users can help ensure that security and compliance
policies are being followed and that user access is in line with regulatory requirements.
• Best Practices: Regularly reviewing AD users helps identify and remove inactive or unused
accounts, reducing the attack surface and improving the overall security posture.
• Auditing: Reviewing AD users can help with auditing and compliance reporting, as
administrators can easily see who has access to the virtual environment and what actions they
can perform.
By regularly reviewing AD users in vCenter, administrators can help ensure that their virtual
environment is secure, compliant, and running efficiently, improving the reliability and performance of
their virtualized infrastructure.
2. In the Navigator, under Single Sign On, select Users and Groups.
3. In the Users and Groups pane, on the Users tab, verify that AD.VCLASS.LOCAL is selected from the
drop-down menu.
4. In the AD.VCLASS.LOCAL domain, you should see the studentadmin and cladmin users.
You may need to scroll through the Users window to verify that both
studentadmin and cladmin are listed.
5. Leave the vSphere Client open, and continue to the next task.
In this task, you will grant global permission to cladmin to administer content libraries.
Content libraries are located directly under the global root object. You will assign the Content Library
Administrator role to [email protected] at the global root object. This role gives the cladmin user
administrator rights for all content libraries only.
Assigning the cladmin user to only administer content libraries in vCenter can provide a more secure
and controlled environment. By only allowing this user to manage content libraries, you can limit their
access to other areas of the vCenter environment that they do not need to access. This can help
prevent accidental changes or misconfigurations in other areas of the environment.
It can also help separate the responsibilities of different users and teams. For example, if a team is
responsible for managing content libraries, it makes sense to assign a user specifically to that team to
handle the content library management, while other users are responsible for other aspects of the
environment. This can make it easier to identify who is responsible for different tasks and to
troubleshoot any issues that may arise.
Furthermore, it can help in auditing and compliance requirements. By having a separate user for
content libraries management, it is easier to track who has access and performed actions on the
content libraries, which can be helpful for compliance and regulatory audits.
Overall, assigning the cladmin user to only administer content libraries in vCenter can provide a more
secure and organized environment by limiting user access, separating responsibilities, and providing a
clear audit trail.
3. In the Add Permission window, from the drop-down Domain menu, select AD.VCLASS.LOCAL. Type
cla and select cladmin for the User/Group. From the Role drop-down menu, select Content library
administrator (sample). Check the Propagate to children box, and Click OK.
Ensure that you select AD.VCLASS.LOCAL and not vclass.local for the domain.
4. Verify that AD.VCLASS.LOCAL\cladmin appears in the list, is assigned the Content Library
Administrator (sample) role, and is assigned global permission at the global root object.
5. Leave the vSphere Client open and continue to the next task.
4 Add an ESXi Host to Active Directory and Assign Object Permission to an Active
Directory User
In this task, you will assign permission at the vCenter level to the studentadmin user. This permission
will propagate to the child objects of vCenter.
Adding an object permission to the studentadmin user in vCenter can provide more granular control
over the access and actions that the user is able to perform within the vCenter environment. Object
permissions in vCenter allow you to specify the specific actions that a user or group can perform on a
particular object.
For example, if the studentadmin user is responsible for managing a specific set of VMs, by adding an
object permission to the user, you can ensure that they are only able to perform the necessary actions
on those VMs, such as starting or stopping them, and not on other VMs in the environment.
By adding an object permission to the studentadmin user in vCenter, you can also help limit the
potential for accidental changes or misconfigurations. It also helps in providing a more organized way
of managing access and responsibilities.
Additionally, it can be helpful in auditing and compliance requirements. By having a separate user for
studentadmin with specific object permissions, it is easier to track who has access and performed
actions on the specific object, which can be helpful for compliance and regulatory audits.
Overall, adding an object permission to the studentadmin user in vCenter can provide more granular
control over access and actions, limit potential for accidental changes, and provide a clear audit trail.
1. In Firefox, launch a new tab. Click to open the [Client] sa-esxi-01 VMware Host Client.
If the Warning: Potential Security Risk Ahead page appears, click Advanced,
and Accept the Risk and Continue.
2. On the VMWARE Host Client page, type root for the Username and NDGlabpass123! for the
Password. Click LOGIN.
If the Help us improve the VMware Host Client pop-up window appears, you
have the option to Join the VMware Customer Experience Improvement
Program (CEIP) or not join. For this task, leave the default, and click OK.
3. In the Navigator, click on the Manage tab. In the sa-esxi-01.netlab.local – Manage window, click on
Security & users, Authentication, and Join domain.
4. In the Join Domain window, type ad.vclass.local for the Domain name, type administrator for the User
name, type NDGlabpass123! for the Password, and click JOIN DOMAIN.
5. Monitor the Recent tasks pane, and wait for the task to complete.
6. On the sa-esxi-01.vclass.local web client window, you will notice that Active Directory enabled has a
status of Yes, which means that you have successfully enabled Active Directory on the sa-esxi-01
host.
10. On the Hosts and Clusters tab, expand sa-vcsa.vclass.local and ICM-Datacenter. Select sa-esxi-
01.vclass.local.
11. In the sa-esxi-01.vclass.local pane, select the Permissions tab, and click ADD.
12. In the Add Permission window, from the Domain drop-down menu, select AD.VCLASS.LOCAL. Type
student and select studentadmin for the User/Group. From the Role drop-down menu, change the
role to Virtual machine user (sample). Select Propagate to children and click OK.
Ensure that you select AD.VCLASS.LOCAL and not vclass.local for the domain.
13. Verify that AD.VCLASS.LOCAL\studentadmin appears in the list, is assigned the Virtual machine
user (sample) role, and is Defined In This object and its children.
14. Logout of the vSphere Clienty and continue to the next task.
In this task, you will verify that [email protected] can access only the Content Library pane. This
user does not have access to administrative tasks such as creating VMs.
1. Log in to the vCenter Server Appliance, enter [email protected] for the username and
NDGlabpass123! for the password. Click LOGIN.
4. In the Content Libraries pane, verify that you have the correct privileges to CREATE a content
library, but do not create a content library at this time.
6. On the Hosts and Clusters tab, expand sa-vcsa.vclass.local. Right-click on ICM-Datacenter and look
at the Actions that are grayed out.
Actions in the ICM-Datacenter object may be grayed out for several reasons.
One possible reason is that the user does not have the necessary permissions
to access or modify them.
6 Verify that the studentadmin User Can Perform Virtual Machine Actions
In this task, you will verify that [email protected] can only use VMs. This user does not
have access to administrative tasks such as creating VMs, or any other administrative task.
The Virtual Machine User (sample) permission is a role that allows a user to perform various actions on
VMs within a vCenter Inventory. This role has a limited set of permissions compared to the
Administrator role, such as:
It is worth noting that the exact set of permissions included with the Virtual Machine User role can be
customized and modified by a vCenter Administrator.
1. Log in to the vCenter Server Appliance, enter [email protected] for the username and
NDGlabpass123! for the password. Click LOGIN.
4. On the Hosts and Clusters tab, expand sa-vcsa.vclass.local, ICM-Datacenter, and sa-esxi-
01.vclass.local. Select sa-vcsa.vclass.local. Notice that studentadmin does not have privileges to
view sa-vcsa.vclass.local object.
5. Select ICM-Datacenter. Notice that studentadmin does not have privileges to view ICM-Datacenter
object.
6. Select sa-esxi-01.vclass.local. Notice that you can view the sa-esxi-01 object.
7. Expand and right-click on sa-esxi-01.vclass.local. Notice all the Actions grayed out. The
studentadmin account does not have access to modify any settings of sa-esxi-01.vclass.local.
Notice the studentadmin account cannot create new VMs, add networking, or
assign licenses.
8. Right-click on LinuxCLI-01 and select Power. Notice the Actions that are available.
The studentadmin account has been granted permissions to only use the VMs
on the host sa-esxi-01. This account does not have permission to make
modifications or changes to the settings of the VMs that reside on this host.
This restriction is likely in place to ensure that the VMs on sa-esxi-01 are not
accidentally or intentionally modified, which could cause them to malfunction
or become unstable. Additionally, it may be to prevent accounts with the
Virtual Machine User (sample) permission from making changes that would
negatively impact other administrators or the host itself.
10. Log in to the vCenter Server Appliance, enter [email protected] for the username and
NDGlabpass123! for the password. Click LOGIN.
12. On the Hosts and Clusters tab, expand sa-vcsa.vclass.local and ICM-Datacenter. Select sa-esxi-
01.vclass.local.
13. In the sa-esxi-01.vclass.local pane, select the Permissions tab. Select the AD\studentadmin
account and click EDIT.
14. In the Change Role window, change the Role in the drop-down menu to Administrator. Click OK.
This would give the studentadmin account more flexibility and control over the
virtual environment, and would allow them to perform more advanced tasks
and experiments.
15. Verify that AD.VCLASS.LOCAL\studentadmin appears in the list, is assigned the Administrator Role,
and is Defined In This object and its children.
17. Log in to the vCenter Server Appliance, enter [email protected] for the username and
NDGlabpass123! for the password. Click LOGIN.
20. On the Hosts and Clusters tab, expand sa-vcsa.vclass.local, ICM-Datacenter, and sa-esxi-
01.vclass.local. Select sa-vcsa.vclass.local. Notice that studentadmin still does not have privileges
to view sa-vcsa.vclass.local object.
21. Select ICM-Datacenter. Notice that studentadmin still does not have privileges to view ICM-
Datacenter object.
22. Select sa-esxi-01.vclass.local. Notice that you can still view the sa-esxi-01 object.
23. Right-click and expand sa-esxi-01.vclass.local and notice that you now have access to make
changes on the sa-esxi-01.vclass.local host.
24. Right-click on LinuxCLI-01 and select Power. Notice the Actions that are available.
In vSphere, roles and permissions are used to control access to vSphere objects
and their associated actions. Roles are collections of privileges that can be
assigned to users and groups to control their access to vSphere objects. Each
role is associated with a set of privileges that determine the actions that can
be performed on an object.
vSphere also allows for the use of object-level permissions, which allows
setting permission for an individual object rather than for an entire
datacenter. This can be useful for situations where you want to give a user
access to a specific VM, but not to other VMs in the same datacenter.
25. The lab is now complete; you may end your reservation.