How to setup vSphere encryption

With the release of vSphere 6.5 VMware have drastically improved the state of vSphere security by implementing new features such as VM-level disk encryption, encrypted vMotion and support for the new secure boot model. Unfortunately, unlike Microsoft’s Hyper-V, VMware took the path of relying upon an entirely separate key management system for the storing of encryption keys.

In this guide I’m going to be showing you how to setup vSphere’s encryption features from scratch, suitable key management solutions, and my personal recommendations.


The KMS or ‘Key Management Server’ is as the name implies used to store encryption keys. They come in the form of both hardware and software appliances which run completely separately from vSphere. Once a virtual machine is encrypted, vSphere needs somewhere to save the decryption key and for that it uses the KMS.

At the time of writing VMware officially supports the use of 12 KMS products with vSphere. Some of these products are:

Generally speaking, any KMIP compliant system should be compatible with vSphere. Most modern Hardware Security Module’s (HSM) support KMIP if you do happen to have one. The above list is of products which have been specifically tested and certified by VMware.

Choosing a KMS

For this particular how-to guide I’m going to be using HyTrust’s KeyControl. This is partly because up until very recently the product was free to use, and because HyTrust offer a 60 day downloadable free trial on their website.

It’s worth nothing that most products on VMware’s certified list are not exactly cheap. From my limited research most seem to cost in the region of approx £7500 / $10,000 USD or more.

For those looking to test encryption within a lab environment I’d highly recommend HyTrust. It’s a real commercial product that’s both stable and reliable. Otherwise take a look at the free open source PyKMIP project. It’s a community driven effort to build a KMS in the python programming language.

Step 1 – Deploy the virtual KMS appliance

Within vCenter right-click on your cluster and then select Deploy OVF Template.

Screenshot of Deploying HyTrust KMS OVA virtual appliance

A wizard will launch to guide you through the installation process. The steps are quite self-explanatory. For the configuration option I selected ‘Demo’ due to the lower 1GB RAM requirement.

When prompted, provide the KMS system with a static IP address, hostname and DNS server address.

Screenshot of configuring new HyTrust OVA virtual KMS appliance

Boot up the newly deployed KMS appliance and connect to the console. Once the system has booted you’ll be prompted to set a password as shown below.

Screenshot of configuring HyTrust KMS with a password

After this confirm the KMS’s details and select No when asked if the system is part of an existing cluster.

You will now be shown the IP address of the KMS.

Screenshot of HyTrust KMS appliance IP address

Step 2 – KMS Setup

Open a browser and go to the IP address from the last step. The default username and password is secroot.

You’ll be asked to choose a new password and to enable email notifications. Enter in a secure password and then skip the email setup by ticking Disable e-mail notifications.

Screenshot of HyTrust KMS admin login portal

Once logged into KeyControl, select KMIP in the menu bar.

Here we need to change the state to enabled and the protocol to version 1.1. Once done click Apply.

Configuring KMIP on the HyTrust KMS virtual appliance

Now, still within the KMIP options, open the Client Certificates sub-heading. Select the blue Actions button and create a new certificate.

Enter in a suitable name and expiry date for the certificate and then click create. Do not specify a password as vSphere does not support this.

Screenshot of KMIP settings on HyTrust KMS
Provide the certificate with a relevant name. I’ve used ‘vSphereCert’.

Finally, on the client certificates page select the certificate that you just created and use the Download Certificate option within the blue action menu to download the .PEM files. We will need to use these files in the next step.

Screenshot of downloading the KMS certificate
Use the Actions menu to download the recently created certificate files.

We’re now done setting up HyTrust KeyControl! Onto vCenter for the next stage of setup.

Step 3 – vSphere Setup

In this step we’ll login to vCenter and setup a secure two-way trust between vSphere and the KMS. Once this trust has been established the full suite of vSphere encryption features will become available.

Within the HTML interface select the vCenter server from the left-hand menu (the top item in the list), select configure, and then Key Management Servers. I have highlighted each of the steps in the screenshot below.

Screenshot of vCenter KSM settings

Now on the KMS settings page click Add and fill in the details of the HyTRUST KeyControl appliance.

The cluster and server name are purely cosmetic and can be set to anything you like. Make sure you enter the correct IP address under server address and set the server port to 5696. Leave the rest of the fields empty. Once done select add.

Screenshot of adding a KMS to VMware vCenter

A prompt will be shown asking if you trust certificate of the KMS appliance. Select Trust.

We must now configure the KMS to trust vCenter by uploading the certificate file downloaded in step 2. Within vCenter click on the newly added KMS so it is highlighted and select Make KMS trust vCenter.

Screenshot of vCenter KMS status

At the prompt select KMS certificate and private key and then click next.

You will now be asked to upload a KMS Certificate and a KMS Private Key file. This is the certificate we created back in step 2. Open the downloaded .ZIP file and you will see two .PEM files. Ignore the ‘cacert.pem’ file, instead use the .PEM file with the name you decided upon in step 2.

Screenshot of certificate files for HyTrust KMS
Choose the .PEM file with the name you specified. Ignore ‘cacert.pem’.

Upload the .PEM file twice (for each option). Your screen should look similar to this:

Screenshot of configuring certificate with private key
I have uploaded the same .PEM file twice.

Finally, click establish trust.

This completes step 3. vSphere is now setup to encrypt workloads and save the encryption keys to the KMS server.

Step 4 – Encrypting virtual machines

In this final step we’ll now actually encrypt a virtual machine.

Within vCenter right-click on a virtual machine that you intend to encrypt, expand VM Policies and then select Edit VM Storage Policies.

Encrypting a VMware Virtual Machine
Edit the VM storage Policy.

Within the storage policy settings, select the drop-down menu (highlighted) and change this to VM Encryption Policy. Once done select OK.

Selecting a VMware VM encryption policy
Change the VM storage policy from ‘Datastore default’ to ‘VM Encryption Policy’.

That’s it! The VM will take some time to encrypt so keep an eye on the recent tasks section to see when it has finished.


In this guide I’ve shown the steps necessary to setup data-at-rest encryption within a vSphere 6.7 environment.  Due to VMware’s implementation, the use of a 3rd party KMS solution is required to store encryption keys. This is something you’ll need to investigate and decide upon yourself, however for the purpose of this guide I used HyTrust’s KeyControl software.

Unfortunately the native encryption features within vSphere 6.7 do require an enterprise plus or higher license. In a future blog post I’ll be showcasing some other slightly less-expensive ways of using encryption with VMware.

If you have any feedback or questions please send me an email or leave a comment below.

Published by Will

Network Engineer by day, blogger by night.Keen interest in cyber security and all things tech.

Leave a Reply

Your email address will not be published. Required fields are marked *