Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
System Center 2012 R2 Virtual Machine Manager Cookbook - Second Edition

You're reading from   System Center 2012 R2 Virtual Machine Manager Cookbook - Second Edition Over 70 recipes to help you design, configure, and manage a reliable and efficient virtual infrastructure with VMM 2012 R2.

Arrow left icon
Product type Paperback
Published in Jun 2014
Publisher
ISBN-13 9781782176848
Length 428 pages
Edition 2nd Edition
Arrow right icon
Authors (2):
Arrow left icon
EDVALDO ALESSANDRO CARDOSO EDVALDO ALESSANDRO CARDOSO
Author Profile Icon EDVALDO ALESSANDRO CARDOSO
EDVALDO ALESSANDRO CARDOSO
Edvaldo Alessandro Cardoso Sobrinho Edvaldo Alessandro Cardoso Sobrinho
Author Profile Icon Edvaldo Alessandro Cardoso Sobrinho
Edvaldo Alessandro Cardoso Sobrinho
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. VMM 2012 Architecture FREE CHAPTER 2. Upgrading from Previous Versions 3. Installing VMM 2012 R2 4. Installing a High Available VMM Server 5. Configuring Fabric Resources in VMM 6. Deploying Virtual Machines and Services 7. Managing VMware ESXi and Citrix® XenServer® Hosts 8. Managing Hybrid Clouds, Fabric Updates, Resources, Clusters, and the New Features of R2 9. Integration with System Center Operations Manager 2012 R2 10. Scripting in Virtual Machine Manager Index

Configuring Distributed Key Management


Distributed Key Management (DKM) is used to store VMM encryption keys in Active Directory Domain Services (AD DS).

When installing VMM, for security reasons (recommended, as it encrypts the information on AD) and when deploying HA VMM (required), choose to use DKM on the Configure service account and distributed key management page.

Why do we need the DKM? By default, VMM encrypts some data in the VMM database using the Windows Data Protection API (DPAPI)—for example, the Run As account's credentials and passwords—and this data is tied to the VMM server and the service account used by VMM. However, with DKM, different machines can securely access the shared data.

Once an HA VMM node fails over to another node, it will access the VMM database and use the encryption keys conveniently stored under a container in AD to decrypt the data in the VMM database.

Getting ready

The following are some considerations to use distributed key management in VMM 2012:

  • When...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image