Configure Security Settings for vCenter Server from the vSphere Client
You perform the procedure on all vCenter Server instances to configure password policies, lockout policies, alarms, proxy, login banners, LDAP, and other configurations.
- In a Web browser, log in to vCenter Server by using the vSphere Client.SettingValueURLhttps://management-domain-vcenter-server-fqdn/uiUser nameadministrator@vsphere.local
- Configure the password policies.
- From theHomemenu of the vSphere Client, clickAdministration.
- UnderSingle Sign-On, clickConfiguration.
- On theLocal accountstab, underPassword policy, clickEdit.
- In theEdit password policiesdialog box, configure the settings and clickSave.Configuration IDSettingValueVMW-VC-00421Maximum lifetime60VMW-VC-00410Minimum Length15VMW-VC-01269Maximum Length64
- Configure the lockout policies.
- On theLocal accountstab, underLockout policy, clickEdit.
- In theEdit lockout policiesdialog box, configure the settings and clickSave.Configuration IDSettingValueVMW-VC-00436Maximum number of failed login attempts3VMW-VC-00434Time interval between failures900 secondsVMW-VC-00435Unlock time0 seconds
- VMW-VC-01219Configure an alert for the appropriate personnel about SSO account actions
- In theHosts and clustersinventory, select the vCenter Server that manages the ESXi host you configure.
- Click theConfiguretab, selectAlarm definitionsunderSecurity.
- ClickAdd.TheNew alarm definitionwizard opens.
- On theName and targetspage, enter the settings and clickNext.SettingValueAlarm nameSSO account actions - com.vmware.sso.PrincipalManagementTarget typevCenter Server
- On theAlarm rule 1page, underIf, entercom.vmware.sso.PrincipalManagementas a trigger and press Enter.
- Configure the remaining settings for the alarm, clickNext, and follow the prompts to finish the wizard.SettingValueTrigger the alarm andShow as warningSend email notificationsOffSend SNMP trapsOnRun scriptOff
- VMW-VC-01209Configure a login message.
- From theHomemenu of the vSphere Client, clickAdministration.
- Navigate to.
- Click theLogin messagetab and clickEdit.
- Activate theShow login messagetoggle.
- In theLogin messagetext box, enter the login message.
- Activate theConsent checkboxtoggle.
- In theDetails of login messagetext box, enter the site-specific banner text and clickSave.
- VMW-VC-01212Configure Mutual CHAP for vSAN iSCSI targets.
- In theHosts and Clustersinventory, select the vSAN-enabled cluster.
- Click theConfiguretab and undervSAN, clickServices.
- In thevSAN iSCSI target servicetile, clickEnable.
- Activate the service from the toggle switch.
- From theAuthenticationdrop-down menu, selectMutual CHAP
- Configure the incoming and outgoing users and secrets appropriately and clickApply.
- Set SDDC deployment details on the vCenter Server instances.
- In theGlobal inventory listsinventory, clickvCenter Servers.
- Click the vCenter Server object and click theConfiguretab in the central pane.
- UnderSettings, clickAdvanced settingsand clickEdit settings.
- In theEdit advanced vCenter Server settingsdialog box, enter the settings and clickAdd.
SettingValueNameconfig.SDDC.Deployed.ComplianceKitValueVCF-NIST-800-53 - VMW-VC-00422vCenter Server must terminate vSphere Client sessions after 10 minutes of inactivity.
- From theHomemenu of the vSphere Client, clickAdministration.
- UnderDeployment, clickClient configuration.
- ClickEdit, forSession timeout, enter10minutes, and clickSave.
- VMW-VC-01216vCenter must limit membership to the SystemConfiguration.BashShellAdministrators SSO group.
- From theHomemenu of the vSphere Client, clickAdministration.
- Under, clickUsers and GroupsandGroups.
- Click> next page arrowuntilSystemConfiguration.BashShellAdministratorsappears.
- ClickSystemConfiguration.BashShellAdministratorsand click three vertical dots next to the name of each unauthorized account and clickRemove Memberand clickRemove.
By default the Administrator and a unique service account similar to "vmware-applmgmtservice-714684a4-342f-4eff-a232-cdc21def00c2" will be in the group and should not be removed. - VMW-VC-01217vCenter must limit membership to the TrustedAdmins SSO group.
- From theHomemenu of the vSphere Client, clickAdministration.
- Under, clickUsers and GroupsandGroups.
- Click> next page arrowuntilTrustedAdminsappears.
- ClickTrustedAdminsand click three vertical dots next to the name of each unauthorized account and clickRemove Memberand clickRemove.
These accounts act as root on the Photon operating system and have the ability to severely damage vCenter, inadvertently or otherwise. - VMW-VC-01274The vCenter Server must disable accounts used for Integrated Windows Authentication (IWA).
- From theHomemenu of the vSphere Client, clickAdministration.
- Under, clickUsers and GroupsandUsers.
- Change the domain tovSphere.localand
- SelectK/Mandkrbtgt/VSPHERE.LOCALaccounts and clickMoreand selectDisableand clickOK.
- Repeat Step d withkrbtgt/VSPHERE.LOCALaccount
- VMW-VC-01267vCenter must require authentication for published content libraries.
- From theHomemenu of the vSphere Client, clickContent Libraries.
- Click on the target content library and clickunderActions.
- Click the checkbox to, and enter and confirmpasswordand clickOK.
Any subscribed content libraries will need to be updated to enable authentication and provide the password. - VMW-VC-01268vCenter must enable the OVF security policy for content libraries.
- From theHomemenu of the vSphere Client, clickContent Libraries.
- Click on the target content library and clickunderActions.
- Click the checkbox to, and clickOK.
If you disable the security policy of a content library, you cannot reuse the existing OVF items.