Book Image

Microsoft System Center Virtual Machine Manager 2012 Cookbook

By : EDVALDO ALESSANDRO CARDOSO, Edvaldo Alessandro Cardoso Sobrinho
Book Image

Microsoft System Center Virtual Machine Manager 2012 Cookbook

By: EDVALDO ALESSANDRO CARDOSO, Edvaldo Alessandro Cardoso Sobrinho

Overview of this book

Microsoft System Center 2012 is a comprehensive IT infrastructure, virtualization, and cloud management platform. With System Center 2012, you can more easily and efficiently manage your applications and services across multiple hypervisors as well as across public and private cloud infrastructures to deliver flexible and cost-effective IT services for your business.This cookbook covers architecture design and planning and is full of deployment tips, techniques, and solutions designed to show users how to improve VMM 2012 in a real world scenario. It will guide you to create, deploy, and manage your own Private Cloud with a mix of Hypervisors: Hyper-V, Vmware ESXi, and Citrix XenServer. It also includes the VMM 2012 SP1 features.This book is a cookbook that covers architecture design, planning and is full of deployment tips, techniques and solutions designed to show users how to improve VMM 2012 in a real world scenario. It will guide you to create, deploy and manage your own Private Cloud with a mix of Hypervisors : Hyper-V, Vmware ESXi and Citrix XenServer.
Table of Contents (16 chapters)
Microsoft System Center Virtual Machine Manager 2012 Cookbook
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Configuring distributed key management


Distributed key management (DKM) is used to store VMM encryption keys in Active Directory Domain Services (AD DS).

When installing VMM, for security reasons (recommended, as it encrypts the information on AD) and when deploying HA VMM (required), choose to use DKM on the Configure service account and distributed key management page.

Why do we need the DKM? By default, using the Windows Data Protection API (DPAPI), VMM encrypts some data in the VMM database (for example, the Run As account credentials and passwords), and this data is tied to the VMM server and the service account used by VMM. However, with DKM, different machines can securely access the shared data.

Once an HA VMM node fails over to another node, it will start accessing the VMM database and use the encryption keys conveniently stored under a container in AD to decrypt the data in the VMM database.

Getting ready

The following are some considerations for using distributed key management in...