VMware Workstation encryption technology prevents unauthorized access to virtual machines

Source: Internet
Author: User

The encryption feature of VMware Workstation prevents unauthorized users from accessing sensitive data of virtual machines. This article introduces the configuration and limitations of using Workstation encryption technology to control virtual machine access.

Encryption protects virtual machines and limits modifications to virtual machines. In the production environment, you do not want to start the virtual machine without obtaining the correct password, because unauthorized users may obtain sensitive data.

Figure 1. The VMware Workstation access control link is used to configure encryption and restriction options for virtual machines

You must enter the decryption password to access the encrypted virtual machine. Without a decryption password, you cannot access the VMDK file of the encrypted virtual machine. VMware Workstation encryption is based on the Startup Password of the physical computing hardware. For a physical computer, you can easily retrieve its hard disk and install it in any location to access the data on the hard disk.

How to create an encrypted virtual machine

You can encrypt a VM only after it is installed. After the installation is complete, close the virtual machine, select the virtual machine in the main interface of VMware Workstation, and click "Edit Virtual Machine Settings" to open the tab. Then select the "Access Control" option, as shown in Figure 1 ).

Click "encrypt" and enter the encrypted password twice ). The encryption duration is related to the size of the Virtual Machine and the processing capability of the host. The time may be long-some may be several hours. After the encryption process is complete, enter the password again before starting the VM.

Sometimes you may want to remove the encryption attribute of a virtual machine, for example, when migrating a virtual machine from Workstation to vSphere. You can encrypt virtual machines created in an insecure personal workstation environment. Decrypt the VM when it is used in the protected vSphere data center environment. VMware does not support uploading encrypted virtual machines to remote servers. Therefore, you must remove the encryption attribute of the virtual machines before migrating them to vSphere. To share with other users, you need to remove the encryption attribute of the virtual machine because the encryption algorithm includes information of the local computer. Multiple computers cannot share access to encrypted virtual machines.

Figure 2. How to remove or change the encrypted password in Workstation

Removing encryption is as easy as encrypting virtual machines. In virtual machine properties, click Edit virtual machine settings ". Enter the password and select the encryption option to remove the encryption attribute of the virtual machine. You can change the encrypted password in this interface.

Some administrators may think that encryption will adversely affect the performance of virtual machines, but this is not the case. When you decrypt a VM, You need to perform additional operations. Once the virtual machine is enabled, you can use the decrypted virtual machine just like accessing other normal virtual machines.

Although VMware Workstation encryption helps to better protect virtual machines, it brings some risks and some limitations. For example, if you forget the password, you cannot access the VM. Encrypted virtual machines cannot be used normally in the shared environment, including migrating virtual machines from Workstation to vSphere and multi-user access scenarios in the Workstation environment.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.