By default, the user with the vCenter Server Administrator role has all Cryptographic Operations privileges. You can assign the
No cryptography administrator role to all vCenter Server administrators who do not need cryptographic privileges.
The user with the vCenter Server Administrator role has all privileges by default. You can assign the No cryptography administrator role to vCenter Server users who do not need Cryptographic Operations privileges. The
No cryptography administrator lacks the following privileges for cryptographic operations:
To further limit what users can do, you can clone the No cryptography administrator role and create a custom role with only some of the
Cryptographic Operations privileges. For example, you can create a role that allows users to encrypt but not to decrypt virtual machines, or that does grant privileges for management operations. See the
vSphere Security manual for details.
Assume a cluster that includes three ESXi hosts, host A, B, and C. You add an encrypted virtual machine to host A. What happens depends on several factors. If all three hosts have encryption enabled, you can create an encrypted virtual machine if you have Encrypt new privileges. If none of the hosts has encryption enabled, and you have
Register host privileges on host A, then the virtual machine creation process enables host encryption on that host; otherwise an error results. The scenario is more complicated if host B or C is not enabled for encryption; see the
vSphere Security guide for details.