hi i have 3 ESXi host 5.1 under one cluster with vcenter 5.1 ,
so My question is i need to give access to some VM machine and i don't want them to display other clustered in the same vcenter.
What you will have to do is give No access at the cluster level for role and At the VM's you want to give access select permissions tab and assign the required role. This way they will not see any other machine but the machines they have permission for.
thank for ur support , but i think by this way he can see all clusters and hosts but he will not have access , correct me if am wrong.
You could do this.
Give No Access to the user at the vCenter Level.
Go to the particular cluster you want to give permissions for. Then click on the permissions tab of that cluster and give the user Administrator access(or whatever role you intend to give). It will ask to override the inherited permissions, say Yes.
Now when the user logs in, he/she will see only one cluster under the vCenter.
No access will remove the visibility to the object.
So to answer you question
No he will not see all hosts and clusters. He will see only the cluster where you gave him/her access for.
Thanks buddy let me apply and let you know.
Three of the pre-established roles are permanent, meaning that the privileges associated with that role cannot be modified. These permanent roles are available to a stand-alone ESX or ESXi server, or to vCenter Server. The remaining eight are sample roles which can be modified as needed. These eight roles are exclusive to vCenter Server.
Below are the pre-established roles:
The privileges assigned to a pre-defined role are more comprehensive than described as above, so if you want to know exactly what permissions a role allows to a user, you can view the selected privileges when assigning the role to a user or group.
VMware automatically allows users access to child objects. For example, if a user has been given read-only rights for a folder, that user will have read-only rights for all of the sub-folders as well. You can disable this setting, if necessary, when allocating roles.
You can change the privileges associated with the sample roles listed above. Before editing a role, however, it’s recommended that you clone the role first.
1. Log in to vSphere with administrative rights. Click “Home,” then “Roles.”
2. Select the role from the left pane and then click “Clone Role” to create an exact copy of the role.
3. Choose the clone from the left pane. Click “Administration,” “Role,” and then “Edit Role.”
4. Select or deselect the appropriate privileges from the options. Expand a privilege to see the child privileges. If you aren’t sure what a privilege does, select it and then read the description on the bottom of the window.
5. Give the role a descriptive name and then click “OK” to modify the role.
You can also create custom roles if the pre-established roles don’t meet your needs.
1. In vSphere, click “Home” and then click “Roles.”
2. Click “Add Role.” Select the preferred options from the list, and then create a name for the new role.
3. Click “OK.”
Once you’ve created or modified the roles as needed, you can assign the roles to the users and groups associated with your ESX/ESXi host or vCenter Server.
There a few things to keep in mind when configuring access controls in VMware, however. First of all, if a group is assigned a role, all of the users in that group are given those same privileges unless the users have roles of their own assigned. Second of all, if a user is assigned privileges in VMware, those privileges take precedence over the privileges of the group.
For example, User A and User B are assigned to Group 1. Group 1 has been assigned the Read-Only role. User A doesn’t have a role assigned to it, so it automatically gets all of the permissions given to Group 1. User B, however, has been assigned the No Access role, so User B has no permissions at all.
VMware also validates the users and groups in Windows Active Directory against the users and groups in vCenter Server. So, if a user or group exists in vCenter Server, but doesn’t exist in the domain, VMware will delete all of the permissions associated with the user or group during validation.
You can also assign privileges to multiple inventory objects in VMware by creating a folder and moving all of the appropriate objects to that folder.
1. Go to Home, Inventory, and then Hosts and Clusters. Click the inventory object and then click “Permissions.”
2. Right-click an empty area in the right pane, then click “Add Permissions” to open the Assign Permissions window.
3. Click “Add” and insert the appropriate user(s) or group(s). Select the desired role for the user(s) from the drop-down menu.
4. Review the list of permissions in the right pane. To prevent access to child objects, uncheck “Propagate to Child Objects.”
5. Click “OK” to assign the permissions to the selected user(s) or group(s).
To change permissions for a user or group, select the appropriate user or group from the right pane. Click “Inventory,” “Permissions,” and then “Properties.” To remove permissions, click “Inventory,” “Permissions,” and then “Delete.”
VMware provides administrators with several other options for managing users and groups — administrators can limit access to the vSphere client, for example, and instead provide access only to the Web-based client — but the above instructions describe the fundamental basics for managing access control in vSphere.
A way to do this is to create "folders" to group the VMs and assign the appropriate permissions to these folders. Your users will then only see the VM's they have independent of the view (i.e. also in the Cluster view)
André
As a.p. said, create a folder and move all the desired VMs to it. And then apply permission in folder level. The permitted users can see only the VMs available under folder, not other than that.
Thanks every one for the support.
Did you finally get it working?