I'm having problems finding actual, deep technical information about WHY i should use the solutions built into vCenter, specifically smart card and authentication proxy. Googling the subject y...
See more...
I'm having problems finding actual, deep technical information about WHY i should use the solutions built into vCenter, specifically smart card and authentication proxy. Googling the subject yield hundreds of nice walk through's of HOW to enable/install, or simplistic high level "this is safe, do this"-articles. What i need is low-level information about what traffic is moving between vCenter - ESXi - Active Directory and using what protocols. Educated guessing how it "probably" works wont get me through the security audit process. My situation is; In the system I'm building smart card is already implemented, login to vCenter is done through the vSphere Authentication Plugin. I see no reason to add another layer of authentication complexity to the system, by setting up smart card in vCenter as well. Add to this the fact that the vCenter smart card model is too basic to handle the double PKI structure of my Active Directory. Smart card certificates is handled through an external PKI supplier and it doesn't seem like vCenter can handle separate "smart card "UPN's" for accounts received from active directory. I'm "bound" by the STIG hardening guidelines for Vmware which states that authentication proxy should be installed. The STIG guidelines does not however, require the use of smart cards which is a bit surprising. I would have expected the other way around ... To my understanding; By using smart card to login to the client and the authentication plugin to connect to vCenter, all authorization is thereby managed by kerberos tickets and there are no need to save multiple login credentials in vCenter. This effectively should negate the main arguments for using both "smart card" and "authentication proxy" ... or? The only credentials saved in vCenter are the ones used to connect vCenter to Active Directory, this is of course done using a locked down AD service accounts. The same credentials is used to connect the ESXi-hosts. Again, it's hard to find information about HOW and WHERE those credentials are saved in vCenter; Are they hashed? Enrypted? All of the above? Algorithms? It's really easy to find high-level, almost stupefying information text about these subjects, but it's almost impossible to find any actual, technical information. If doesn't get easier when 80% of the information, even on the VMware website, only applies to old version and/or Windows based versions of vCenter. Is all the deep, technical information hidden behind some kind of "VMware Partner"-abstraction layer?