<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Discussion - Sovereign Cloud Bring Your Own Encryption Tech Preview Community Site topics</title>
    <link>https://communities.vmware.com/t5/Discussion-Sovereign-Cloud-Bring/bd-p/5416</link>
    <description>Discussion - Sovereign Cloud Bring Your Own Encryption Tech Preview Community Site topics</description>
    <pubDate>Fri, 10 Nov 2023 20:39:30 GMT</pubDate>
    <dc:creator>5416</dc:creator>
    <dc:date>2023-11-10T20:39:30Z</dc:date>
    <item>
      <title>vCD 10.4.2.2 solution add on</title>
      <link>https://communities.vmware.com/t5/Discussion-Sovereign-Cloud-Bring/vCD-10-4-2-2-solution-add-on/m-p/2993379#M30</link>
      <description>&lt;P&gt;Hi all, we are working with a Cloud Region having a fresh upgrade to vCD 10.4.2.2 and we aren't able to display the solution add on menù.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We have tried:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;/opt/vmware/vcloud-director/bin/cell-management-tool manage-config --name vmware.solutions.add.on.bootstrap.completed --value no&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As per description on the Landing Zone documentation and we have tried to restart the vCD Cells but without result (no menù Solution Add On appears).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please, could anyone suggests another option to obtain the result?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Oct 2023 17:03:32 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Discussion-Sovereign-Cloud-Bring/vCD-10-4-2-2-solution-add-on/m-p/2993379#M30</guid>
      <dc:creator>tandoiluca</dc:creator>
      <dc:date>2023-10-30T17:03:32Z</dc:date>
    </item>
    <item>
      <title>Named disks and catalog templates encryption</title>
      <link>https://communities.vmware.com/t5/Discussion-Sovereign-Cloud-Bring/Named-disks-and-catalog-templates-encryption/m-p/2991354#M12</link>
      <description>&lt;P&gt;Although we have configured a Key Provider for an OrgVDC using the BYOE add-on, we observe that the Named Disks created on that OrgVDC and the vApp templates stored in a catalog backed-up by that OrgVDC are encrypted using the default KMS, not with the KMS associated to the Key Provider assigned to the OrgVDC.&lt;/P&gt;&lt;P&gt;Is that the expected behavior? Will Named Disks and vApp Template encryption be supported by the BYOK add-on in the GA version or future versions?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Miguel&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 07:55:24 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Discussion-Sovereign-Cloud-Bring/Named-disks-and-catalog-templates-encryption/m-p/2991354#M12</guid>
      <dc:creator>m1gu3l</dc:creator>
      <dc:date>2023-10-17T07:55:24Z</dc:date>
    </item>
    <item>
      <title>Deep recrypt</title>
      <link>https://communities.vmware.com/t5/Discussion-Sovereign-Cloud-Bring/Deep-recrypt/m-p/2991353#M11</link>
      <description>&lt;P&gt;In Bring Your Own Encryption, when going to a key provider, selecting an OrgVDC and performing the "Change Key" operation, we have observed in vSphere that only a shallow recrypt (i.e., at KEK level) of the VMs is performed.&lt;/P&gt;&lt;P&gt;Is there a way to perform a deep recrypt (i.e., KEK + DEK)? If not, will it be included in the GA version or future versions of the add-on?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Miguel&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 07:47:57 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Discussion-Sovereign-Cloud-Bring/Deep-recrypt/m-p/2991353#M11</guid>
      <dc:creator>m1gu3l</dc:creator>
      <dc:date>2023-10-17T07:47:57Z</dc:date>
    </item>
    <item>
      <title>KMS server registration does not work with proxy configuration</title>
      <link>https://communities.vmware.com/t5/Discussion-Sovereign-Cloud-Bring/KMS-server-registration-does-not-work-with-proxy-configuration/m-p/2985644#M7</link>
      <description>&lt;P&gt;Dear VMware,&lt;/P&gt;&lt;P&gt;I'd like to inform you about the issue when registering a KMS server in BYOE. We have the external KMS and configuring the proxy on BYOE when registering a KMS server but after registering, it does not work. We checked on VCD UI and vCenter key Provider, the proxy settings not be saved, and the proxy settings always empty on VCD and vCenter. To fix it, we have to configure vCenter access to the internet directly to finish the Register external KMS server without Proxy settings. We are using VCD 10.5 GA.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Sep 2023 03:51:03 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Discussion-Sovereign-Cloud-Bring/KMS-server-registration-does-not-work-with-proxy-configuration/m-p/2985644#M7</guid>
      <dc:creator>nhutphan1987</dc:creator>
      <dc:date>2023-09-07T03:51:03Z</dc:date>
    </item>
    <item>
      <title>Cannot create an instance of Bring Your Own Encryption with UI</title>
      <link>https://communities.vmware.com/t5/Discussion-Sovereign-Cloud-Bring/Cannot-create-an-instance-of-Bring-Your-Own-Encryption-with-UI/m-p/2985642#M6</link>
      <description>&lt;P&gt;Dear VMware team,&lt;/P&gt;&lt;P&gt;I'd like to inform you about the issue when I tried to create the instance of BYOE with GUI following your Tech Preview Document. We can not create an instance of BYOE with UI, the error shows "can not research Public URL of VCD".&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nhutphan1987_0-1694055084474.png" style="width: 400px;"&gt;&lt;img src="https://communities.vmware.com/t5/image/serverpage/image-id/103410i2DC4B5820414DAE7/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="nhutphan1987_0-1694055084474.png" alt="nhutphan1987_0-1694055084474.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;We created an instance of BYOE with CLI successfully, we used a Linux host in the same Organization VDC of Solution Landing Zone to do that. We are using VCD 10.5 GA.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nhutphan1987_1-1694056350223.png" style="width: 400px;"&gt;&lt;img src="https://communities.vmware.com/t5/image/serverpage/image-id/103411i18DDCA8EBA1A27BD/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="nhutphan1987_1-1694056350223.png" alt="nhutphan1987_1-1694056350223.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nhutphan1987_2-1694057032613.png" style="width: 400px;"&gt;&lt;img src="https://communities.vmware.com/t5/image/serverpage/image-id/103412i1A7D661432FB3A69/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="nhutphan1987_2-1694057032613.png" alt="nhutphan1987_2-1694057032613.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Sep 2023 03:27:28 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Discussion-Sovereign-Cloud-Bring/Cannot-create-an-instance-of-Bring-Your-Own-Encryption-with-UI/m-p/2985642#M6</guid>
      <dc:creator>nhutphan1987</dc:creator>
      <dc:date>2023-09-07T03:27:28Z</dc:date>
    </item>
    <item>
      <title>Feedback on BYOEaaS</title>
      <link>https://communities.vmware.com/t5/Discussion-Sovereign-Cloud-Bring/Feedback-on-BYOEaaS/m-p/2984483#M1</link>
      <description>&lt;P&gt;I've reviewed the documentation - thanks - but haven't had a chance to test this yet.&lt;/P&gt;&lt;P&gt;It's interesting to me that this solution exists in a space in between provider and tenant. Unlike the org SSO configuration, there is some responsibility on the provider's part to establish connectivity to the KMS. However, there is still a tenant responsibility to authenticate with the KMS.&lt;/P&gt;&lt;P&gt;In the enterprise context, I can understand why this might be a good arrangement. However, in a cloud context, it is likely that the cloud provider is managing both Director and the KMS. In this case the cloud provider might have means of managing both the network connectivity to KMS as well as the authentication to KMS. As a result:&lt;/P&gt;&lt;P&gt;1. It seems desirable to me for this solution to optionally allow the provider to manage authentication instead of the tenant. In this case, the provider should be able not only to publish the KMS to a tenant org, but there should be a way to ensure that existing and new tenant VDCs are enrolled in the KMS rather than in the default key provider.&lt;BR /&gt;2. It seems highly desirable to me for APIs or CLIs to be exposed allowing the provider to automate all of this configuration. The documentation as currently written only shows UI operations.&lt;/P&gt;&lt;P&gt;In fact I had pictured that this feature would be offered by establishing a vCenter KMS connection and selecting a Key Provider per org much like vCenter today allows you to select a Key Provider per cluster. It's interesting to me that you've chosen to implement this as a solution addon instead.&lt;/P&gt;&lt;P&gt;Thanks for the opportunity to review this early!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 18:59:57 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Discussion-Sovereign-Cloud-Bring/Feedback-on-BYOEaaS/m-p/2984483#M1</guid>
      <dc:creator>smoonen</dc:creator>
      <dc:date>2023-08-29T18:59:57Z</dc:date>
    </item>
  </channel>
</rss>

