You design authentication access, controls, certificate management, and firewall for vSphere with Tanzu according to industry standards and the requirements of your organization.

vSphere with Tanzu Authentication and Access Control

You integrate vSphere with Tanzu with vCenter Single Sign-On for authentication. You can use the configured identity sources for vCenter Single Sign-On, such as Active Directory, in the Supervisor. You can assign permissions to users on a given Supervisor object, such as a namespace.

You must configure vCenter Server to be able to use Active Directory as an identity source. The in-depth design and configuration guidance for Active Directory over LDAP as an identity provider for vCenter Server is part of the Identity and Access Management for VMware Cloud Foundation validated solution. It is not mandatory to implement the entire solution, but you must complete the minimum applicable design and implementation sections for vCenter Server.

Table 1. Design Decisions on Authentication and Access Control for Private AI Ready Infrastructure for VMware Cloud Foundation

Decision ID

Design Decision

Design Justification

Design Implication

AIR-TZU-SEC-001

Create a security group in Active Directory for DevOps administrators. Add users who need edit permissions within a namespace to the group and grant Can Edit permissions to the namespace for that group.

If you require different permissions per namespace, create additional groups.

Necessary for auditable role-based access control within the Supervisor and Tanzu Kubernetes Grid clusters.

You must define and manage security groups, group membership, and security controls in Active Directory.

AIR-TZU-SEC-002

Create a security group in Active Directory for DevOps administrators. Add users who need read-only permissions in a namespace to the group, and grant Can View permissions to the namespace for that group.

If you require different permissions per namespace, create additional groups.

Necessary for auditable role-based access control within the Supervisor and Tanzu Kubernetes Grid clusters.

You must define and manage security groups, group membership, and security controls in Active Directory.

Certificate Management

By default, vSphere with Tanzu uses a self-signed Secure Sockets Layer (SSL) certificate. This certificate is not trusted by end-user devices or Web browsers.

As a best practice, replace self-signed certificates with certificates that are signed by a third-party or enterprise Certificate Authority (CA).

Table 2. Design Decisions on Certificate Management for Private AI Ready Infrastructure for VMware Cloud Foundation

Decision ID

Design Decision

Design Justification

Design Implication

AIR-TZU-SEC-003

Replace the default self-signed certificate for the Supervisor management interface with a PEM-encoded, CA-signed certificate.

Ensures that the communication between administrators and the Supervisor management interface is encrypted by using a trusted certificate.

You must replace and manager certificates manually, outside certificate management automation of SDDC Manager.

AIR-TZU-SEC-004

Use a SHA-2 or higher algorithm when signing certificates.

The SHA-1 algorithm is considered less secure and has been deprecated.

Not all certificate authorities support SHA-2.

Network Segmentation with NSX

NSX has two main firewall services.

  • A gateway firewall serves as a centralized stateful firewall service for north-south traffic. It is implemented per Tier-0 gateway or Tier-1 gateway. Gateway firewalls are independent from NSX distributed firewalls from policy configuration and enforcement perspective, providing a means for defining perimeter security control in addition to distributed security control.
  • A distributed firewall, embedded in the hypervisor kernel, provides visibility and control for virtualized workloads and networks for east-west traffic. Because the data plane of a distributed firewall runs at the vNIC level of each virtual machine, it can enforce access controls and inspect every flow for threats without traffic hair-pinning to a gateway firewall.
Figure 1. Microsegmentation for Private AI Infrastructure


Distributed Firewall for Antrea-Based Kubernetes Clusters

NSX distributed firewall works with Antrea to secure traffic within an Antrea-based Kubernetes cluster. Antrea is a Container Network Interface (CNI) plug-in for Kubernetes that supports networking for container workloads. Tanzu Kubernetes Grid clusters use Antrea as the default CNI.

You must register Antrea-based Kubernetes clusters in NSX Manager to connect the NSX Manager control plane to the Antrea Central Control Plane Adapter. You can then create distributed firewall policies (security policies) in NSX and apply them to one or more Antrea-based Kubernetes clusters. The Antrea network plug-in creates an Antrea cluster network policy (ACNP) for each security policy that is applied to the Antrea-based Kubernetes clusters. If the rules contain sources, corresponding ingress rules are created in the ACNP. If the rules contain destinations, corresponding egress rules are created in the ACNP.

While you can update and delete the Antrea cluster network policies from the kubectl command line tool, keep in mind that such changes are not displayed in NSX Manager.

For more information on how to integrate Antrea with NSX distributed firewall, see Integration of Kubernetes Clusters with Antrea CNI in the VMware NSX Administration Guide.

Figure 2. Example of Distributed Firewall Rule Applied to an Antrea-Based Tanzu Kubernetes Grid Cluster