Information security and access design details the design decisions covering authentication and access controls for Site Recovery Manager and vSphere Replication, as well as password and certificate management.
Identity Management Design for Site Protection and Disaster Recovery for VMware Cloud Foundation
You use a service account for authentication and authorization of Site Recovery Manager to vCenter Server for orchestrated disaster recovery of the SDDC.
Decision ID |
Design Decision |
Justification |
Implication |
---|---|---|---|
SPR-SRM-SEC-001 |
Configure a service account in vCenter Server for application-to-application communication from Site Recovery Manager to vSphere. This user account must be a member of the vCenter Single Sign-On administrator group. |
Provides the following access control features:
|
You must maintain the service account's life cycle outside of VMware Cloud Foundation to ensure its availability. |
SPR-VR-SEC-002 |
Configure a service account in vCenter Server for application-to-application communication from vSphere Replication to vSphere. This user account must be a member of the vCenter Single Sign-On administrator group. |
Provides the following access control features:
|
You must maintain the service account's life cycle outside of VMware Cloud Foundation to ensure its availability. |
SPR-VR-SEC-003 |
Use global permissions when you create the Site Recovery Manager and vSphere Replication service accounts in vCenter Server. |
Simplifies and standardizes the deployment of the service account across all vCenter Server instances in the same vSphere domain.
|
All vCenter Server instances must be in the same vSphere domain. |
Password Management Design for Site Protection and Disaster Recovery for VMware Cloud Foundation
To ensure continued access to vSphere Replication and Site Recovery Manager, you must manage the life cycle of the accounts passwords for the vSphere Replication and the Site Recovery Manager appliances.
As the vSphere Replication and the Site Recovery Manager appliances are not integrated with VMware Cloud Foundation, SDDC Manager does not manage the life cycle of the local user accounts.
Password Policies for vSphere Replication and Site Recovery Manager
Within the vSphere Replication and the Site Recovery Manager appliances, you can enforce password polices for access through the virtual appliance console and SSH. You can configure these password policies by using the pluggable authentication module (PAM) that is part of the operating system of the virtual appliance. The password policies apply only to local user accounts.
Password Expiration Policy for vSphere Replication and Site Recovery Manager
Local User |
Setting |
Default |
Description |
---|---|---|---|
root |
|
99999 |
Maximum number of days between password change |
|
0 |
Minimum number of days between password change |
|
|
7 |
Number of days of warning before a password expires |
Password Complexity Policy for vSphere Replication and Site Recovery Manager
Setting | Default | Description |
---|---|---|
|
8 |
Minimum password length (number of characters) |
|
4 |
Minimum number of character types that must be used (for example, uppercase, lowercase, digits, and so on) |
|
4 |
Minimum number of characters that must be different from the old password |
|
0 |
Maximum number of times a single character can be repeated |
|
3 |
Maximum number of retries |
|
5 |
Maximum number of passwords the system remembers |
Setting | Sample Value | Description |
---|---|---|
dcredit |
-1 | Maximum number of digits that generate a credit |
ucredit |
-1 | Maximum number of uppercase characters that generate a credit |
lcredit |
-1 | Maximum number of lowercase characters that generate a credit |
ocredit |
-1 | Maximum number of other characters that generate a credit |
Account Lockout Policy for vSphere Replication and Site Recovery Manager
Setting |
Default |
Description |
---|---|---|
|
5 |
Maximum number of authentication failures before the account is locked |
|
1800 |
Amount of time in seconds that the account remains locked |
|
1800 |
Amount of time in seconds that the root account remains locked |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
SPR-VR-SRM-SEC-004 |
Configure the password expiration policy for the vSphere Replication and the Site Recovery Manager appliances. |
|
You can manage the password expiration policy on the vSphere Replication appliance and the Site Recovery Manager appliance by using the virtual appliance console or a Secure Shell (SSH) client. |
SPR-VR-SRM-SEC-005 |
Configure the password complexity policy for the vSphere Replication and the Site Recovery Manager appliances. |
|
You can manage the password complexity policy on the vSphere Replication appliance and the Site Recovery Manager appliance by using the virtual appliance console or a Secure Shell (SSH) client. |
SPR-VR-SRM-SEC-006 |
Configure the account lockout policy for the vSphere Replication and theSite Recovery Manager appliances. |
|
You can manage the account lockout policy on the vSphere Replication appliance and the Site Recovery Manager appliance by using the virtual appliance console or a Secure Shell (SSH) client. |
Site Recovery Manager and vSphere Replication Password Management
Changing the passwords periodically or when certain events occur, such as an administrator leaving your organization, increases the security posture and health of the system.
For more information, see the Password Management documentation for VMware Cloud Foundation.
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
SPR-VR-SRM-SEC-007 |
Change the vSphere Replication appliance and Site Recovery Manager appliance root passwords on a recurring or event-initiated schedule by using the virtual appliance console or a Secure Shell (SSH) client. |
By default, the passwords for the vSphere Replication and the Site Recovery Manager root accounts never expire. |
You must routinely perform the password change for the root accounts by using the virtual appliance console or a Secure Shell (SSH) client. |
SPR-VR-SRM-SEC-008 |
Change the vSphere Replication appliance and Site Recovery Manager appliance admin account passwords on a recurring or event-initiated schedule by using the virtual appliance console or a Secure Shell (SSH) client. |
By default, the passwords for the vSphere Replication and the Site Recovery Manager admin accounts never expire. |
You must routinely perform the password change for the admin accounts by using the virtual appliance console or a Secure Shell (SSH) client. |
Certificate Management Design for Site Protection and Disaster Recovery for VMware Cloud Foundation
To provide secure access and communication for vSphere Replication and Site Recovery Manager, you replace the default self-signed certificate with a CA-signed certificate
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
SPR-SRM-SEC-009 |
Replace the default self-signed certificate in each Site Recovery Manager instance with a CA-signed certificate. |
Ensures that all communication to the externally facing Web UI of Site Recovery Manager and cross-product communication are encrypted. |
You must have access to a Public Key Infrastructure (PKI) to acquire certificates. |
SPR-VR-SEC-0010 |
Replace the default self-signed certificate in each vSphere Replication instance with a CA-signed certificate. |
Ensures that all communication to the externally facing Web UI for vSphere Replication and cross-product communication are encrypted. |
You must have access to a Public Key Infrastructure (PKI) to acquire certificates. |