With vSphere Virtual Machine Encryption, you can encrypt your sensitive workloads in an even more secure way. Access to encryption keys can be made conditional to the ESXi host being in a trusted state.
Before you can start with virtual machine encryption tasks, you must set up a key provider. The following key provider types are available.
|Key Provider||Description||For More Information|
|Standard key provider||Available in vSphere 6.5 and later, the standard key provider uses vCenter Server to request keys from an external key server. The key server generates and stores the keys, and passes them to vCenter Server for distribution.||See Configuring and Managing a Standard Key Provider.|
|Trusted key provider||Available in vSphere 7.0 and later, the vSphere Trust Authority trusted key provider makes access to the encryption keys conditional to the attestation state of a workload cluster. vSphere Trust Authority requires an external key server.||See vSphere Trust Authority.|
|VMware vSphere® Native Key Provider™||Available in vSphere 7.0 Update 2 and later, vSphere Native Key Provider is included in all vSphere editions and does not require an external key server.||See Configuring and Managing vSphere Native Key Provider.|