A new feature introduced in vSphere 6.5 is the encryption of VMs, that secures the VMDK virtual disks (also .vmx and swap files are encrypted), making the stored data unreadable.
To take benefit of encryption, you need to connect vCenter Server to a working Key Management Server (KMS) that provides the necessary keys to encrypt and decrypt VMs using the Key Management Interoperability Protocol (KMIP) protocol. To establish the connection between KMS and vCenter Server, the KMS performs a certificate exchange.
The components required to allow VM encryption features are the following:
- KMS: Generates and stores the keys passed to the vCenter Server to encrypt and decrypt the VMs.
- vCenter Server: This is the only component that ...