y23335793 发表于 2018-6-19 14:23:26

SCVMM 2012R2 要点转载摘译

  Creating the distributed key management container in Active Directory
  Some of the data stored by VMM needs to be held securely, so it cannot be compromised.
  For example, when you store user credentials in VMM for Run As accounts, the passwords for
  these are encrypted. When you install VMM, you are given the choice of where to store the
  encryption keys, as shown in the following screenshot:

  It is required to always store your encryption keys in Active Directory if you are going to deploy
  a highly available (clustered) installation of VMM.
  The account used to install VMM must have full control over the container in Active Directory
  for the duration of the installation. During the installation, the installer program reconfigures
  the security of the container to ensure that only the correct security principles have access.
  For a small scale installation, a single container in the root of Active Directory could
  be created to store the encryption keys. For a large-scale implementation where several
  different installations of VMM may be required due to the number of hosts and/or virtual
  machines, it is advisable to create a parent container in Active Directory and then have
  containers within the parent for each installation of VMM.
  Installing Virtual Machine Manager
  Getting ready
  You will need to have sufficient access to Active Directory to create Container objects.
  How to do it…
  The following diagram shows you the high-level steps involved in this recipe and the tasks
  required to complete this recipe:

  Overview of Recipe:
  Actions:
  Creation of new container in Active Directory for
  Distributed Key Management in VMM using
  PowerShell
  Applying the required security permissions to the
  newly created Active Directory container using
  PowerShell
  Prerequisites (not covered by this recipe):
  Obtaining an account with sufficient privileges for
  creating a container in Active Directory
  Obtaining an account with sufficient privileges for
  changing ACLs on the new container in Active
  Directory
  There are two possible methods of creating a container in Active Directory: one is using ADSI
  Edit and the other is via PowerShell. The method discussed here will be PowerShell-based:
  1. On a Domain Controller, or a machine where the Active Directory PowerShell Module
  is installed, open an elevated PowerShell console.
  2. The following PowerShell line will create a container called DKMVMM in the root of
  Active Directory:
  New-ADObject –Name DKMVMM –Type container –Path
  "DC=ad,DC=demo,DC=com"
  3. Once the container has been created, the user who will be installing VMM needs to
  have full control of the container and that permission must apply to the container and
  all descendant objects. The following PowerShell will perform this function:
  Set-PSDrive AD:
  $VMMInstallAccount = Get-ADUser -Identity Install_VMM
  $SID = New-Object
  System.Security.Principal.SecurityIdentifier
  $VMMInstallAccount.SID
  $DKMVMMacl = Get-Acl -Path "CN=DKMVMM,DC=ad,DC=demo,DC=com"
  $ObjectGuid = New-Object Guid 00000000-0000-0000-0000-
  000000000000
  $newACL = New-Object
  System.DirectoryServices.ActiveDirectoryAcce***ule
  $SID,"GenericAll","Allow",$objectguid,"All"
  $DKMVMMacl.AddAcce***ule($newACL)
  Set-Acl -AclObject $DKMVMMacl -Path
  "CN=DKMVMM,DC=ad,DC=demo,DC=com"
  This recipe is complete and the Distributed Key Management container is now ready to be
  used by DEMO\Install_VMM during installation.
页: [1]
查看完整版本: SCVMM 2012R2 要点转载摘译