root does not grant inherent rights to the Single Sign-On (SSO) or VMware Directory Service (vmdir).
7.x,8.x,9.x
The requirement for [email protected] is driven by the vmdir (VMware Directory Service).
Identity Context: The root user does not exist in the SSO database. Therefore, it has no security context to authorize changes to the application's trust foundation.
Database Integrity: Manual certificate manipulation via the root shell often results in a DB corruption, where the files on the disk do not match the thumbprints stored in the SSO database, leading to service start-up failures.
To balance security "sealing" with operational needs, VMware recommends a dual-track strategy:
Limit [email protected] to "Break-Glass" operations: Identity source changes, Root CA updates, and high-level script execution.
Limit root to infrastructure maintenance: Firmware updates, troubleshooting, and VAMI-based appliance management.
For vSphere: Create a Custom Service Account in the vSphere Client. Assign only the "Certificate Management" and "Identity Store" privileges. Use this account for routine maintenance to keep the primary administrator password vaulted.
For vCloud Director: Utilize the vCD API with a Service Account assigned the System Administrator role. This enables automation of certificate renewals without utilizing the primary admin credentials.
Access Points: VAMI (Port 5480), DCUI, SSH/Bash CLI.
Permitted Tasks: * OS Patching and Updates.
Network Configuration (IP, Routing, DNS).
Service Control (Restarting daemons like vpxd).
Log File Analysis.
Limitations: Cannot modify application metadata, permissions, or identity store objects.
Access Points: vSphere Client UI, vSphere APIs, Certificate Manager Utility.
Required Tasks: * Certificate Management: Renewing VMCA-signed certs or replacing with CA-signed certs.
Identity Management: Joining a Domain (AD/LDAP/LDAPS).
Permission Delegation: Assigning roles to users/groups.
Cross-Product Integration: Registering NSX, Aria Operations, or Telco Cloud Automation (TCA).