Gabe Maentz, the Director of Solution Architecture & Customer Delivery at River Point Technology, provides some tips in this talk for securing your VMware infrastructure better with Vault dynamic secrets.
VMware is the virtualization standard within the corporate datacenter. An all-too-familiar practice is to use common passwords for the most privileged accounts within VMware environments.
How many VM admins utilize the same root password for all of their ESXi servers? There has to be a better way.
In this talk we will demonstrate how HashiCorp Vault can be used to help VMware Admins move to short-lived, dynamic credentials within ESXi and vSphere environments.
Join us to learn: - Why you would want to use dynamic credentials within your VMware environment to reduce security risks. - Ways you can use Vault to manage, control, and rotate VMWare credentials in an automated manner. - How VMware Admins can utilize existing automation tools like vSphere API and PowerCLI with Vault.
This talk was part of the first HashiTalks online event—A 24-hour continuous series of presentations from the worldwide HashiCorp User Group (HUG) community and from HashiCorp engineers as well. The event took place from February 21-22, 2019.
Check out your local chapter or start a new one here.
Authenticating to HashiCorp Vault in a VMware vSphere Environment
Adopting Shared Services: Terraform and Vault at the US Dept of Defense
Service Mesh Interoperation Between VMware NSX Service Mesh and Consul
Keynote: Consul Connect and the VMware Service Mesh specification