Hi all - have VCSA 6.5 installed in two locations now. Enhanced authentication plugin is installed but not working - cannot check the box for credential fill-in. Tried a few different things to no avail. Anyone have it working or know why it may not be working in Chrome or IE in Windows 10?

I got it working by uninstalling all other vmware client plugins and fat client. Works every time for my account that is a local administrator of the desktop, however if I login as a standard user, it stops working.


Vmware Download Enhanced Authentication Plugin Not Working


Download 🔥 https://geags.com/2y848B 🔥



So something I found today was the service that installs with the plugin was not starting even though it was set to start Automatically. Service is called VMware CIP Message Proxy Service. I changed startup type to Automatic (delayed start) and it's working for me now.

I'm currently using the Enhanced Authentication Plugin with the new Chromium Edge browser, when I first install the plugin it works fine and as expected. Then after a few days for whatever reason it just stops working, I've searched around and lots of people are saying to try and access  -plugin:8094 but it's not loading for me.

You use the enhanced authentication, "Use Windows session authentication" checkbox in Chrome to log into vCenter, but it does not work. It continually prompts to download and install the VMware-EnhancedAuthenticationPlugin. Chrome needs to trust the certificate from https:\\vmware-plugin:8094

\r\n\r\n \r\n","#format":"full_html","#langcode":"en"},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":2},"field_tags":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":3},"field_url":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":4},"field_content":{"#theme":"field","#title":"Summary (deprecated)","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_content","#field_type":"string_long","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"basic_string","#is_multiple":false,"#third_party_settings":[],"0":{"#type":"inline_template","#template":"{{ value|nl2br }}","#context":{"value":"The next step in vSphere extensibility evolution is focused on the\u00a0technological updates necessary to maintain the stability and security of customer workloads. With the current announcement, we are setting the long-term standards our partners need to follow to provide our customers with the best quality vSphere enhancements."}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":5},"field_cc_category":{"#theme":"field","#title":"Category","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_cc_category","#field_type":"entity_reference","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"entity_reference_label","#is_multiple":true,"#third_party_settings":[],"0":{"#type":"link","#title":"Announcement","#url":{},"#options":{"entity_type":"taxonomy_term","entity":{},"language":{}},"#entity":{},"#cache":{"tags":["taxonomy_term:649"],"contexts":["user.permissions"],"max-age":-1}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":6},"field_cc_level":{"#theme":"field","#title":"Level","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_cc_level","#field_type":"entity_reference","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"entity_reference_label","#is_multiple":true,"#third_party_settings":[],"0":{"#type":"link","#title":"Overview","#url":{},"#options":{"entity_type":"taxonomy_term","entity":{},"language":{}},"#entity":{},"#cache":{"tags":["taxonomy_term:646"],"contexts":["user.permissions"],"max-age":-1}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":7},"field_cc_phase":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":8},"field_cc_product":{"#theme":"field","#title":"Product","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_cc_product","#field_type":"entity_reference","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"entity_reference_label","#is_multiple":true,"#third_party_settings":[],"0":{"#type":"link","#title":"vSphere","#url":{},"#options":{"entity_type":"taxonomy_term","entity":{},"language":{}},"#entity":{},"#cache":{"tags":["taxonomy_term:3143"],"contexts":["user.permissions"],"max-age":-1}},"1":{"#type":"link","#title":"vSphere 7","#url":{},"#options":{"entity_type":"taxonomy_term","entity":{},"language":{}},"#entity":{},"#cache":{"tags":["taxonomy_term:3076"],"contexts":["user.permissions"],"max-age":-1}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":9},"field_cc_solution":{"#theme":"field","#title":"Solution","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_cc_solution","#field_type":"entity_reference","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"entity_reference_label","#is_multiple":true,"#third_party_settings":[],"0":{"#type":"link","#title":"Application Acceleration","#url":{},"#options":{"entity_type":"taxonomy_term","entity":{},"language":{}},"#entity":{},"#cache":{"tags":["taxonomy_term:3082"],"contexts":["user.permissions"],"max-age":-1}},"1":{"#type":"link","#title":"Lifecycle Management","#url":{},"#options":{"entity_type":"taxonomy_term","entity":{},"language":{}},"#entity":{},"#cache":{"tags":["taxonomy_term:3081"],"contexts":["user.permissions"],"max-age":-1}},"2":{"#type":"link","#title":"Modern Applications","#url":{},"#options":{"entity_type":"taxonomy_term","entity":{},"language":{}},"#entity":{},"#cache":{"tags":["taxonomy_term:3080"],"contexts":["user.permissions"],"max-age":-1}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":10},"field_cc_type":{"#theme":"field","#title":"Type","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_cc_type","#field_type":"entity_reference","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"entity_reference_label","#is_multiple":true,"#third_party_settings":[],"0":{"#type":"link","#title":"Blog","#url":{},"#options":{"entity_type":"taxonomy_term","entity":{},"language":{}},"#entity":{},"#cache":{"tags":["taxonomy_term:641"],"contexts":["user.permissions"],"max-age":-1}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":11},"field_co_author":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":12},"field_cc_audience":{"#theme":"field","#title":"Audience","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_cc_audience","#field_type":"entity_reference","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"entity_reference_label","#is_multiple":false,"#third_party_settings":[],"0":{"#type":"link","#title":"Customer","#url":{},"#options":{"entity_type":"taxonomy_term","entity":{},"language":{}},"#entity":{},"#cache":{"tags":["taxonomy_term:2719"],"contexts":["user.permissions"],"max-age":-1}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":13},"field_cc_internal":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":14},"field_associated_content":{"#theme":"field","#title":"Associated Content","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_associated_content","#field_type":"entity_reference_revisions","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"entity_reference_revisions_entity_view","#is_multiple":true,"#third_party_settings":[],"0":{"#paragraph":{},"#view_mode":"full","#cache":{"tags":{"0":"paragraph_view","1":"paragraph:18048","3":"config:paragraphs.settings","4":"node:3212"},"contexts":["user.permissions","languages:language_interface"],"max-age":-1},"#theme":"paragraph","#weight":0,"#pre_render":[[{},"build"]]},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":15},"field_cc_technology":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":16},"links":{"#lazy_builder":["Drupal\\node\\NodeViewBuilder::renderLinks",["3212","full","en",false,null]],"#weight":17},"field_video_duration":{"#theme":"field","#title":"Read Time\/Duration","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_video_duration","#field_type":"string","#field_translatable":true,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"string","#is_multiple":false,"#third_party_settings":[],"0":{"#type":"inline_template","#template":"{{ value|nl2br }}","#context":{"value":"12:58"}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":18},"field_read_time_visible_on_resou":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":19},"field_search_content":{"#theme":"field","#title":"Search Content","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_search_content","#field_type":"text_with_summary","#field_translatable":true,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"text_default","#is_multiple":false,"#third_party_settings":[],"0":{"#type":"processed_text","#text":"The next step in vSphere extensibility evolution is focused on the\u00a0technological updates necessary to maintain the stability and security of customer workloads. With the current announcement, we are setting the long-term standards our partners need to follow to provide our customers with the best quality vSphere enhancements. Overview The next step in vSphere extensibility evolution is focused on the technological updates necessary to maintain the stability and security of customer workloads. With the current announcement we are setting the long term standards our partners need to follow in order to provide our customers with the best quality vSphere enhancements. The mentioned technological updates encompass the following areas: Deprecation of the legacy local plugins and transition to the remote architecture. Contemporary technological standards local plugins must comply with. Updates targeting security hardening of vCenter Server Appliance and the plugins running on it. For more details on each of the subjects please check the sections below. Local plugin deprecation End of the legacy local plugins The remote plugin architecture was introduced with vSphere 6.7U1 and is compatible with any subsequent version. This is the only architecture that will be supported in the future vSphere releases. Starting from version 7.0U1 remote plugins have full feature parity with the legacy (a.k.a. local) plugins and with vSphere 7.0U3 the capabilities they offer already surpass those of the legacy local plugins. The legacy local plugin architecture was introduced with vSphere 6.5 and is compatible with versions 6.7, 7.0 and relevant updates. Since vSphere 7.0 VMware is not investing in new features for the local plugins as their evolution is completed. In the next major release of vSphere the local plugins will be deprecated and they will no longer be included in the VMware certification program. The support for local plugins will be ended from the subsequent major release. Advantages of the remote plugins The remote plugins are compatible with VMware cloud on AWS and the emerging VMware-supported clouds. They are the technology VMware will invest in to broaden the extensibility options of vSphere and increase plugin adoption on premise and in the cloud. The remote plugin architecture supports multiple plugin versions allowing to accommodate widely differing vCenter instances across SSO domains in Hybrid Linked Mode. Compared to the legacy (local) plugins, the interaction between vSphere and the remote plugins is on a different level from security, performance and compatibility perspective: The remote plugins operate with limited set of privileges in the vSphere environment and provide better auditing capabilities. They are compatible with the upgrade process of vSphere solving one of the major pain points for the customers and main obstacle for plugin adoption. The impact of remote plugins on vSphere performance is dramatically reduced ensuring much improved user experience with the UI. The remote plugins are running in their own appliance and do not get installed on the vCenter Server Appliance therefore do not need to comply with all technological boundaries and limitations vSphere must meet (more on that in the next sections). The remote plugins are the long-term focus of VMware SDK certification program. They open a wide range of possibilities for new features and optimisations from the perspective of security, lifecycle management and multi-cloud support. Transition path to remote plugins VMware strongly recommends for all partners to migrate their solutions to the remote architecture and abandon the local plugins before the latter get deprecated. Local plugins will still be supported in the next major version of vSphere, but there will be multiple technological changes and restrictions the local plugins will have to comply with in order to remain available as vSphere extensions. VMware imposes these changes in order to ensure the security, stability and supportability of customers' vSphere environments. The sensible approach to meet those changes would be for partners to speed-up the transition to remote plugins, instead of investing in legacy technology that is on the verge of deprecation. There are multiple paths for each partner to transition their solution to the remote architecture, depending on the technological specifics of each plugin. The following options are available: Build a remote plugin based on partner's existing standalone UI, reusing the full feature set, GUI and backend. Migrate the local plugin to remote architecture and leverage API migration tools. This approach is recommended when the local plugin is not heavily dependant on the Java services running on the vCenter Server Appliance. Build a remote plugin from scratch and design the solution based on the technological stack preferred by the partner. vSphere Client extensibility team will provide the necessary support for partners in the transition to remote architecture: to select the right migration option and to overcome potential technological difficulties. Local plugin certification and support The consequences from local plugin deprecation in the next major release of vSphere will be the following: Local plugins will no longer be part of vSphere Client plugin certification program. VMware will not certify and therefore recommend the usage of deprecated technology. Local plugins will still be supported. Although no new features will be delivered for the local architecture the customers will still be able to use their local plugins. VMware will be addressing potential critical issues and security problems related to local plugins as for any other supported technology or feature. VMware may incidentally impose changes in the local plugins in case critical security issues are identified. The consequences from local plugins being not supported in the subsequent major release will be the following: Local plugins will not be available for use in vSphere. Relevant APIs will no longer be supported and customers will not be able to install local plugins. Note: remote plugins will be fully supported and available. Compliance and technological changes affecting local plugins FIPS compliance In a future release of vSphere, VMware will require all vSphere Client local plugins, both partner-supplied and VMware-supplied, to comply with the United States government Federal Information Processing Standard (FIPS) Publication 140-2, Level 1, Security Requirements for Cryptographic Modules. That standard assures up-to-date data communication security by mandating the use of highly secure encryption algorithms. The article Preparing Local Plug-ins for FIPS Compliance in VMware code explains how you can upgrade your local plugin to use conformant encryption libraries correctly for interprocess communications. The instructions assume the use of Bouncy Castle FIPS libraries. By coding your plug-in to use default encryption providers, you enable your code to operate either with standard JVM encryption or with Bouncy Castle FIPS encryption. Note: The FIPS security requirement will not take effect in the vSphere 7.0 release generation. However, the customers will be able to configure vCenter Server to operate with or without FIPS providers in these releases. VMware is already upgrading its internal plug-ins, and we recommend that partners act soon to upgrade and test their own plug-ins with the new libraries. One of the requirements for FIPS compliance is for all Java services (and vsphere-ui in particular) in the vCenter Server Appliance to move to a FIPS-compliant version of BouncyCastle for TLS\/cryptography or use the Envoy Sidecar service to handle the TLS for them. The partners must consider that the vsphere-ui service is used to host vSphere Client local plugins, therefore any changes done to the vsphere-ui Java Virtual Machine could affect and possibly break the installed local plugins. The plugins have the option to become FIPS-compliant and not break when deploying in the vsphere-ui JVM by using the new BouncyCastle security providers for TLS connections and crypto. This process would require minimal changes to the plugin code since it keeps running against the same Java security interfaces. There are, however, a couple of breaking changes in the BouncyCastle implementation that should be handled. All the changes are backward compatible and the plugin will work both when deployed on FIPS switched ON (BouncyCastle implementation) and FIPS switched OFF (SUN implementation) environments. This should save the plugin from having to check any feature flags. Transition to SHA-256 The use of SHA-1 hash algorithm is being gradually deprecated in vSphere, starting from version 7.0U2. It will be incrementally replaced by SHA-256. Potential issues with SHA-1 have been known for years, but these were mostly theoretical and impractical. In 2020 practical attacks have been demonstrated that can be carried out with fairly limited resources and time. This situation effectively forces VMware to remove all vulnerable uses of SHA-1 in vSphere as soon as possible and instead use SHA-256 (see Wikipedia entry for SHA-1). In a future major release of vSphere, SHA-1 will be removed as supported hashing algorithm and replaced by SHA-256. We strongly recommend all partners to consider adding support for SHA-256 for the upcoming versions of their plugins (both local and remote) to be ready for the end of support of SHA-1 in a future major release of vSphere. Upgrade to Spring 5 Considering the official end of support for Spring 4 at the end of 2020 and the common vulnerabilities and exposures associated with version 4, VMware is upgrading vSphere Client to use Spring 5 starting from the release of vSphere 7.0U3. Spring 5 is not fully backward compatible which may lead to failure or malfunctioning of some vSphere Client plugins. A typical problematic situation could be the use of APIs deprecated in Spring 4, which are no longer supported in Spring 5. In case of such problems, we strongly recommend to modify the code of the affected plugin to make it compatible with Spring 5. We're providing however a fallback option, which is not recommended by VMware to make it possible for the plugin to continue working with vSphere 7.0U3 - that is to downgrade the vSphere Client to use Spring 4 through the following steps. Open \/etc\/vmware\/vmware-vmon\/svcCfgfiles\/vsphere-ui.json for edit. Uncomment this line: \/\/\u201c-DuseOldSpring=true\u201d. Restart vSphere Client service. Please be aware that the fallback option to downgrade to Spring 4 will not be available in the next major release. Third-party library isolation Third-party libraries deployed and utilised by the vCenter Server appliance (VCSA) for its own needs that are currently exposed to partner plugins will be restricted and no longer available effectively from the next major release of vSphere. In the versions of vSphere up to 7.0, the vSphere Client platform is not isolated. The local plugins have the possibility to import packages coming from third-party libraries deployed for the needs of vSphere Client platform. This is problematic for multiple reasons, such as: Changes to internal vSphere Client APIs could break plugin compatibility. Changes to a particular vSphere Client dependency (e.g. to consume security updates) could impact plugin compatibility. Historically, plugins have been commonly required to use third-party library dependencies from the vSphere Client (e.g. Spring). Plugins using vSphere Client internal dependencies present a serious risk from security and supportability POV, since VMware must be able to: Update libraries quickly if there is a notice about security vulnerability in the supported vSphere Client versions. Support each version of the Client for multiple years and therefore obliged to avoid unsupported libraries. These are the essential reasons forcing VMware to make a step further in maintaining the reliability of the plugin integration model and make sure plugin developers are providing their own OSGi Java dependencies. Any logging implementation\/facade, JSON\/XML serialisation, Apache utilities, etc. will have to be provided as part of the plugin: either as separate OSGi bundles or included in an existing plugin bundle's class path. The library isolation of local plugins will take effect in two steps, starting with the release vSphere 7.0U3, when it will be turned off by default. The library isolation will be turned on from the next major release of vSphere. For more information about the third-party libraries which availability will be restricted and for technical guidance please contact vSphere Client SDK team. Security hardening for local plugins SSPI, CAC, RSA SecurID In a future major vSphere release, VMware plans to discontinue support for Windows Session Authentication (SSPI) used as part of the Enhanced Authentication Plug-in, Smart Card support, and RSA SecurID for vCenter Server. In place of SSPI, Smart Card, or RSA SecurID, users and administrators can configure and use Identity Federation with a supported Identity Provider to sign in to their vCenter Server system. More information in the dedicated VMware Tech Zone announcement. IWA Integrated Windows Authentication (IWA) is deprecated in vSphere 7.0 and will be removed in a future release. For more information, see VMware Knowledge Base article 78506. DCUI smartcard In a future vSphere release, support for Smart Card Authentication in DCUI will be discontinued. In place of accessing DCUI using Personal Identity Verification (PIV), Common Access Card (CAC), or SC650 smart card, users will be encouraged to perform operations through vCenter, PowerCLI, API calls, or by logging in with a username and password. TPM 1.2 vSphere will continue to support legacy PCR usage with TPM 1.2, but will not support the new D\/A PCR usage model introduced with \u201cIce Lake\u201d platforms. More information in the dedicated VMware Technology Partner Hub message. 32-bit userworld Support for 32-bit userworld (used for partner drivers, plugins, extensions, etc.) is deprecated in favour of 64-bit userworld and will be permanently removed in the next major ESXi version. In vSphere 7.0, 32-bit userworld support has been deprecated. Userworlds are the components of ESXi used by partners to provide drivers, plugins, and other system extensions (distributed as VIBs). Userworlds are not customer accessible. vSphere 7.0 provides 64-bit userworld support through partner devkits and will retain 32-bit userworld support through this major release. Support for 32-bit userworlds will be permanently removed in the next major ESXi release. To avoid loss of functionality, customers should ensure any vendor-supplied VIBs in use are migrated to 64-bit before upgrading beyond the vSphere 7.0 release. More information in vSphere 7.0 release notes. vMON API service VMware plans to deprecate the VMware Service Lifecycle Manager API (vmonapi service) in a future release. For more information, see the dedicated VMware knowledge base article. Deprecating the Local Plugins :- The Next Step in vSphere Client Extensibility Evolution","#format":"restricted_html","#langcode":"en"},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":20},"comment":{"#theme":"field","#title":"Comments","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"comment","#field_type":"comment","#field_translatable":true,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"comment_default","#is_multiple":false,"#third_party_settings":[],"#cache":{"contexts":["user.permissions","user.roles"],"tags":[],"max-age":-1},"0":{"comments":[],"#comment_type":"comment","#comment_display_mode":1,"comment_form":[]},"#weight":21},"field_content_rich":{"#theme":"field","#title":"Summary","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_content_rich","#field_type":"text_long","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"text_default","#is_multiple":false,"#third_party_settings":[],"0":{"#type":"processed_text","#text":"The next step in vSphere extensibility evolution is focused on the\u00a0technological updates necessary to maintain the stability and security of customer workloads. With the current announcement, we are setting the long-term standards our partners need to follow to provide our customers with the best quality vSphere enhancements.","#format":"summary_html","#langcode":"en"},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":22},"field_manual_read_time_duration":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":23},"field_quick_links":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":24},"field_pdf_author":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":25},"field_pdf":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":26},"field_auto_generated_pdf":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":27},"field_pdf_index":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":28},"field_generate_pdf":{"#theme":"field","#title":"Generate PDF","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_generate_pdf","#field_type":"list_string","#field_translatable":true,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"list_default","#is_multiple":true,"#third_party_settings":[],"0":{"#markup":"Generate a PDF from HTML Content","#allowed_tags":["a","b","big","code","del","em","i","ins","pre","q","small","span","strong","sub","sup","tt","ol","ul","li","p","br","img"]},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":29},"field_youtube_ids":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":30},"field_thumbnail_logo":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":31},"field_slider_icon_image":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":32},"field_label":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":33},"#sorted":true,"#children":"","#render_children":true},"theme_hook_original":"node","attributes":" data-history-node-id=\"3212\" about=\"\/blog\/deprecating-local-plugins-next-step-vsphere-client-extensibility-evolution\" typeof=\"sioc:Item foaf:Document\"","title_attributes":"","content_attributes":"","title_prefix":[],"title_suffix":{"rdf_meta_title":{"#theme":"rdf_metadata","#metadata":[{"property":["dc:title"],"content":"Deprecating the Local Plugins :- The Next Step in vSphere Client Extensibility Evolution"}]},"rdf_meta_comment_count":{"#theme":"rdf_metadata","#metadata":[{"property":["sioc:num_replies"],"datatype":"xsd:integer"}]}},"db_is_active":true,"is_admin":false,"logged_in":false,"user":{},"directory":"themes\/custom\/techzone","view_mode":"full","teaser":false,"node":{"in_preview":null},"date":"\nTue, 07\/27\/2021 - 04:03\n\n","author_name":"\nAditya Sahu\n","label":{"#theme":"field","#title":"Title (Heading 1)","#label_display":"hidden","#view_mode":"full","#language":"en","#field_name":"title","#field_type":"string","#field_translatable":true,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"string","#is_multiple":false,"#third_party_settings":[],"0":{"#type":"inline_template","#template":"{{ value|nl2br }}","#context":{"value":"Deprecating the Local Plugins :- The Next Step in vSphere Client Extensibility Evolution"}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":-5,"#is_page_title":true,"#attached":[],"#children":"Deprecating the Local Plugins :- The Next Step in vSphere Client Extensibility Evolution","#markup":"Deprecating the Local Plugins :- The Next Step in vSphere Client Extensibility Evolution","#printed":true},"url":"\/blog\/deprecating-local-plugins-next-step-vsphere-client-extensibility-evolution","page":true,"content":{"field_image":{"#theme":"field","#title":"Image","#label_display":"hidden","#view_mode":"full","#language":"en","#field_name":"field_image","#field_type":"image","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"image","#is_multiple":false,"#third_party_settings":[],"0":{"#theme":"image_formatter","#item":{},"#item_attributes":{"rel":["og:image","rdfs:seeAlso"],"loading":"lazy"},"#image_style":"large","#url":null,"#cache":{"tags":["config:image.style.large"],"contexts":[],"max-age":-1}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":1},"body":{"#theme":"field","#title":"Body","#label_display":"hidden","#view_mode":"full","#language":"en","#field_name":"body","#field_type":"text_with_summary","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"text_default","#is_multiple":false,"#third_party_settings":[],"0":{"#type":"processed_text","#text":"Overview\r\n\r\nThe next step in vSphere extensibility evolution is focused on the technological updates necessary to maintain the stability and security of customer workloads. With the current announcement we are setting the long term standards our partners need to follow in order to provide our customers with the best quality vSphere enhancements.\r\n\r\nThe mentioned technological updates encompass the following areas:\r\n\r\n\r\n\tDeprecation of the legacy local plugins and transition to the remote architecture.\r\n\tContemporary technological standards local plugins must comply with.\r\n\tUpdates targeting security hardening of vCenter Server Appliance and the plugins running on it.\r\n\r\n\r\nFor more details on each of the subjects please check the sections below.\r\n\r\nLocal plugin deprecation\r\n\r\nEnd of the legacy local plugins\r\n\r\nThe remote plugin architecture was introduced with vSphere 6.7U1 and is compatible with any subsequent version. This is the only architecture that will be supported in the future vSphere releases. Starting from version 7.0U1 remote plugins have full feature parity with the legacy (a.k.a. local) plugins and with vSphere 7.0U3 the capabilities they offer already surpass those of the legacy local plugins.\r\n\r\nThe legacy local plugin architecture was introduced with vSphere 6.5 and is compatible with versions 6.7, 7.0 and relevant updates. Since vSphere 7.0 VMware is not investing in new features for the local plugins as their evolution is completed. \r\n\r\nIn the next major release of vSphere the local plugins will be deprecated and they will no longer be included in the VMware certification program.\r\n\r\nThe support for local plugins will be ended from the subsequent major release. \r\n\r\nAdvantages of the remote plugins\r\n\r\nThe remote plugins are compatible with VMware cloud on AWS and the emerging VMware-supported clouds. They are the technology VMware will invest in to broaden the extensibility options of vSphere and increase plugin adoption on premise and in the cloud.\r\n\r\nThe remote plugin architecture supports multiple plugin versions allowing to accommodate widely differing vCenter instances across SSO domains in Hybrid Linked Mode.\r\n\r\nCompared to the legacy (local) plugins, the interaction between vSphere and the remote plugins is on a different level from security, performance and compatibility perspective:\r\n\r\n\r\n\tThe remote plugins operate with limited set of privileges in the vSphere environment and provide better auditing capabilities.\r\n\tThey are compatible with the upgrade process of vSphere solving one of the major pain points for the customers and main obstacle for plugin adoption.\r\n\tThe impact of remote plugins on vSphere performance is dramatically reduced ensuring much improved user experience with the UI.\r\n\tThe remote plugins are running in their own appliance and do not get installed on the vCenter Server Appliance therefore do not need to comply with all technological boundaries and limitations vSphere must meet (more on that in the next sections).\r\n\r\n\r\nThe remote plugins are the long-term focus of VMware SDK certification program. They open a wide range of possibilities for new features and optimisations from the perspective of security, lifecycle management and multi-cloud support.\r\n\r\nTransition path to remote plugins\r\n\r\nVMware strongly recommends for all partners to migrate their solutions to the remote architecture and abandon the local plugins before the latter get deprecated. Local plugins will still be supported in the next major version of vSphere, but there will be multiple technological changes and restrictions the local plugins will have to comply with in order to remain available as vSphere extensions. VMware imposes these changes in order to ensure the security, stability and supportability of customers' vSphere environments. The sensible approach to meet those changes would be for partners to speed-up the transition to remote plugins, instead of investing in legacy technology that is on the verge of deprecation.\r\n\r\nThere are multiple paths for each partner to transition their solution to the remote architecture, depending on the technological specifics of each plugin. The following options are available:\r\n\r\n\r\n\tBuild a remote plugin based on partner's existing standalone UI, reusing the full feature set, GUI and backend.\r\n\tMigrate the local plugin to remote architecture and leverage API migration tools. This approach is recommended when the local plugin is not heavily dependant on the Java services running on the vCenter Server Appliance.\r\n\tBuild a remote plugin from scratch and design the solution based on the technological stack preferred by the partner.\r\n\r\n\r\nvSphere Client extensibility team will provide the necessary support for partners in the transition to remote architecture: to select the right migration option and to overcome potential technological difficulties. \r\n\r\nLocal plugin certification and support\r\n\r\nThe consequences from local plugin deprecation in the next major release of vSphere will be the following:\r\n\r\n\r\n\tLocal plugins will no longer be part of vSphere Client plugin certification program. VMware will not certify and therefore recommend the usage of deprecated technology.\r\n\tLocal plugins will still be supported. Although no new features will be delivered for the local architecture the customers will still be able to use their local plugins. \r\n\tVMware will be addressing potential critical issues and security problems related to local plugins as for any other supported technology or feature. VMware may incidentally impose changes in the local plugins in case critical security issues are identified.\r\n\r\n\r\nThe consequences from local plugins being not supported in the subsequent major release will be the following:\r\n\r\n\r\n\tLocal plugins will not be available for use in vSphere. Relevant APIs will no longer be supported and customers will not be able to install local plugins. \r\n\r\n\r\nNote: remote plugins will be fully supported and available.\r\n\r\nCompliance and technological changes affecting local plugins\r\n\r\nFIPS compliance\r\n\r\nIn a future release of vSphere, VMware will require all vSphere Client local plugins, both partner-supplied and VMware-supplied, to comply with the United States government Federal Information Processing Standard (FIPS) Publication 140-2, Level 1, Security Requirements for Cryptographic Modules. That standard assures up-to-date data communication security by mandating the use of highly secure encryption algorithms.\r\n\r\nThe article Preparing Local Plug-ins for FIPS Compliance in VMware code explains how you can upgrade your local plugin to use conformant encryption libraries correctly for interprocess communications. The instructions assume the use of Bouncy Castle FIPS libraries. By coding your plug-in to use default encryption providers, you enable your code to operate either with standard JVM encryption or with Bouncy Castle FIPS encryption.\r\n\r\nNote: The FIPS security requirement will not take effect in the vSphere 7.0 release generation. However, the customers will be able to configure vCenter Server to operate with or without FIPS providers in these releases. VMware is already upgrading its internal plug-ins, and we recommend that partners act soon to upgrade and test their own plug-ins with the new libraries.\r\n\r\nOne of the requirements for FIPS compliance is for all Java services (and vsphere-ui in particular) in the vCenter Server Appliance to move to a FIPS-compliant version of BouncyCastle for TLS\/cryptography or use the Envoy Sidecar service to handle the TLS for them. The partners must consider that the vsphere-ui service is used to host vSphere Client local plugins, therefore any changes done to the vsphere-ui Java Virtual Machine could affect and possibly break the installed local plugins.\r\n\r\nThe plugins have the option to become FIPS-compliant and not break when deploying in the vsphere-ui JVM by using the new BouncyCastle security providers for TLS connections and crypto.\r\n\r\nThis process would require minimal changes to the plugin code since it keeps running against the same Java security interfaces. There are, however, a couple of breaking changes in the BouncyCastle implementation that should be handled. All the changes are backward compatible and the plugin will work both when deployed on FIPS switched ON (BouncyCastle implementation) and FIPS switched OFF (SUN implementation) environments. This should save the plugin from having to check any feature flags.\r\n\r\nTransition to SHA-256\r\n\r\nThe use of SHA-1 hash algorithm is being gradually deprecated in vSphere, starting from version 7.0U2. It will be incrementally replaced by SHA-256. \r\n\r\nPotential issues with SHA-1 have been known for years, but these were mostly theoretical and impractical. In 2020 practical attacks have been demonstrated that can be carried out with fairly limited resources and time. This situation effectively forces VMware to remove all vulnerable uses of SHA-1 in vSphere as soon as possible and instead use SHA-256 (see Wikipedia entry for SHA-1). \r\n\r\nIn a future major release of vSphere, SHA-1 will be removed as supported hashing algorithm and replaced by SHA-256.\r\n\r\nWe strongly recommend all partners to consider adding support for SHA-256 for the upcoming versions of their plugins (both local and remote) to be ready for the end of support of SHA-1 in a future major release of vSphere.\r\n\r\nUpgrade to Spring 5\r\n\r\nConsidering the official end of support for Spring 4 at the end of 2020 and the common vulnerabilities and exposures associated with version 4, VMware is upgrading vSphere Client to use Spring 5 starting from the release of vSphere 7.0U3. \r\n\r\nSpring 5 is not fully backward compatible which may lead to failure or malfunctioning of some vSphere Client plugins. A typical problematic situation could be the use of APIs deprecated in Spring 4, which are no longer supported in Spring 5. In case of such problems, we strongly recommend to modify the code of the affected plugin to make it compatible with Spring 5. We're providing however a fallback option, which is not recommended by VMware to make it possible for the plugin to continue working with vSphere 7.0U3 - that is to downgrade the vSphere Client to use Spring 4 through the following steps.\r\n\r\n\r\n\tOpen \/etc\/vmware\/vmware-vmon\/svcCfgfiles\/vsphere-ui.json for edit.\r\n\tUncomment this line: \/\/\u201c-DuseOldSpring=true\u201d.\r\n\tRestart vSphere Client service.\r\n\r\n\r\nPlease be aware that the fallback option to downgrade to Spring 4 will not be available in the next major release.\r\n\r\nThird-party library isolation\r\n\r\nThird-party libraries deployed and utilised by the vCenter Server appliance (VCSA) for its own needs that are currently exposed to partner plugins will be restricted and no longer available effectively from the next major release of vSphere.\r\n\r\nIn the versions of vSphere up to 7.0, the vSphere Client platform is not isolated. The local plugins have the possibility to import packages coming from third-party libraries deployed for the needs of vSphere Client platform. This is problematic for multiple reasons, such as:\r\n\r\n\r\n\tChanges to internal vSphere Client APIs could break plugin compatibility.\r\n\tChanges to a particular vSphere Client dependency (e.g. to consume security updates) could impact plugin compatibility.\r\n\tHistorically, plugins have been commonly required to use third-party library dependencies from the vSphere Client (e.g. Spring).\r\n\r\n\r\nPlugins using vSphere Client internal dependencies present a serious risk from security and supportability POV, since VMware must be able to:\r\n\r\n\r\n\tUpdate libraries quickly if there is a notice about security vulnerability in the supported vSphere Client versions.\r\n\tSupport each version of the Client for multiple years and therefore obliged to avoid unsupported libraries.\r\n\r\n\r\nThese are the essential reasons forcing VMware to make a step further in maintaining the reliability of the plugin integration model and make sure plugin developers are providing their own OSGi Java dependencies. Any logging implementation\/facade, JSON\/XML serialisation, Apache utilities, etc. will have to be provided as part of the plugin: either as separate OSGi bundles or included in an existing plugin bundle's class path.\r\n\r\nThe library isolation of local plugins will take effect in two steps, starting with the release vSphere 7.0U3, when it will be turned off by default. \r\n\r\nThe library isolation will be turned on from the next major release of vSphere. \r\n\r\nFor more information about the third-party libraries which availability will be restricted and for technical guidance please contact vSphere Client SDK team.\r\n\r\nSecurity hardening for local plugins\r\n\r\nSSPI, CAC, RSA SecurID\r\n\r\nIn a future major vSphere release, VMware plans to discontinue support for Windows Session Authentication (SSPI) used as part of the Enhanced Authentication Plug-in, Smart Card support, and RSA SecurID for vCenter Server. In place of SSPI, Smart Card, or RSA SecurID, users and administrators can configure and use Identity Federation with a supported Identity Provider to sign in to their vCenter Server system.\r\n\r\nMore information in the dedicated VMware Tech Zone announcement. \r\n\r\nIWA\r\n\r\nIntegrated Windows Authentication (IWA) is deprecated in vSphere 7.0 and will be removed in a future release. For more information, see VMware Knowledge Base article 78506.\r\n\r\nDCUI smartcard\r\n\r\nIn a future vSphere release, support for Smart Card Authentication in DCUI will be discontinued. In place of accessing DCUI using Personal Identity Verification (PIV), Common Access Card (CAC), or SC650 smart card, users will be encouraged to perform operations through vCenter, PowerCLI, API calls, or by logging in with a username and password.\r\n\r\nTPM 1.2\r\n\r\nvSphere will continue to support legacy PCR usage with TPM 1.2, but will not support the new D\/A PCR usage model introduced with \u201cIce Lake\u201d platforms. More information in the dedicated VMware Technology Partner Hub message.\r\n\r\n32-bit userworld\r\n\r\nSupport for 32-bit userworld (used for partner drivers, plugins, extensions, etc.) is deprecated in favour of 64-bit userworld and will be permanently removed in the next major ESXi version.\r\n\r\nIn vSphere 7.0, 32-bit userworld support has been deprecated. Userworlds are the components of ESXi used by partners to provide drivers, plugins, and other system extensions (distributed as VIBs). Userworlds are not customer accessible.\r\n\r\nvSphere 7.0 provides 64-bit userworld support through partner devkits and will retain 32-bit userworld support through this major release. Support for 32-bit userworlds will be permanently removed in the next major ESXi release. To avoid loss of functionality, customers should ensure any vendor-supplied VIBs in use are migrated to 64-bit before upgrading beyond the vSphere 7.0 release.\r\n\r\nMore information in vSphere 7.0 release notes.\r\n\r\nvMON API service\r\n\r\nVMware plans to deprecate the VMware Service Lifecycle Manager API (vmonapi service) in a future release. For more information, see the dedicated VMware knowledge base article.\r\n\r\n \r\n\r\n \r\n","#format":"full_html","#langcode":"en"},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":2},"field_tags":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":3},"field_url":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":4},"field_content":{"#theme":"field","#title":"Summary (deprecated)","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_content","#field_type":"string_long","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"basic_string","#is_multiple":false,"#third_party_settings":[],"0":{"#type":"inline_template","#template":"{{ value|nl2br }}","#context":{"value":"The next step in vSphere extensibility evolution is focused on the\u00a0technological updates necessary to maintain the stability and security of customer workloads. With the current announcement, we are setting the long-term standards our partners need to follow to provide our customers with the best quality vSphere enhancements."}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":5},"field_cc_category":{"#theme":"field","#title":"Category","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_cc_category","#field_type":"entity_reference","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"entity_reference_label","#is_multiple":true,"#third_party_settings":[],"0":{"#type":"link","#title":"Announcement","#url":{},"#options":{"entity_type":"taxonomy_term","entity":{},"language":{}},"#entity":{},"#cache":{"tags":["taxonomy_term:649"],"contexts":["user.permissions"],"max-age":-1}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":6},"field_cc_level":{"#theme":"field","#title":"Level","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_cc_level","#field_type":"entity_reference","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"entity_reference_label","#is_multiple":true,"#third_party_settings":[],"0":{"#type":"link","#title":"Overview","#url":{},"#options":{"entity_type":"taxonomy_term","entity":{},"language":{}},"#entity":{},"#cache":{"tags":["taxonomy_term:646"],"contexts":["user.permissions"],"max-age":-1}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":7},"field_cc_phase":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":8},"field_cc_product":{"#theme":"field","#title":"Product","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_cc_product","#field_type":"entity_reference","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"entity_reference_label","#is_multiple":true,"#third_party_settings":[],"0":{"#type":"link","#title":"vSphere","#url":{},"#options":{"entity_type":"taxonomy_term","entity":{},"language":{}},"#entity":{},"#cache":{"tags":["taxonomy_term:3143"],"contexts":["user.permissions"],"max-age":-1}},"1":{"#type":"link","#title":"vSphere 7","#url":{},"#options":{"entity_type":"taxonomy_term","entity":{},"language":{}},"#entity":{},"#cache":{"tags":["taxonomy_term:3076"],"contexts":["user.permissions"],"max-age":-1}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":9},"field_cc_solution":{"#theme":"field","#title":"Solution","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_cc_solution","#field_type":"entity_reference","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"entity_reference_label","#is_multiple":true,"#third_party_settings":[],"0":{"#type":"link","#title":"Application Acceleration","#url":{},"#options":{"entity_type":"taxonomy_term","entity":{},"language":{}},"#entity":{},"#cache":{"tags":["taxonomy_term:3082"],"contexts":["user.permissions"],"max-age":-1}},"1":{"#type":"link","#title":"Lifecycle Management","#url":{},"#options":{"entity_type":"taxonomy_term","entity":{},"language":{}},"#entity":{},"#cache":{"tags":["taxonomy_term:3081"],"contexts":["user.permissions"],"max-age":-1}},"2":{"#type":"link","#title":"Modern Applications","#url":{},"#options":{"entity_type":"taxonomy_term","entity":{},"language":{}},"#entity":{},"#cache":{"tags":["taxonomy_term:3080"],"contexts":["user.permissions"],"max-age":-1}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":10},"field_cc_type":{"#theme":"field","#title":"Type","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_cc_type","#field_type":"entity_reference","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"entity_reference_label","#is_multiple":true,"#third_party_settings":[],"0":{"#type":"link","#title":"Blog","#url":{},"#options":{"entity_type":"taxonomy_term","entity":{},"language":{}},"#entity":{},"#cache":{"tags":["taxonomy_term:641"],"contexts":["user.permissions"],"max-age":-1}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":11},"field_co_author":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":12},"field_cc_audience":{"#theme":"field","#title":"Audience","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_cc_audience","#field_type":"entity_reference","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"entity_reference_label","#is_multiple":false,"#third_party_settings":[],"0":{"#type":"link","#title":"Customer","#url":{},"#options":{"entity_type":"taxonomy_term","entity":{},"language":{}},"#entity":{},"#cache":{"tags":["taxonomy_term:2719"],"contexts":["user.permissions"],"max-age":-1}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":13},"field_cc_internal":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":14},"field_associated_content":{"#theme":"field","#title":"Associated Content","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_associated_content","#field_type":"entity_reference_revisions","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"entity_reference_revisions_entity_view","#is_multiple":true,"#third_party_settings":[],"0":{"#paragraph":{},"#view_mode":"full","#cache":{"tags":{"0":"paragraph_view","1":"paragraph:18048","3":"config:paragraphs.settings","4":"node:3212"},"contexts":["user.permissions","languages:language_interface"],"max-age":-1},"#theme":"paragraph","#weight":0,"#pre_render":[[{},"build"]]},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":15},"field_cc_technology":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":16},"links":{"#lazy_builder":["Drupal\\node\\NodeViewBuilder::renderLinks",["3212","full","en",false,null]],"#weight":17},"field_video_duration":{"#theme":"field","#title":"Read Time\/Duration","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_video_duration","#field_type":"string","#field_translatable":true,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"string","#is_multiple":false,"#third_party_settings":[],"0":{"#type":"inline_template","#template":"{{ value|nl2br }}","#context":{"value":"12:58"}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":18},"field_read_time_visible_on_resou":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":19},"field_search_content":{"#theme":"field","#title":"Search Content","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_search_content","#field_type":"text_with_summary","#field_translatable":true,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"text_default","#is_multiple":false,"#third_party_settings":[],"0":{"#type":"processed_text","#text":"The next step in vSphere extensibility evolution is focused on the\u00a0technological updates necessary to maintain the stability and security of customer workloads. With the current announcement, we are setting the long-term standards our partners need to follow to provide our customers with the best quality vSphere enhancements. Overview The next step in vSphere extensibility evolution is focused on the technological updates necessary to maintain the stability and security of customer workloads. With the current announcement we are setting the long term standards our partners need to follow in order to provide our customers with the best quality vSphere enhancements. The mentioned technological updates encompass the following areas: Deprecation of the legacy local plugins and transition to the remote architecture. Contemporary technological standards local plugins must comply with. Updates targeting security hardening of vCenter Server Appliance and the plugins running on it. For more details on each of the subjects please check the sections below. Local plugin deprecation End of the legacy local plugins The remote plugin architecture was introduced with vSphere 6.7U1 and is compatible with any subsequent version. This is the only architecture that will be supported in the future vSphere releases. Starting from version 7.0U1 remote plugins have full feature parity with the legacy (a.k.a. local) plugins and with vSphere 7.0U3 the capabilities they offer already surpass those of the legacy local plugins. The legacy local plugin architecture was introduced with vSphere 6.5 and is compatible with versions 6.7, 7.0 and relevant updates. Since vSphere 7.0 VMware is not investing in new features for the local plugins as their evolution is completed. In the next major release of vSphere the local plugins will be deprecated and they will no longer be included in the VMware certification program. The support for local plugins will be ended from the subsequent major release. Advantages of the remote plugins The remote plugins are compatible with VMware cloud on AWS and the emerging VMware-supported clouds. They are the technology VMware will invest in to broaden the extensibility options of vSphere and increase plugin adoption on premise and in the cloud. The remote plugin architecture supports multiple plugin versions allowing to accommodate widely differing vCenter instances across SSO domains in Hybrid Linked Mode. Compared to the legacy (local) plugins, the interaction between vSphere and the remote plugins is on a different level from security, performance and compatibility perspective: The remote plugins operate with limited set of privileges in the vSphere environment and provide better auditing capabilities. They are compatible with the upgrade process of vSphere solving one of the major pain points for the customers and main obstacle for plugin adoption. The impact of remote plugins on vSphere performance is dramatically reduced ensuring much improved user experience with the UI. The remote plugins are running in their own appliance and do not get installed on the vCenter Server Appliance therefore do not need to comply with all technological boundaries and limitations vSphere must meet (more on that in the next sections). The remote plugins are the long-term focus of VMware SDK certification program. They open a wide range of possibilities for new features and optimisations from the perspective of security, lifecycle management and multi-cloud support. Transition path to remote plugins VMware strongly recommends for all partners to migrate their solutions to the remote architecture and abandon the local plugins before the latter get deprecated. Local plugins will still be supported in the next major version of vSphere, but there will be multiple technological changes and restrictions the local plugins will have to comply with in order to remain available as vSphere extensions. VMware imposes these changes in order to ensure the security, stability and supportability of customers' vSphere environments. The sensible approach to meet those changes would be for partners to speed-up the transition to remote plugins, instead of investing in legacy technology that is on the verge of deprecation. There are multiple paths for each partner to transition their solution to the remote architecture, depending on the technological specifics of each plugin. The following options are available: Build a remote plugin based on partner's existing standalone UI, reusing the full feature set, GUI and backend. Migrate the local plugin to remote architecture and leverage API migration tools. This approach is recommended when the local plugin is not heavily dependant on the Java services running on the vCenter Server Appliance. Build a remote plugin from scratch and design the solution based on the technological stack preferred by the partner. vSphere Client extensibility team will provide the necessary support for partners in the transition to remote architecture: to select the right migration option and to overcome potential technological difficulties. Local plugin certification and support The consequences from local plugin deprecation in the next major release of vSphere will be the following: Local plugins will no longer be part of vSphere Client plugin certification program. VMware will not certify and therefore recommend the usage of deprecated technology. Local plugins will still be supported. Although no new features will be delivered for the local architecture the customers will still be able to use their local plugins. VMware will be addressing potential critical issues and security problems related to local plugins as for any other supported technology or feature. VMware may incidentally impose changes in the local plugins in case critical security issues are identified. The consequences from local plugins being not supported in the subsequent major release will be the following: Local plugins will not be available for use in vSphere. Relevant APIs will no longer be supported and customers will not be able to install local plugins. Note: remote plugins will be fully supported and available. Compliance and technological changes affecting local plugins FIPS compliance In a future release of vSphere, VMware will require all vSphere Client local plugins, both partner-supplied and VMware-supplied, to comply with the United States government Federal Information Processing Standard (FIPS) Publication 140-2, Level 1, Security Requirements for Cryptographic Modules. That standard assures up-to-date data communication security by mandating the use of highly secure encryption algorithms. The article Preparing Local Plug-ins for FIPS Compliance in VMware code explains how you can upgrade your local plugin to use conformant encryption libraries correctly for interprocess communications. The instructions assume the use of Bouncy Castle FIPS libraries. By coding your plug-in to use default encryption providers, you enable your code to operate either with standard JVM encryption or with Bouncy Castle FIPS encryption. Note: The FIPS security requirement will not take effect in the vSphere 7.0 release generation. However, the customers will be able to configure vCenter Server to operate with or without FIPS providers in these releases. VMware is already upgrading its internal plug-ins, and we recommend that partners act soon to upgrade and test their own plug-ins with the new libraries. One of the requirements for FIPS compliance is for all Java services (and vsphere-ui in particular) in the vCenter Server Appliance to move to a FIPS-compliant version of BouncyCastle for TLS\/cryptography or use the Envoy Sidecar service to handle the TLS for them. The partners must consider that the vsphere-ui service is used to host vSphere Client local plugins, therefore any changes done to the vsphere-ui Java Virtual Machine could affect and possibly break the installed local plugins. The plugins have the option to become FIPS-compliant and not break when deploying in the vsphere-ui JVM by using the new BouncyCastle security providers for TLS connections and crypto. This process would require minimal changes to the plugin code since it keeps running against the same Java security interfaces. There are, however, a couple of breaking changes in the BouncyCastle implementation that should be handled. All the changes are backward compatible and the plugin will work both when deployed on FIPS switched ON (BouncyCastle implementation) and FIPS switched OFF (SUN implementation) environments. This should save the plugin from having to check any feature flags. Transition to SHA-256 The use of SHA-1 hash algorithm is being gradually deprecated in vSphere, starting from version 7.0U2. It will be incrementally replaced by SHA-256. Potential issues with SHA-1 have been known for years, but these were mostly theoretical and impractical. In 2020 practical attacks have been demonstrated that can be carried out with fairly limited resources and time. This situation effectively forces VMware to remove all vulnerable uses of SHA-1 in vSphere as soon as possible and instead use SHA-256 (see Wikipedia entry for SHA-1). In a future major release of vSphere, SHA-1 will be removed as supported hashing algorithm and replaced by SHA-256. We strongly recommend all partners to consider adding support for SHA-256 for the upcoming versions of their plugins (both local and remote) to be ready for the end of support of SHA-1 in a future major release of vSphere. Upgrade to Spring 5 Considering the official end of support for Spring 4 at the end of 2020 and the common vulnerabilities and exposures associated with version 4, VMware is upgrading vSphere Client to use Spring 5 starting from the release of vSphere 7.0U3. Spring 5 is not fully backward compatible which may lead to failure or malfunctioning of some vSphere Client plugins. A typical problematic situation could be the use of APIs deprecated in Spring 4, which are no longer supported in Spring 5. In case of such problems, we strongly recommend to modify the code of the affected plugin to make it compatible with Spring 5. We're providing however a fallback option, which is not recommended by VMware to make it possible for the plugin to continue working with vSphere 7.0U3 - that is to downgrade the vSphere Client to use Spring 4 through the following steps. Open \/etc\/vmware\/vmware-vmon\/svcCfgfiles\/vsphere-ui.json for edit. Uncomment this line: \/\/\u201c-DuseOldSpring=true\u201d. Restart vSphere Client service. Please be aware that the fallback option to downgrade to Spring 4 will not be available in the next major release. Third-party library isolation Third-party libraries deployed and utilised by the vCenter Server appliance (VCSA) for its own needs that are currently exposed to partner plugins will be restricted and no longer available effectively from the next major release of vSphere. In the versions of vSphere up to 7.0, the vSphere Client platform is not isolated. The local plugins have the possibility to import packages coming from third-party libraries deployed for the needs of vSphere Client platform. This is problematic for multiple reasons, such as: Changes to internal vSphere Client APIs could break plugin compatibility. Changes to a particular vSphere Client dependency (e.g. to consume security updates) could impact plugin compatibility. Historically, plugins have been commonly required to use third-party library dependencies from the vSphere Client (e.g. Spring). Plugins using vSphere Client internal dependencies present a serious risk from security and supportability POV, since VMware must be able to: Update libraries quickly if there is a notice about security vulnerability in the supported vSphere Client versions. Support each version of the Client for multiple years and therefore obliged to avoid unsupported libraries. These are the essential reasons forcing VMware to make a step further in maintaining the reliability of the plugin integration model and make sure plugin developers are providing their own OSGi Java dependencies. Any logging implementation\/facade, JSON\/XML serialisation, Apache utilities, etc. will have to be provided as part of the plugin: either as separate OSGi bundles or included in an existing plugin bundle's class path. The library isolation of local plugins will take effect in two steps, starting with the release vSphere 7.0U3, when it will be turned off by default. The library isolation will be turned on from the next major release of vSphere. For more information about the third-party libraries which availability will be restricted and for technical guidance please contact vSphere Client SDK team. Security hardening for local plugins SSPI, CAC, RSA SecurID In a future major vSphere release, VMware plans to discontinue support for Windows Session Authentication (SSPI) used as part of the Enhanced Authentication Plug-in, Smart Card support, and RSA SecurID for vCenter Server. In place of SSPI, Smart Card, or RSA SecurID, users and administrators can configure and use Identity Federation with a supported Identity Provider to sign in to their vCenter Server system. More information in the dedicated VMware Tech Zone announcement. IWA Integrated Windows Authentication (IWA) is deprecated in vSphere 7.0 and will be removed in a future release. For more information, see VMware Knowledge Base article 78506. DCUI smartcard In a future vSphere release, support for Smart Card Authentication in DCUI will be discontinued. In place of accessing DCUI using Personal Identity Verification (PIV), Common Access Card (CAC), or SC650 smart card, users will be encouraged to perform operations through vCenter, PowerCLI, API calls, or by logging in with a username and password. TPM 1.2 vSphere will continue to support legacy PCR usage with TPM 1.2, but will not support the new D\/A PCR usage model introduced with \u201cIce Lake\u201d platforms. More information in the dedicated VMware Technology Partner Hub message. 32-bit userworld Support for 32-bit userworld (used for partner drivers, plugins, extensions, etc.) is deprecated in favour of 64-bit userworld and will be permanently removed in the next major ESXi version. In vSphere 7.0, 32-bit userworld support has been deprecated. Userworlds are the components of ESXi used by partners to provide drivers, plugins, and other system extensions (distributed as VIBs). Userworlds are not customer accessible. vSphere 7.0 provides 64-bit userworld support through partner devkits and will retain 32-bit userworld support through this major release. Support for 32-bit userworlds will be permanently removed in the next major ESXi release. To avoid loss of functionality, customers should ensure any vendor-supplied VIBs in use are migrated to 64-bit before upgrading beyond the vSphere 7.0 release. More information in vSphere 7.0 release notes. vMON API service VMware plans to deprecate the VMware Service Lifecycle Manager API (vmonapi service) in a future release. For more information, see the dedicated VMware knowledge base article. Deprecating the Local Plugins :- The Next Step in vSphere Client Extensibility Evolution","#format":"restricted_html","#langcode":"en"},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":20},"comment":{"#theme":"field","#title":"Comments","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"comment","#field_type":"comment","#field_translatable":true,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"comment_default","#is_multiple":false,"#third_party_settings":[],"#cache":{"contexts":["user.permissions","user.roles"],"tags":[],"max-age":-1},"0":{"comments":[],"#comment_type":"comment","#comment_display_mode":1,"comment_form":[]},"#weight":21},"field_content_rich":{"#theme":"field","#title":"Summary","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_content_rich","#field_type":"text_long","#field_translatable":false,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"text_default","#is_multiple":false,"#third_party_settings":[],"0":{"#type":"processed_text","#text":"The next step in vSphere extensibility evolution is focused on the\u00a0technological updates necessary to maintain the stability and security of customer workloads. With the current announcement, we are setting the long-term standards our partners need to follow to provide our customers with the best quality vSphere enhancements.","#format":"summary_html","#langcode":"en"},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":22},"field_manual_read_time_duration":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":23},"field_quick_links":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":24},"field_pdf_author":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":25},"field_pdf":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":26},"field_auto_generated_pdf":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":27},"field_pdf_index":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":28},"field_generate_pdf":{"#theme":"field","#title":"Generate PDF","#label_display":"above","#view_mode":"full","#language":"en","#field_name":"field_generate_pdf","#field_type":"list_string","#field_translatable":true,"#entity_type":"node","#bundle":"article","#object":{"in_preview":null},"#items":{},"#formatter":"list_default","#is_multiple":true,"#third_party_settings":[],"0":{"#markup":"Generate a PDF from HTML Content","#allowed_tags":["a","b","big","code","del","em","i","ins","pre","q","small","span","strong","sub","sup","tt","ol","ul","li","p","br","img"]},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":29},"field_youtube_ids":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":30},"field_thumbnail_logo":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":31},"field_slider_icon_image":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":32},"field_label":{"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":33}},"author_attributes":"","display_submitted":true,"author_picture":{"#user":{},"#view_mode":"compact","#cache":{"tags":["user_view","user:6730"],"contexts":[],"max-age":-1,"keys":["entity_view","user","6730","compact"],"bin":"render"},"#theme":"user","#weight":0,"#pre_render":[[{},"build"]]},"coveo_enabled":1,"metadata":" \n","node_quick_links":"","isInternal":false,"associatedContent":"","the_author":[{"name":"Aditya Sahu","url":"\/users\/aditya-sahu","bio":"Aditya Sahu works as a Senior Technical Marketing Manager for VMware in the Cloud Platform Business Unit. In his role he covers core vSphere and vSphere with Tanzu. You can also reach out to him on twitter @ adityasahu_29","picture":"https:\/\/images.core.vmware.com\/sites\/default\/files\/pictures\/DSC_6761.jpg"}],"audience_name_is_internal":"Customer","active_inside_page":"yes","#attached":{"html_head":[[{"#tag":"script","#attributes":{"type":"text\/javascript"},"#value":"window.nodeData = {\"NodeID\":3212,\"NodeTitle\":\"Deprecating the Local Plugins :- The Next Step in vSphere Client Extensibility Evolution\",\"NodeUrl\":\"https:\\\/\\\/core.vmware.com\\\/blog\\\/deprecating-local-plugins-next-step-vsphere-client-extensibility-evolution\",\"AuthorID\":6730,\"currentNode\":{\"nid\":\"3212\",\"title\":\"Deprecating the Local Plugins :- The Next Step in vSphere Client Extensibility Evolution\",\"excerpt\":\"The next step in vSphere extensibility evolution is focused on the\\u00a0technological updates necessary to maintain the stability and security of customer workloads. With the current announcement, we are setting the long-term standards our partners need to follow to provide our customers with the best quality vSphere enhancements.\",\"thumbnail\":\"https:\\\/\\\/images.core.vmware.com\\\/sites\\\/default\\\/files\\\/Screenshot%202020-09-18%20at%204.01.27%20PM_4.jpg\",\"date\":\"July 27, 2021\",\"thumbnail_logo_option\":\"\",\"no_thumbnail_image\":true,\"slider_icon_image\":\"\",\"field_card_type\":\"\",\"url\":\"\\\/blog\\\/deprecating-local-plugins-next-step-vsphere-client-extensibility-evolution\",\"pdfUrl\":\"\",\"target\":\"_self\",\"primaryIcon\":\"resource-blog\",\"secondaryIcon\":\"resource-blog\",\"resourceType\":\"Blog\",\"cardType\":\"image\",\"cardColor\":\"indigo\",\"label\":\"Read Post\",\"shareUrl\":\"https:\\\/\\\/core.vmware.com\\\/blog\\\/deprecating-local-plugins-next-step-vsphere-client-extensibility-evolution\",\"hideTileDate\":\"no\",\"confidential\":false,\"tags\":{\"Solution\":[\"Application Acceleration\",\"Lifecycle Management\",\"Modern Applications\"],\"Audience\":[\"Customer\"],\"Type\":[\"Blog\"],\"Level\":[\"Overview\"],\"Category\":[\"Announcement\"],\"Product\":[\"vSphere\",\"vSphere 7\"]},\"poc\":true,\"rating\":{\"cr\":\"5.0\",\"ur\":\"0\",\"cr1\":\"5\",\"ur1\":\"0\"},\"admintags\":\"CloudPlatform\",\"type_orig\":\"article\",\"pathAlias\":\"\\\/blog\\\/deprecating-local-plugins-next-step-vsphere-client-extensibility-evolution\",\"node_author\":[{\"name\":\"Aditya Sahu\",\"bio\":\"Aditya Sahu works as a Senior Technical Marketing Manager for VMware in the Cloud Platform Business Unit. In his role he covers core vSphere and vSphere with Tanzu. You can also reach out to him on twitter @ adityasahu_29\",\"authorURL\":\"\\\/users\\\/aditya-sahu\"}],\"file_type\":\"\"},\"admintags\":\"CloudPlatform\",\"assetInfo\":{\"previousLink\":\"\",\"nextLink\":\"\",\"backLink\":\"\",\"currentActivityTitle\":\"\",\"timeDuration\":\"\",\"unpub\":false,\"creationDate\":\"July 27, 2021\",\"lastUpdatedTime\":\"\",\"lastAccessed\":\"Login\",\"assetLocation\":[],\"activityPaths\":[],\"quickLinks\":[],\"authors\":[]}};"},"nodeData"],[{"#tag":"link","#attributes":{"rel":"canonical","href":"https:\/\/core.vmware.com\/blog\/deprecating-local-plugins-next-step-vsphere-client-extensibility-evolution"}},"canonical_url"],[{"#tag":"title","#value":"Deprecating the Local Plugins :- The Next Step in vSphere Client Extensibility Evolution | VMware"},"title"],[{"#tag":"meta","#attributes":{"name":"description","content":"The next step in vSphere extensibility evolution is focused on the\u00a0technological updates necessary to maintain the stability and security of"}},"description"],[{"#tag":"meta","#attributes":{"name":"keywords","content":"deprecating, local, plugins, :-, next, step, vsphere, client, extensibility, evolution, focused, the\u00a0technological, updates, necessary, maintain, stability, security, customer, workloads, current, announcement, setting, long-term, standards, partners, follow, provide, customers, best, quality, enhancements"}},"keywords"],[{"#tag":"meta","#attributes":{"name":"author","content":"Aditya Sahu"}},"author"],[{"#tag":"meta","#attributes":{"property":"og:title","content":"Deprecating the Local Plugins :- The Next Step in vSphere Client Extensibility Evolution | VMware"}},"og_title"],[{"#tag":"meta","#attributes":{"property":"og:description","content":"The next step in vSphere extensibility evolution is focused on the\u00a0technological updates necessary to maintain the stability and security of customer workloads. With the current announcement, we are setting the long-term standards our partners need to follow to provide our customers with the best quality vSphere enhancements."}},"og_description"],[{"#tag":"meta","#attributes":{"property":"og:url","content":"https:\/\/core.vmware.com\/blog\/deprecating-local-plugins-next-step-vsphere-client-extensibility-evolution"}},"og_url"],[{"#tag":"meta","#attributes":{"property":"og:image","content":"https:\/\/images.core.vmware.com\/sites\/default\/files\/Screenshot%202020-09-18%20at%204.01.27%20PM_4.jpg"}},"og_image"],[{"#tag":"meta","#attributes":{"property":"og:author","content":"Aditya Sahu"}},"og_author"],[{"#tag":"meta","#attributes":{"property":"og:type","content":"VMware Blog"}},"og_type"],[{"#tag":"meta","#attributes":{"name":"twitter:label1","content":"Written by"}},"twitterauthor1"],[{"#tag":"meta","#attributes":{"name":"twitter:data1","content":"Aditya Sahu"}},"twitterauthor2"],[{"#tag":"meta","#attributes":{"name":"twitter:label3","content":"Asset Type"}},"asset1"],[{"#tag":"meta","#attributes":{"name":"twitter:data3","content":"Blog Post"}},"asset2"],[{"#tag":"meta","#attributes":{"property":"og:site_name","content":"The Cloud Platform Tech Zone"}},"og_site_name"]]},"#cssjscid":"s6mec3","formatedDate":"July 27, 2021","image_url":"https:\/\/images.core.vmware.com\/sites\/default\/files\/Screenshot%202020-09-18%20at%204.01.27%20PM_4.jpg","summary":"The next step in vSphere extensibility evolution is focused on the\u00a0technological updates necessary to maintain the stability and security of customer workloads. With the current announcement, we are setting the long-term standards our partners need to follow to provide our customers with the best quality vSphere enhancements.","theme_hook_suggestions":["node__full","node__article","node__article__full","node__3212","node__3212__full"],"theme_hook_suggestion":"node"}); July 27, 2021 Deprecating the Local Plugins :- The Next Step in vSphere Client Extensibility Evolution The next step in vSphere extensibility evolution is focused on the technological updates necessary to maintain the stability and security of customer workloads. With the current announcement, we are setting the long-term standards our partners need to follow to provide our customers with the best quality vSphere enhancements. OverviewThe next step in vSphere extensibility evolution is focused on the technological updates necessary to maintain the stability and security of customer workloads. With the current announcement we are setting the long term standards our partners need to follow in order to provide our customers with the best quality vSphere enhancements. 006ab0faaa

movie web.com download

windows picture resizer download

pizza frenzy pc download

the devils double full movie download 720p

500 internal server error file download