Specifications

Table Of Contents
VMware Server Administration Guide
88 VMware, Inc.
If!you!want!to!limit!access!to!the!virtual!machine,!clear!the!Allow!inheritable!
permissions!from!parent!to!propagate!to!this!object!check!box.
4To!specify!that!a!user!or!group!that!should!not!have!access!to!the!configuration!file,!
either!click!Remove!or!check! all!permissions!in!the!Deny!column!
to!deny!all!
permissions!to!that!user!or!group.!
5To!add!more!users!or!groups,!click!Add.!
The!Select!Users,!Computers!and!Groups!dialog!box!appears.
6In!the!dialog!box,!select!the!groups!or!users!that!you!want!to!access!the!virtual!
machine,!then!click!Add.!
7After!you!finish!adding!
the!users!or!groups,!click!OK.!
The!users!and!groups!are!added!with!default!Read!and!Write!permissions.!
8In!the!Properties!dialog!box,!change!the!type!of!access!for!the!user!or!group!to!the!
configuration!file.!Choose!either!Read!or!Read!&!Execute!and!Write.!
9Click!OK!to!set
!the!permissions!to!the!configuration!file.!
Authenticating Users and Running Virtual Machines for a Linux
Host
VMware!Server!for!Linux!uses!Pluggable!Authentication!Modules!(PAM)!for!user!
authentication!in!the!VMware!Server!Console!and!the!VMware!Management!Interface.!
The!default!installation!of!VMware!Server!uses!standard!Linux!/etc/passwd!
authentication,!but!can!be!configured!to!use!LDAP,!NIS,!Kerberos!or!another!
distributed!authentication!mechanism.!
Every!time!you!connect
!to!the! VMware!Server!host!with!the!VMware!Server!Console!
or!VMware!Management!Interface,!the!inetd!or!xinetd!process!runs!an!instance!of!the!
VMware!authentication!daemon!(vmware-authd).!The!vmware-authd!process!requests!a!
username!and!password,!and!hands!them!off!to!PAM,!which!performs!the!
authentication.
After!you!are!authenticated,
!the!console!starts!or!the!management!interface’s!Status!
Monitor!page!appears.!What!you!can!now!do!with!the!virtual!machines!is!based!on!
your!permissions.!See!“Understanding!Permissions!and!Virtual!Machines”!on!page 83.
The!vmware-authd!process!starts!a!virtual!machine!process!as!the! owner!of!the!
configuration!file,!not!as!the
!user!connecting!to!the!virtual!machine.!However,!the!user!
is!still!restricted!by!his!or!her!permissions!on!the!configuration!file.