vCenter Server Cloud Provider Use Cases and Architectures : Introduction : 1.1 vCenter Server Overview
   
1.1 vCenter Server Overview
vCenter Server is the most simple and efficient way to manage vSphere hosts. It provides unified management of all the hosts, datastores, and virtual machines (VMs) in the virtual data center from a single web console, with aggregate performance monitoring of clusters, hosts, and VMs. vCenter Server gives service providers and tenants deep insight into the status and configuration of clusters, hosts, VMs, storage, the guest OS, and other critical components of a virtual infrastructure. Other key features of vCenter Server include:
Centralized control and visibility at every level of virtual infrastructure
Proactive management of vSphere
Scalable and extensible management platform with a broad partner ecosystem
Dynamic allocation of resources using VMware vSphere Distributed Resource Scheduler™ (DRS)
Storage maps and reports that convey storage usage, connectivity, and configuration
Customizable topology views and granular role-based access control, which provide visibility into the infrastructure and assist in diagnosis and troubleshooting of issues
Alerts and notifications that support entities, metrics, and events, such as host, datastore, and VM specific alarms
vCenter Server and vSphere hosts determine the user access level based on the permissions assigned to the user. The combination of user name, password, and permissions is the mechanism by which vCenter Server and vSphere hosts authenticate a tenant or service provider administrator for access and authorize the user to perform activities. vCenter Server maintains a list of authorized users and the permissions assigned to each user. Privileges define basic individual rights that are required to perform actions and read properties. vSphere and vCenter Server use sets of privileges, or roles, to control which users or groups can access particular vSphere objects. You can define different access levels for each tenant object and restrict access using these access levels. This robust permission mechanism and integration with Microsoft Active Directory guarantees authorized access to the tenant environment and its virtual machines, with responsibilities delegated to tenant administrators based on the service design.