12.4. Trusted Compute Pools
12.4.1. Creating a Trusted Cluster
Note
If no OpenAttestation server is properly configured, this procedure will fail.
Summary
This procedure explains how to set up a trusted computing pool. Trusted computing pools permit the deployment of virtual machines on trusted hosts. With the addition of attestation, administrators can ensure that verified measurement of software is running in the hosts. This provides the foundation of the secure enterprise stack.
Procedure 12.9. Creating a Trusted Cluster
- In the navigation pane, select the Clusters tab.
- Click the button.
- In the General tab, set the cluster name.
- In the General tab, select the Enable Virt Service radio button.
- In the Cluster Policy tab, select Enable Trusted Service check box.
- Click .
Result
You have built a trusted computing pool.
12.4.2. Adding a Trusted Host
Summary
This procedure explains how to add a trusted host to your Red Hat Enterprise Virtualization environment.
Procedure 12.10.
- Select the Hosts tab.
- Click the button.
- In the General tab, set the host's name.
- In the General tab, set the host's address.
Note
The host designated here must be trusted by the attestation server. - In the General tab, in the Host Cluster drop-down menu, select a trusted cluster.
- Click .
Result
You have added a trusted host to your Red Hat Enterprise Virtualization environment.