To review the permission situation in the vSphere client, administrators must look at each and every resource individually. This is also aggravated by the complexity of possible privileges (user rights).
The permission rights in vSphere can be extensive. The "create snapshot" function, for example, enables copying a virtual machine in just a few steps, Rights such as these create wide-open exposure to data theft. Therefore, transparency in permissions on virtual servers is of paramount importance.
The 8MATE for vSphere scans and searches permissions of all vSphere resources. It also shows through which group memberships a user receives rights. Thus, the 8MATE creates the prerequisites for early detection of harmful security vulnerabilities. For standard processes, 8MATE has preconfigured permission concepts on file. An actual-ideal comparison is used to determine the appropriate permission concept for each role. Unnecessary permissions can subsequently be removed in vSphere.
The 8MATE for vSphere has a special functional feature. Controversial rights, such as "Create snapshot" can be called up directly in 8MATE. In an overview you see immediately who has this permission on which virtual machines.