WilliamLam.com

  • About
    • About
    • Privacy
  • VMware Cloud Foundation
  • VKS
  • Homelab
    • Resources
    • Nested Virtualization
  • VMware Nostalgia
  • Apple
You are here: Home / Automation / Quick Tip - Automating ESXi local user passwords using SHA512 encrypted hashes

Quick Tip - Automating ESXi local user passwords using SHA512 encrypted hashes

01.17.2023 by William Lam // Leave a Comment

For those that automate their ESXi installations using Kickstart aka ESXi scripted installation should be quite familiar with the ability to configure the root password as part of the installation. As described in the official ESXi documentation, the --rootpw option can either contain a plain text password (not recommended) or with the use of the additional --iscrypted option, a SHA512 hash of the password can also be used, which is definitely recommended and more secure.

However, when managing additional local users via ESXCLI system account, which I recently blogged about here, I noticed that you can only provide a plain text password either on the command-line (not recommended) or interactively, which prevents this process from being automated. As mentioned in the blog post, you could store the password and the commands into another script file and this will at least hide the password from being stored in the ESXi Shell log file (/var/log/shell.log) but this is far from ideal.

While sharing this feedback with Engineering as part of a feature enhancement request, I came to learn about a nice little utility that can be used with both ESXi 7.x and 8.x that can update local user by simply providing the encrypted SHA512 hash.

The utility is called chpw and accepts the local ESXi user which you wish to update the password and the SHA512 hash which is read from stdin, so using simple "echo" command would suffice.

Here is an example, assuming your SHA512 hash is stored in the $HASH variable and local username is admin321, you can update user password hash by running the following command:

echo $HASH | /usr/lib/vmware/auth/bin/chpw admin321


As you see, this can easily be integrated into your existing ESXi kickstart and is more secure and a pretty common method for adding additional local users by specifying the encrypted hash rather than using a plaintext password.

Note: There are a number of different ways of generating the SHA512 encrypted hash (quick search online will yield multiple options), but the easiest method is to manually configure a password for an account and then copy out the hash from the /etc/shadow file.

More from my site

  • Quick Tip - What hashing algorithm is supported for ESXi Kickstart password?
  • Quick Tip - Automating cpuUniformityHardCheckPanic configuration for ESXi Kickstart with USB
  • Disable IPv6 in ESXi Kickstart without additional reboot
  • Automated VMware Cloud Foundation (VCF) host commission using ESXi Kickstart
  • Quick Tip - Using ESXi Scripted Installation (kickstart) to configure IPv6 networking

Categories // Automation, ESXi Tags // ESXi, kickstart, SHA512

Thanks for the comment!Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Search

Thank Author

Author

William is Distinguished Platform Engineering Architect in the VMware Cloud Foundation (VCF) Division at Broadcom. His primary focus is helping customers and partners build, run and operate a modern Private Cloud using the VMware Cloud Foundation (VCF) platform.

Connect

  • Bluesky
  • Email
  • GitHub
  • LinkedIn
  • Mastodon
  • Reddit
  • RSS
  • Twitter
  • Vimeo

Recent

  • Programmatically accessing the Broadcom Compatibility Guide (BCG) 05/06/2025
  • Quick Tip - Validating Broadcom Download Token  05/01/2025
  • Supported chipsets for the USB Network Native Driver for ESXi Fling 04/23/2025
  • vCenter Identity Federation with Authelia 04/16/2025
  • vCenter Server Identity Federation with Kanidm 04/10/2025

Advertisment

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Copyright WilliamLam.com © 2025

 

Loading Comments...