, , ,

TPM chips the achieves heal of re-purposing old hardware for vSphere

INTRO

Trusted Platform Module (TPM) chips went into common usage in the early 2000s when the Trusted Computing Group (TCG) was formed by Intel and other companies to enhance hardware security by providing a secure environment for cryptographic operations and secure key storage

TPM chips typically measure about 1 x 1 inch or smaller, if you weren’t looking for one, you wouldn’t even know they were inside your vSphere ESXi host

Basic Functionality When Installed in a Computer

When installed, the TPM chip provides a secure environment to perform cryptographic operations. Its primary functions include:

Remember the doomed Windows VISTA in 2007? That marked the first mainstream OS that a TPM pre-req in order to be installed, though, there were work-arounds

Windows 11 being the second OS where TPM 2.0 (from 2014) was marked as mandatory

TPM VersionRelease DateRequired By OSOS Release Date
TPM 1.203/2006Windows 8.1 (for some editions), Windows 10 (for some editions)10/17/2013 (Windows 8.1), 07/29/2015 (Windows 10)
TPM 2.010/2014Windows 11 (all editions, required)10/05/2021 (Windows 11)

This post will focus on TPM 2.0 and vSphere integration. While TPM 2.0 has released in 2014, it’s still an optional add-in card on all the major OEMs (Lenovo, Cisco, Dell, HPE). What does this mean? As an EUC (VDI) person working on a vSphere implementation, you might not have the crypto chips required to deploy Windows 11

Do you have a TPM?

These little fellas are located in different places on different server hardware

DELL

I’ve got a Dell R640 (see related post), I bought it October 2025. The eBay seller forgot to include the TPM 2.0 chip, so he shipped it post sale, I installed it here (Pic taken from STH, thanks, Patrick)

NOTE! Once it’s installed, it doesn’t automatically get activated, here are the steps to provision within the Dell server BIOS so that ESXi detects it

HPE / Lenovo / Cisco / other brands

I wasn’t an early BITCOIN adopter, so just have one server brand represented at home, for the other OEMS, refer to the respective manuals for the steps to install / provision your TPM

The above steps within ESXi would be the same once you’ve satisfied the physical install and BIOS enablement for your TPM 2 chip

vCenter server side changes required

Check the box shown to use the TPM 2.0 chip you got working in the previous section

Fill in the required info + SAVE THE KEY INFO to your preferred password manager

When done, your KMS setup should look as below

vCenter VM side changes required

Finally! you can add that vTPM!

Add as below

It should be noted, that you CAN use an external KMS if one is available, however, going the hardware route is going to be more secure and less work, and less moving parts, see the below on that topic

Quick Tip – Which vCenter Server Key Provider (KMS) is a VM using?

Thanks for reading and have a great day

Owen

Leave a comment