With a VIB having the acceptance level of CommunitySupported or PartnerSupported, you can only add files or make modifications to specific locations on the ESXi host (see below). You cannot, for example, add a startup script to the /etc/rc.local.d directory so that a specific action takes place each time the ESXi host reboots. As another example, lets say that you want to add a cron job using a custom VIB - you cannot do so using the lower level acceptance levels. You MUST use a VMwareAccepted acceptance level for your VIB.
Now, you can set that acceptance level value in your VIB, but you cannot deploy that VIB without forcing it at the command line because it is not signed by VMware. It is my understanding that the only way to get it properly signed by VMware is to submit that VIB for testing and approval. That process doesn't make sense if you're creating internal VIBs that are not going to be distributed outside of your organization. As such, there must be a mechanism in place to create and distribute internally created VIBs.
My thought is that we should be able to create our own CA certificate, import that certificate to the ESXi hosts, and then use that certificate to self sign our VIBs for deployment. While I can understand that deployment of such VIBs are not supported by VMware, it is the most ideal mechanism for deploying and maintaining enterprise-specific modifications to the ESXi hosts (especially when there are many to manage).
Locations Allowed w/ PartnerSupported and CommunitySupported
etc/vmware/shutdown/shutdown/
etc/vmware/pciid/
etc/vmware/vm-support/
etc/vmware/firewall/
etc/vmware/service/
etc/cim/openwsman/
opt/
usr/lib/cim/
usr/lib/pycim/
usr/lib/hostprofiles/plugins/
usr/lib/vmware/
usr/lib/vmware-debug/
var/lib/sfcb/registration/
etc/vmware/driver.map.d
usr/share/hwdata/driver.pciids.d