Virt-Who Processes, Queries, and Data

Updated -

Network Security Officers and Administrators may have concerns about providing read-only credentials to the virt-who process. Concerns generally focus on the use of the credentials for activities other than subscription reconciliation. This article provides details on the virt-who processes, queries, and retained data to verify that the virt-who process is necessary and solely for the purpos...

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content