Virt-Who Processes, Queries, and Data
Updated -
Network Security Officers and Administrators may have concerns about providing read-only credentials to the virt-who process. Concerns generally focus on the use of the credentials for activities other than subscription reconciliation. This article provides details on the virt-who processes, queries, and retained data to verify that the virt-who process is necessary and solely for the purpos...
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.