Virt-Who Processes, Queries, and Data

Updated -

Network Security Officers and Administrators may have concerns about providing read-only credentials to the virt-who process. Concerns generally focus on the use of the credentials for activities other than subscription reconciliation. This article provides details on the virt-who processes, queries, and retained data to verify that the virt-who process is necessary and solely for the purpos...

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.