The +policyfetcher account executes the policyfetcher daemon or service, which looks for deployment tasks on the DH, applies policy updates to the local CA Access Control database (seosdb), and sends a heartbeat to the DH at regular intervals. CA Access Control uses a SPECIALPGM rule to define +policyfetcher as a system user. +policyfetcher runs as the NT Authority\System user in Windows.
You may need to regularly change the +policyfetcher password to comply with your organization's security and password policies.
Before you change the +policyfetcher password, note the following:
Important! To prevent this user from logging in to the CA Access Control database, we recommend that you do not set a password for this user.
To change the +policyfetcher password, use selang to change the password.
Example: Change the +policyfetcher Password
This command changes the password for the +policyfetcher user. The password is "secret", and must be in clear text and enclosed in double quotes:
AC> cu +policyfetcher password("secret") grace- nonative
(localhost)
Successfully updated USER +policyfetcher
| Copyright © 2012 CA. All rights reserved. |
|