The current situation we see today is that the audit events in windows event viewer is exposing bind passwords for dxtools operation in our scripts including dxsearch and dxmodify.
New Process Name: D:\CA\Directory\dxserver\bin\dxmodify.exe
Process Command Line: dxmodify -h localhost -p port -D "uid=DirectoryAdmin,ou=Admins,o=broadcom,c=US" -w "exposed-plain-text-password"
This is happening using both dxsearch and dxmodify.
Is it possible to not expose the password in the command?
Release : 14.1