Password Rotation for VMware Aria Suite Appliances Using Third-Party Tools
search cancel

Password Rotation for VMware Aria Suite Appliances Using Third-Party Tools

book

Article ID: 405228

calendar_today

Updated On:

Products

VCF Operations/Automation (formerly VMware Aria Suite)

Issue/Introduction

This article outlines the support stance and risks associated with using third-party tools to rotate local OS user, application user, and integration users ( service and other AD user ) accounts passwords within the Aria Suite appliances too frequently (such as hourly or daily) 

 

Resolution

Broadcom does not recommend changing passwords for local OS user, application user, and integration users ( service and other AD user ) accounts in Aria Suite appliances too frequently (such as hourly or daily) using third-party tools like CyberArk or similar automation solutions. Instead, it's best to follow industry standard organization’s policy such as changing passwords every 45 days or later and use supported methods like the product’s UI or CLI, as documented by Broadcom

Why is it not recommended to change the passwords too often on VMware Aria Suite appliances?

These accounts are often linked to critical internal services, and the system depends on those credentials staying consistent. Frequent changes to these credentials can lead to service interruptions, integration problems, authentication failures and potential production downtime.

As per Broadcom’s policy:

  • No modifications to the underlying OS are supported

  • This includes:

    • Using external tools or scripts to rotate system passwords

    • Adding, updating, or removing packages

    • Deploying custom automation scripts within the OS of the appliance

For more details, refer to Broadcom KB Article 367354 Support policy for modifications to VMware virtual appliances

Additional Information

To ensure safe and secure password rotation, follow the official VMware procedures provided in KB Article 322673.