This article outlines the support stance and risks associated with using third-party tools to rotate local OS user, application user, and integration users ( service and other AD user ) accounts passwords within the Aria Suite appliances too frequently (such as hourly or daily)
Broadcom does not recommend changing passwords for local OS user, application user, and integration users ( service and other AD user ) accounts in Aria Suite appliances too frequently (such as hourly or daily) using third-party tools like CyberArk or similar automation solutions. Instead, it's best to follow industry standard organization’s policy such as changing passwords every 45 days or later and use supported methods like the product’s UI or CLI, as documented by Broadcom
Why is it not recommended to change the passwords too often on VMware Aria Suite appliances?
These accounts are often linked to critical internal services, and the system depends on those credentials staying consistent. Frequent changes to these credentials can lead to service interruptions, integration problems, authentication failures and potential production downtime.
As per Broadcom’s policy:
No modifications to the underlying OS are supported
This includes:
Using external tools or scripts to rotate system passwords
Adding, updating, or removing packages
Deploying custom automation scripts within the OS of the appliance
For more details, refer to Broadcom KB Article 367354 – Support policy for modifications to VMware virtual appliances
To ensure safe and secure password rotation, follow the official VMware procedures provided in KB Article 322673.