search cancel

SQL*Loader jobs run from an Applications Manager Windows Agent leave passwords exposed.

book

Article ID: 89225

calendar_today

Updated On:

Products

CA Automic Applications Manager (AM)

Issue/Introduction

SQL*Loader jobs run from an Applications Manager Windows Agent leave passwords exposed.

Environment

Release: AAMOS499000-8.0-Automic Applications Manager-OS400 Agent
Component:

Resolution

Symptoms

SQL*Loader jobs run on an Applications Manager (AM) Windows Agent do not delete the par file from run directory which leaves passwords exposed.


Cause

The LOADP.bat file used to run SQL*Loader jobs from an AM Windows Agent is located in the %AW_HOME%\exec folder contains the line unlink("seq_no\.par") but should be unlink("$seq_no\.par"). This causes the par file to remain in the run directory and leaves passwords used during job execution to be exposed.


Workaround

Change the following line in the LOADP.bat file.

From:  unlink("seq_no\.par");
To:   unlink("$seq_no\.par");


Resolution

 This issue was reported in PRB0208958 has been fixed in AM v8.0 SP13.