We currently have a couple of Shell scripts we have written to EnableConfigItem from a Unix (Red Hat) command line, so we can control when a Service/Operation is running via the cron in Unix. We do this by calling
:>iris session xxxxxusing _system user.
During our Security audit it was mentioned that we need to lock down some of the cache users.
- So, has others written scripts to make IRIS calls via command line?
- If so, what is the consensus of using a Cache user vs using say a LDAP service account?
- Or what have you used in the past to ensure that the password is not hardcoded anywhere?

.png)

.png)
.png)

