Trusted credentials are used for users who must perform a task or process but do not have sufficient access permissions for entries that contain sensitive data, such as database signons and group memberships. Users with more extensive access permissions own the entry and authorize other trusted users to use their credentials to access the entry.

Trusted credentials are also used to run scheduled requests when users are not logged on to ACI, for example overnight. When the request runs, a user session is created. The trusted credential is used to log on to ACI as the user the trusted credential represents and the user’s access permissions are used to run the report or the job.

 
loading table of contents...