Show TOC

Background documentationPrivileges Required to use Credential Protocols Locate this document in the navigation structure

 

To use credential protocols, you need either:

  • scheduler-administrator role

  • system, partition or isolation goup-level permissions

  • object-specific privileges

Using Credential Protocols

You need the following privilege ranks to be able to use credential protocols in job definitions:

  • View - allows you to view the credential protocols and use it in a job definition.

Creating Credential Protocols
  • Create - allows you to create credential protocols on the level the privilege was granted (system, partition, isolation-group), you have no further privileges through this rank, you automatically get privileges on audit rules you create.

  • Edit - allows you to create, view and edit all credential protocols on the level the privilege was granted (system, partition, isolation-group, object)

  • Delete - allows you to create, view, and delete all credential protocols on the level the privilege was granted (system, partition, isolation-group, object)

  • All - full control over all credential protocols on the level the privilege was granted (system, partition, isolation-group, object)

Note Note

You can create credential protocols, however, you will only be able to use them with specially crafted job definition types.

End of the note.
Editing Credential Protocols
  • Edit - privilege rank on the credential protocol, or on credential protocols in its partition, isolation group or system-wide

  • All - privilege rank on the credential protocol, or on credential protocols in its partition, isolation group or system-wide

Credential protocols can reference the following objects, you need at least View privileges on these objects when you want to edit a credential protocols that references them:

  • Application

Deleting Credential Protocols
  • Delete privilege on the credential protocol, or on credential protocols in its partition, isolation group or system-wide

  • All credential protocol, or on credential protocols in its partition, isolation group or system-wide