Privileges Required to use Credential Protocols 
To use credential protocols, you need either:
scheduler-administrator role
system, partition or isolation goup-level permissions
object-specific privileges
You need the following privilege ranks to be able to use credential protocols in job definitions:
View - allows you to view the credential protocols and use it in a job definition.
Create - allows you to create credential protocols on the level the privilege was granted (system, partition, isolation-group), you have no further privileges through this rank, you automatically get privileges on audit rules you create.
Edit - allows you to create, view and edit all credential protocols on the level the privilege was granted (system, partition, isolation-group, object)
Delete - allows you to create, view, and delete all credential protocols on the level the privilege was granted (system, partition, isolation-group, object)
All - full control over all credential protocols on the level the privilege was granted (system, partition, isolation-group, object)
Note
You can create credential protocols, however, you will only be able to use them with specially crafted job definition types.
Edit - privilege rank on the credential protocol, or on credential protocols in its partition, isolation group or system-wide
All - privilege rank on the credential protocol, or on credential protocols in its partition, isolation group or system-wide
Credential protocols can reference the following objects, you need at least View privileges on these objects when you want to edit a credential protocols that references them:
Application
Delete privilege on the credential protocol, or on credential protocols in its partition, isolation group or system-wide
All credential protocol, or on credential protocols in its partition, isolation group or system-wide