Credential Protocols 
Credential protocols are used to store connection information for remote systems, such as Windows process servers.The following built-in credentials are available:
login - standard protocol for platform agents
oracle - standard protocol for accessing Oracle databases
If you require a specific protocol for your application or platform, protocols can be created/modified for you on a consultancy-basis.
Credential protocols support the following actions:
Action |
Description |
Edit |
Edit the credential protocol |
Edit Security |
Edit the security of the credential protocol |
Delete |
Delete the credential protocol |
Expand All |
Expand all credential protocols in the current filter |
New |
Create a new credential protocol |
Filter > New Filter |
Create a new credential protocol filter |
Filter > Edit Filter |
Edit current credential protocol filter |
Filter > Delete |
Delete current credential protocol filter |
You can search for credential protocols using filters and the Search Credential Protocols box on the Credential Protocols tab. This box is known as the intelliSearch box and located under your username on the top right-hand side of the user interface. Filters allow you to specify a list of objects with static criteria. IntelliSearch allows you to specify complex queries in a simple way using prefixes. Prefixes are used to specify which property you are searching in and have short and long syntaxes. For example, if you want to display all credential protocols with the term dev in the comment, you would use the search criteria as follows:
c:dev
You can search more than one property, as follows:
c:dev n:ORA
Note
No spaces should be entered before or after the colon (:).
See the Advanced Object Search for more information.
The following table illustrates the available prefixes for credential protocols:
Prefixes |
Description |
n, name |
searches the name property |
c, com, comment |
searches the comment property |
d, desc, description |
searches the description property |
a, app, application |
searches the application property |
You can only delete credential protocols when no other objects relate to them. For example, if there are credentials that use the credential protocol, the credential protocol cannot be deleted until all credentials that use it have been modified. You can see all credentials that relate to the credential protocol in Related Objects in the lower detail pane and on the show page.
The table in related objects contains three columns:
Type - the type of object with a link to it
Related Object - the name of the object with a link to it
Used As - objects can sometimes be used in different roles
Privilege |
Description |
CredentialProtocol.Create |
Create credential protocols |
CredentialProtocol.Delete |
Delete credential protocols |
CredentialProtocol.Edit |
Edit credential protocols |
CredentialProtocol.View |
Access credential protocols |
You can grant privileges on two levels, Access and Admin; a privilege granted on Admin level allows the grantee to grant the privilege to other users. These privileges can be granted system-wide, per partition or isolation group.
You specify which users can access, edit, and delete the credentials on the Security tab of the credentials or credential protocols.