Show TOC

Background documentationCredential Protocols Locate this document in the navigation structure

 

Credential protocols are used to store connection information for remote systems, such as Windows process servers.The following built-in credentials are available:

  • login - standard protocol for platform agents

  • oracle - standard protocol for accessing Oracle databases

If you require a specific protocol for your application or platform, protocols can be created/modified for you on a consultancy-basis.

Actions

Credential protocols support the following actions:

Action

Description

Edit

Edit the credential protocol

Edit Security

Edit the security of the credential protocol

Delete

Delete the credential protocol

Expand All

Expand all credential protocols in the current filter

New

Create a new credential protocol

Filter > New Filter

Create a new credential protocol filter

Filter > Edit Filter

Edit current credential protocol filter

Filter > Delete

Delete current credential protocol filter

Finding Credential Protocols

You can search for credential protocols using filters and the Search Credential Protocols box on the Credential Protocols tab. This box is known as the intelliSearch box and located under your username on the top right-hand side of the user interface. Filters allow you to specify a list of objects with static criteria. IntelliSearch allows you to specify complex queries in a simple way using prefixes. Prefixes are used to specify which property you are searching in and have short and long syntaxes. For example, if you want to display all credential protocols with the term dev in the comment, you would use the search criteria as follows:

c:dev

You can search more than one property, as follows:

c:dev n:ORA

Note Note

No spaces should be entered before or after the colon (:).

End of the note.

See the Advanced Object Search for more information.

The following table illustrates the available prefixes for credential protocols:

Prefixes

Description

n, name

searches the name property

c, com, comment

searches the comment property

d, desc, description

searches the description property

a, app, application

searches the application property

Deleting Credential Protocols

You can only delete credential protocols when no other objects relate to them. For example, if there are credentials that use the credential protocol, the credential protocol cannot be deleted until all credentials that use it have been modified. You can see all credentials that relate to the credential protocol in Related Objects in the lower detail pane and on the show page.

The table in related objects contains three columns:

  • Type - the type of object with a link to it

  • Related Object - the name of the object with a link to it

  • Used As - objects can sometimes be used in different roles

Security

Privilege

Description

CredentialProtocol.Create

Create credential protocols

CredentialProtocol.Delete

Delete credential protocols

CredentialProtocol.Edit

Edit credential protocols

CredentialProtocol.View

Access credential protocols

You can grant privileges on two levels, Access and Admin; a privilege granted on Admin level allows the grantee to grant the privilege to other users. These privileges can be granted system-wide, per partition or isolation group.

You specify which users can access, edit, and delete the credentials on the Security tab of the credentials or credential protocols.