User-based proxy authentication information

Each user who is going to access secured assets via proxy authentication information can have user-based proxy authentication information in the ACDB. Additionally, each user can have multiple entries for any number of assets defined in the ACDB. If a user has user-based proxy authentication information defined for an asset, that authentication information takes precedence over asset-based proxy authentication information, and the role-based proxy authentication information that he or she assumed for the active session when logging in to the back-end resource.

Users can create, update, and delete their own user-based proxy authentication information. Also, the security officer (PSO role) can create, update, and delete user-based proxy authentication information for any user. To do this using Enterprise Security Manager, see “Managing user-based proxy authentication information”.