Each asset that allows user access via proxy authentication information is defined by a single entry in the ACDB. All users who have read permission on an asset can retrieve the proxy authentication information associated with the asset. Only the PSO can create, update, and delete asset-based proxy authentication information.