93.6 Protecting Trusted Applications

Trusted applications are third-party programs that can log in to POAs and GWIAs in order to access GroupWise mailboxes. For background information, see Section 4.12, Trusted Applications.

Trusted applications log in to GroupWise agents by using trusted application keys that are created when the trusted application is created. It is essential that these keys are protected and not allowed to become public. Steps you can take to protect trusted application keys include: