97.7 Protecting Trusted Applications

Trusted applications are third-party programs that can log in to POAs and GWIAs in order to access GroupWise mailboxes. For background information, see Section 4.22, Trusted Applications.

Trusted applications log in to GroupWise agents by using trusted application keys that are created when the trusted application is created. It is essential that these keys are protected and not allowed to become public. Steps you can take to protect trusted application keys include:

  • Associating the trusted application key with a single IP address whenever possible

  • Reviewing third-party log files for sensitive data such as the key before sharing them with others

  • Not sharing trusted application keys with others for any reason

  • Removing old keys that are no longer needed