Trusted applications are third-party programs that can log into POAs and Internet Agents in order to access GroupWise mailboxes. For background information, see Section 4.12, Trusted Applications.
Trusted applications log into GroupWise agents by using trusted application keys that are created when the trusted application is created. It is essential that these keys are protected and not allowed to become public. Steps you can take to protect trusted application keys include:
Associating the trusted application key with a single IP address whenever possible
Reviewing third-party log files for sensitive data such as the key before sharing them with others
Not sharing trusted application keys with others for any reason
Removing old keys that are no longer needed