81.6 Protecting Trusted Applications

Trusted applications are third-party programs that can log into POAs and Internet Agents in order to access GroupWise mailboxes. For background information, see Section 4.12, Trusted Applications.

Trusted applications log into GroupWise agents by using trusted application keys that are created when the trusted application is created. It is essential that these keys are protected and not allowed to become public. Steps you can take to protect trusted application keys include: