How are A2A and A2DB credentials protected from unauthorized use?
When an application or script is registered to run with PowerKeeper, the administrator can specify any number of program factors be used to validate the program. These program factors include the program name, the name and version of any libraries it calls, the checksum of the program, the account under which the program is allowed to run, and others. These program factors validate that the program requesting the credentials is the same application that was approved so the credentials can’t be harvested by a rogue user or process.