Trusted Applications

An overview of Trusted Applications.

Note: Trusted Applications are applicable only for Application Protector. Skip this section if you are not using the Application Protector.

A Trusted Application is an entity that defines which system users and applications are authorized to run the Application Protector. Using a Trusted Application adds another layer of security for operating the system.

A single Trusted Application instance covers a single application and its corresponding system user. Multiple users and applications are not supported under a single Trusted Application and must be created separately.

Creating Trusted Applications

To create a Trusted Application:

  1. On the ESA Web UI, navigate to Policy Management > Policies & Trusted Applications > Trusted Applications.

  2. Click Add New Trusted Application.

    The New Trusted Application screen appears.

  1. Type a unique name to the trusted application in the Name textbox.

  2. Type the required description to the trusted application in the Description textbox.

  3. Type the name of the application in the Application Name textbox.

    The maximum length of an Application Name is up to 63 characters.

    Important: In case of AP Java and AP Go applications, ensure that you specify the complete module or package name.

    In the application name, you can type the asterisk (*) wild card character to represent multiple characters or the question mark (?) wild card character to represent a single character. You can also use multiple wild card characters in the application name.

    For example, if you specify Test_App* as the application name, then you can use applications with names, such as, Test_App1 or Test_App123 to perform security operations.

    Caution: Use wild card characters with discretion, as they can potentially lead to security threats.

  4. Type the name of the application user in the Application User textbox.

    In the application user name, you can type the asterisk (*) wild card character to represent multiple characters or the question mark (?) character to represent a single character. You can also use multiple wild card characters in the application user name.

    For example, if you specify User* as the application user name, then you can have users with names, such as, User1 or User123 to perform security operations.

    Caution: Use wild card characters with discretion, as they can potentially lead to security threats.

  5. Click Save.

A message Trusted Application has been created successfully appears.

Managing Trusted Applications

Trusted Applications can be fully modified after they have been created.

Deleting Trusted Applications

To remove a Trusted Application:

  1. On the ESA Web UI, navigate to Policy Management > Policies & Trusted Applications > Trusted Applications.

    The Trusted Applications tab appears.

  2. Select the name of the Trusted Application from the list, and click the Delete action.

    A confirmation dialog box appears.

  3. Click OK.

    A message Trusted Application has been deleted successfully appears.


Linking Data Store to a Trusted Application

You link a data store with the trusted application to specify the location where to deploy the trusted application. Using the following steps, you can link a trusted application to a data store.


Last modified : December 23, 2025