Source Systems
Most source systems need credentials for access. Exceptions to this would be ingesting public web content for example.
Credentials govern the access type Aiimi Insight Engine has to the source system.
For example, control if Aiimi Insight Engine has read-only or write access also.
Credentials will also govern what Aiimi Insight Engine is able to see. On a filesystem this will be which folders and files Aiimi Insight Engine has access to.
Aiimi Insight Engine requires read-only access to areas of the source system that you wish to ingest from.
Defence in depth
Example: The credentials for Aiimi Insight Engine only have read-only permission for Specific Items in a source. Any upstream compromise would not be able to remove content from the source system.
While Aiimi Insight Engine is secure, the principal of least privileges should always be applied. This defence approach makes it impossible for malicious attack vectors to remove or corrupt anything.
Encryption and audit
Aiimi Insight Engine stores encrypts credentials that are controlled in one place from the Control Hub. This simplifies administration and improves security.
Source system auditing can inspect what Aiimi Insight Engine is doing during its discovery and enrichment process.