We often quote usage of application IDs as best practice, but is it true for all scenarios? What are the pros and cons for usage of application IDs?
Hi @danilang ,
Use case would be as follows:
A database application team is extremely particular regarding any external application or person accessing their content. When an alteryx team requests access to for all its team members , they say that they are not comfortable to give access to so many people, instead they suggest creation of an application ID for alteryx tool with read-only access.
I want to understand from a SAM(security access) perspective that is this the only viable approach as per best practices? And if Alteryx as a product conforms to usage of application IDs against individual IDs? or is it scenario specific?
-akshatoz