The code itself looks good. But i'd like to take the opportunity to clarify how this is expected to work.
Do we have the workflow written down somewhere?
I'm a bit concerned that the description says that the credentials are being sent to the deployed how. So how do we prevent a normal user to be able to access those credentials?
The code itself looks good. But i'd like to take the opportunity to clarify how this is expected to work.
Do we have the workflow written down somewhere?
I'm a bit concerned that the description says that the credentials are being sent to the deployed how. So how do we prevent a normal user to be able to access those credentials?