Best practices with credentials
This topic describes some useful best practices that you should consider when planning or configuring credentials.
All credentials have labels, or names. Use meaningful names, this could be a naming scheme or convention for your organization.
Limit credentials to sensible access methods. For example, it is possible to configure a credential valid for SNMP and SSH, or some other login method, though it might result in many avoidable unsuccessful login attempts.
Amazon Web Services (AWS) supports multiple roles for a single credential. Scans can use only one credential. If you configure role switching for a credential, that one credential can use roles to discover diverse targets, in a single scan. Without roles, you would need to set up multiple credentials, and use multiple scans to achieve the same coverage.