Which of the following authorization objects must be in the user’s authorization in the managed system to allow trusted connection?