...
The AMP is designed to work with the existing ACM security model. Users must login and authenticate through ACM. Once authenticated, AMP creates a session for the user and authorizes access to application pages. Users can be configured as administrators, which allows administrative page access during the session. The credentials used to authenticate and authorize with ACM are encrypted during session usage with ACM WCF services. ACM Users and Roles are enforced per task, such as execution of device commands or changing supported device configuration properties.
...