[rwth-security] Exploring Credential Management Strategies and Obstacles during