Some vulnerability scanning tools need to access Security Analytics using public key authentication. Assured Compliance Assessment Solution (ACAS) scanner is an example. ACAS needs to login without a password.
This is for remote access by ACAS and can be used for other third party password-less logins.