XA Resource and Security
User Impersonation for CICS and JCL
Describes using user impersonation to provide credentials other than those specified in the xa_open string.
Parent topic:
Using XA-compliant Resources (XARs)