XA Resource and Security
Using the Vault Facility with the XA Open String
Describes using the Vault Facility to hide sensitive information.
User Impersonation for CICS and JCL
Describes using user impersonation to provide credentials other than those specified in the xa_open string.
Parent topic:
Using XA-compliant Resources (XARs)