You can configure an App Connect Enterprise vault to symmetrically encrypt and store credentials, which can then be used to access secured resources (from a message flow, for example). You can configure a vault by using the mqsivault command, and then use the mqsicredentials command to encrypt credentials and store them in the vault. The ACE vault technology has been around for quite a while (it was initially introduced in 11.0.0.6) but new in the latest 12.0.9.0 release is the concept of an External Directory Vault.
An external directory vault is an App Connect Enterprise vault that can be used by any integration server, and can be accessed concurrently by any number of integration servers. The external directory vault is created in a directory that is external to the integration server, rather than located in the integration server's work directory. You choose the location in the file system in which to create the vault, and then configure each integration server to use it by specifying its unique location.
From App Connect Enterprise 12.0.9.0 you can also exploit this same advance in vault technology from an integration node so that credentials which are stored in the configured external directory vault are available for use by the integration node, the integration node-wide HTTP listener and any integration servers that are managed by the integration node.
The Toolkit has also been enhanced in 12.0.9.0 so that when you create a local integration server within the Toolkit, you have the option of specifying an external directory vault which can be used for storing credentials:
If you choose the option, then the external directory vault will be created within the Toolkit workspace, but by default it will be placed in a location named TEST_EXT_DIR_VAULT that is separate to the integration server's working directory (which is named TEST_SERVER by default). Once you've supplied a vault key, click the Create vault button:
The Create vault button will be replaced with a Test access button:
Clicking Finish will cause the server to be created. The working directory of TEST_SERVER and the external directory vault location of TEST_EXT_DIR_VAULT will be visible in the Independent Resources section of the Application Development view as shown below:
If you are in Toolkit and using any of the Discovery Connector nodes, then you will require a vault to store the credentials for accessing the 3rd party system against which you are running discovery. If you use an external directory vault, then there is no need to stop the local test server in order to launch the connector discovery process. This is a big usability gain over previous releases.