IBM BPM, V8.0.1, All platforms > Authoring services in Integration Designer > Services and service-related functions > Access external services with adapters > Configure and using adapters > IBM WebSphere Adapters > JDBC > Plan for adapter implementation
Support for protecting sensitive user data in log and trace files
You can configure the adapter to prevent sensitive or confidential data, in the log and trace files, from being viewed by users without authorization.
Log and trace files for the adapter can contain data from your database, which might contain sensitive or confidential information. Sometimes these files might be seen by individuals without authorization to view sensitive data.
For example, a support specialist must use the log and trace files to troubleshoot a problem.
To protect the data in such situations, the adapter lets you specify whether you want to prevent confidential user data from displaying in the adapter log and trace files. You can select this option in the external service wizard or change the HideConfidentialTrace property. When this property is enabled, the adapter replaces the sensitive data with XXX's.
See Managed connection factory properties for information about this optional property.
The following types of information are considered potentially sensitive data and are disguised:
- The contents of a business object
- The contents of the object key of the event record
- User name, Password, Environment, and Role
- The URL used to connect to the database
The following types of information are not considered user data and are not hidden:
- The contents of the event record that are not part of the event record object key, for example, the XID, event ID, business object name, and event status
- Business object schemas
- Transaction IDs
- Call sequences