Protecting Sensitive Data in Configuration Properties
You configure Transformer configuration properties in the advanced configuration properties of the deployment.
Some properties in the configuration properties, such as the https.keystore.password property, require that you
            enter a password. Instead of entering the password in clear text, you can store the
            password outside of the configuration properties and then use a function to retrieve the sensitive data.
Tip: To access sensitive data in a credential store, develop a script that
                retrieves the sensitive data, then use the 
        exec function to call
                the script.You can use functions to retrieve sensitive data in the following ways:
        - From a file with the filefunction
- Store the sensitive data in a separate file in the Transformer configuration directory, $TRANSFORMER_CONF. Then,
                        use the filefunction in the configuration properties to retrieve the data, as follows:${file("<filename>")}
- Using a script or executable with the execfunction
- For increased security, store the sensitive data in a separate location, such as a credential store or file. Then, develop a script or executable that retrieves the sensitive data.
Important: When you use either the 
        file or the
                    exec function, Transformer
                uses the exact output of the file or script. Carefully design and test the file or
                script to ensure that the functions return only the expected data. For example, if a function returns a password with a newline character, Transformer includes the newline character, which results in an invalid password.