A node may contain a secure store agent. A process executing on the node
may request connection information from the secure store agent. An
encryption key phrase may be accessed, responsive to the request for
connection information, to decrypt the requested connection information.
The requested connection information may be obtained from a secure
storage file in a file system.