Controlling access to XRC commands

The following are two ways to protect access to XRC commands: