Controlling access to XRC resources

This topic describes how to protect XRC commands and control volume repair activities.