Chapter 2. Using IdM user vaults: storing and retrieving secrets