Use an independent keystore to encrypt passwords in external adapter configuration files, and to tell Event Stream Processor to decrypt encrypted values at runtime.
Java external adapter configuration files contain an encryption algorithm that Event Stream Processor uses to authorize decryption.