Adding or Configuring a Security Constraint Policy

In TIBCO Business Studio - BPM Edition, you can add or configure a security constraint policy using a wizard.

    Procedure
  1. Open the Configure Web Security Constraint wizard using either of the following approaches:
    Approach 1: In the Properties view, click the Implementation vertical tab and select the Security tab.

    Under the Web Security Constraint section, either click the policy set to configure it, or click the -not set- hyperlink to add a new Web Security Constraint policy set.

    Approach 2: In the Properties view, click the Policies vertical tab, and click the Add Policy Set icon.

    Select Embedded as the Policy Set type, Web Security Constraint Policy under the System Policies list, and click Next.

     
  2. Select the security constraint and rename the security constraint if required.
  3. Click the add web resource collection icon to add web resources under the security constraint or select an existing web resource collection to update.
  4. Type the Name and Description of the web resource collection.
  5. In the URL pattern field, click the plus icon to add a URL pattern. Double-click a listed URL pattern to modify it.
  6. Check the HTTP methods to be allowed for the web resource collection. The default is "all" HTTP methods. If no methods are selected, then "all" HTTP methods option is checked.
  7. Click the add auth-constraint icon to add an authorization constraint.
  8. Type the Description.
  9. Click the plus icon to add a role name to the permissible roles list for the security constraint. Click a listed role name to modify the role name.
  10. Click the add security constraint icon to add another security constraint to the policy and repeat steps 2 through step 9.
  11. Click Finish when you are done updating the security constraint policy.