Security

All system management commands require authentication before they can be executed. The authentication information is used to both identify the user executing the command and to also check role based security polices to ensure that the user has access to the requested command. Access control is enforced before a command is executed. If the user executing the command does not have access to the requested command, an error is returned without executing the command.

Access control rules are configured for each system management target independently.

See the TIBCO BusinessEvents® Extreme Administration for complete details.