|
| Copyright © Cloud Software Group, Inc. All Rights Reserved |
• Trusted.txt can be used on UNIX or Microsoft Windows. It is used when the command line specifies Trusted.
• TrustedWithDomain.txt is for use on Microsoft Windows only, and is used when the command line specifies TrustedWithDomain.If you have multiple Hawk agents running on a machine and these Hawk agents, in turn, belong to different Hawk domains, you can specify separate access control files for each domain.CONFIG_FOLDER/hawk/domain/<domain-name>/security where <domain-name> is the name of the Hawk domain.
2. Provide a remote Trusted.txt file to configure a security URL on Agent,
− -Dhawk.security_file_url=file:///D:/temp/Trusted.txt-Dhawk.security_file_url=http://<hostname:port>/Trusted.txt
3. Modify the appropriate sample access control file, Trusted.txt or TrustedWithDomain.txt, according to the requirements of your system.
4. Save the modified file in the directory you created, without changing the filename. The program automatically searches for the access control file in this directory.
5. Ensure that the security_policy parameter in Hawk agent configuration is set to one of the following, before starting TIBCO Hawk Agent and Display/WebConsole:The Trusted model is now in effect. The security policy will stay in force as long as the process is running.To store access control information, the Trusted model uses an ASCII file. Two sample access control files are included with TIBCO Hawk: Trusted.txt and TrustedWithDomain.txt.Sample access control files are shipped with the TIBCO Hawk software, in the directory HAWK_HOME/examples/security/.This file can only be used with Microsoft Windows XP, and only when specified in the command used to start TIBCO Hawk agent and Display, as in -security_policy COM.TIBCO.hawk.security.trusted.TrustedWithDomain.The user is the login ID and the domain where the user is logged on. For example, for user1 in domainX, the user is <domainX>\user1.A group operation effectively performs a method invocation simultaneously on all of the specified target microagents. It is useful for affecting a group of microagents in a single operation. There are two kinds of group operation: network query and network action.Wildcard characters + and * affect permissions on group operations and point-to-point invocations as shown in Access Control File.
• Explicit access for a particular resource implicitly denies access to all other resources in the same class. The defined classes are nodes, microagents, and methods.
• Explicit restriction for a particular resource implicitly allows access to all other resources in the same class, provided they have been explicitly granted. The defined classes are nodes, microagent, and methods.This table presents how individual restrictions and permissions are defined for nodes, microagents, and methods. Individual node, microagent, and method names can be specified. In addition, wildcard characters can be used as shown in the table.Each individual setting is represented by one line in the access control file. Complex permissions and restrictions can be defined using sets of related lines. For example, you can give a user access to all methods on a node in one line, then in the following line, restrict that user’s access to one of those methods. See Disable Custom Microagent, for further details.Permissions are granted to a user using the user name. Restrictions are defined by prefixing a bang (!) character to the user name, as shown in the table.The Custom microagent can be disabled by leveraging the Security TrustModel supported by TIBCO Hawk. Users are explicitly granted or denied access through the access control file.
1. If multiple Hawk agents are running on a machine and these Hawk agents in turn belong to different Hawk domains, specify separate access control files for each domain.For each Hawk domain create a directory HAWK_HOME/domain/<domain-name>/security where <domain-name> is the name of the Hawk domain.
2. According to the requirements of your system, copy HAWK_HOME/examples/security/Trusted.txt or HAWK_HOME/examples/security/TrustedWithDomain.txt to CONFIG_FOLDER/security/.The second line grants access only to the user none, on all nodes for the Custom microagent, where none is a non-existent user. This effectively prevents anyone from executing the Custom microagent.
4. Ensure that the security_policy parameter in Hawk agent configuration is set to one of the following, before starting TIBCO Hawk Agent and Display/WebConsole::COM.TIBCO.hawk.security.trusted.Trusted or COM.TIBCO.hawk.security.trusted.TrustedWithDomainThe following example files demonstrates how a Trusted.txt and TrustedWithDomain.txt access control file might be constructed. The permissions and restrictions defined in this file are explained in the previous section.
• Grant user1 point-to-point access to all methods on all microagents, except:
−
− The specified methods on the Repository microagent on all nodes.
−
• Grant user2 point-to-point and group operation invocation access to all methods on all microagents, except:
−
−
−
• Grant user3 point-to-point and group operation invocation access to all methods on all microagents on all nodes, except:
−
•
•
# - all ACTION methods on the Custom microagent on all nodes.# - the specified methods on the Repository microagent on all nodes.# - the specified methods on the RuleBaseEngine microagent on "nodeA".# - all ACTION methods on the Custom microagent on all nodes.# - all ACTION methods on the Repository microagent on all nodes.# - all ACTION methods on the RuleBase microagent on all nodes.# - network access to all ACTION methods on the RuleBase microagent.Running with a localhost rvdAs a further precaution, AMI applications will be required to specify localhost as part of the TIBCO Rendezvous daemon parameter in order to prevent remote connections to its rvd daemon. Instructions to do this for UNIX and Microsoft Windows platforms are given below.
1. Add a command to start the localhost rvd prior to starting any TIBCO Hawk processes, as follows:
2.
1.
2. Make all TIBCO Hawk services dependent upon this new rvd service.
|
| Copyright © Cloud Software Group, Inc. All Rights Reserved |