Copyright © Cloud Software Group, Inc. All Rights Reserved
Copyright © Cloud Software Group, Inc. All Rights Reserved


Chapter 5 Security Framework : Implementing a Security Policy

Implementing a Security Policy
The TIBCO Hawk software provides a security framework that you can adapt to your own security needs. To use a security policy, you create a Java class that implements the security interface.
Because every system has unique security needs, the security policy provides an open framework for security implementation, rather than a standardized security policy. You can develop methods to grant or deny permissions based on your needs.
Creating a Java Security Class
The TIBCO Hawk security system must be implemented as a Java class, though you may choose to make this class a simple wrapper that uses the Java Native Interface (JNI) to call other security methods in a C or C++ library. The Java class must implement the HsConsoleInterface and HsAgentInterface, which are included with the TIBCO Hawk distribution.
The name of the Java class file for security must be passed to the TIBCO Hawk WebConsole and the TIBCO Hawk agent as a command-line argument.
Once both of these processes have been started using this argument, the security policy is in force.
Framework Protocol
The security framework supports an agent and a client-side protocol, as shown below. The client side supports the creation of an identifying object (createid() in the diagram) and the transformation of the message (pack() in the diagram).
The agent side supports inverse operations for restoring the message’s original format (unpack()) and validating the identifying object (validateid()).
Figure 15 Security Framework Model
Security Objects
While a sample security framework plug-in is provided later in this section, users may prefer to write their own security framework implementation. Plug-ins for the security framework are created using the classes listed here. The prefix Hs designates the object as part of the TIBCO Hawk Security Framework.
The following link provides access the detailed descriptions of security classes you can use to create plug-ins:

Copyright © Cloud Software Group, Inc. All Rights Reserved
Copyright © Cloud Software Group, Inc. All Rights Reserved