Trusted Security Model TIBCO Hawk uses Trusted Security model to guarantee that only authorized users can perform restricted actions. The Trusted model uses an ASCII file as a simple yet effective entitlement server. This has the benefit of being easily distributed to all nodes, making it a very scalable mechanism. A scan of the ASCII file for information about the user determines if the request is granted. Users are explicitly granted or denied access through the access control file. A user who is not in this file is not allowed to perform any operations on the TIBCO Hawk system. Access control information is in a plain ASCII file located in the TIBCO_HOME\hawk\<version>\examples\security folder. Copy this file to CONFIG_FOLDER\security manually. See Access Control File, for more details.