Security Framework
The TIBCO Hawk product currently supports the ability to “plug-in” an authorization module. The TIBCO Hawk Console uses the plug-in module to create identification objects. The TIBCO Hawk agent guarantees that every request is authorized before execution by invoking the appropriate plug-in method.
The techniques used to address authentication, authorization, integrity, and privacy with regard to messaging and communication channels are varied. It is the goal of the framework to be completely independent of these techniques so that a plug-in is possible regardless of the tools and techniques chosen for implementation.
Implementation of the Certified Class and Trusted Class security models is discussed in TIBCO Hawk Installation, Configuration, and Administration Guide.
• | TIBCO Hawk Security Concepts |
• | Implementing a Security Policy |
• | Sample Code |