Trusted Security Model
TIBCO Hawk uses Trusted Security model to guarantee that only authorized users can perform restricted actions.
The Trusted model uses an ASCII file as a simple yet effective entitlement server. This has the benefit of being easily distributed to all nodes, making it a very scalable mechanism. A scan of the ASCII file for information about the user determines if the request is granted.
Users are explicitly granted or denied access through the access control file. A user who is not in this file is not allowed to perform any operations on the TIBCO Hawk system. Access control information is in a plain ASCII file located in the TIBCO_HOME\hawk\<version>\examples\security
folder.
Copy this file to CONFIG_FOLDER\security manually. See Access Control File, for more details.