Access Control File
To store access control information, the Trusted model uses an ASCII file. Two sample access control files are included with TIBCO Hawk: Trusted.txt
and TrustedWithDomain.txt
.
Sample access control files are shipped with the TIBCO Hawk software, in the directory HAWK_HOME
/examples/security/
.
Trusted.txt
This access control file can be used with UNIX or with Microsoft Windows XP.
The user for authorization is the login ID of the TIBCO Hawk Display owner.
TrustedWithDomain.txt
This file can only be used with Microsoft Windows XP, and only when specified in the command used to start TIBCO Hawk agent and Display, as in -security_policyCOM.TIBCO.hawk.security.trusted.TrustedWithDomain
.
The user is the login ID and the domain where the user is logged on. For example, for user1 in domainX, the user is <domainX>\user1
.
Group Operations
A group operation effectively performs a method invocation simultaneously on all of the specified target microagents. It is useful for affecting a group of microagents in a single operation. There are two kinds of group operation: network query and network action.
Wildcards characters + and * affect permissions on group operations and point-to-point invocations as shown in Access Control File.
• | Use + in node access to allow access to group operations. |
• | Use * in node access to allow access to point-to-point invocations. |
• | Use + in method access to allow access to all INFO and ACTION methods. |
• | Use * in method access to allow access. |
Access Control File Conventions
The access control file uses the following conventions to grant or deny access.
• | Explicit access for a particular resource implicitly denies access to all other resources in the same class. The defined classes are nodes, microagents, and methods. |
• | Explicit restriction for a particular resource implicitly allows access to all other resources in the same class, provided they have been explicitly granted. The defined classes are nodes, microagent, and methods. |
• | Permissions always default to the most restrictive case. |
File Settings for the Trusted Model
This table presents how individual restrictions and permissions are defined for nodes, microagents, and methods. Individual node, microagent, and method names can be specified. In addition, wildcard characters can be used as shown in the table.
Each individual setting is represented by one line in the access control file. Complex permissions and restrictions can be defined using sets of related lines. For example, you can give a user access to all methods on a node in one line, then in the following line, restrict that user’s access to one of those methods. See Disable Custom Microagent, for further details.
Permissions are granted to a user using the user name. Restrictions are defined by prefixing a bang (!
) character to the user name, as shown in the table.
Effect |
User |
Node |
Microagent |
Method |
Full Access Grants full access to all methods on all microagents on all nodes, including group operations. |
|
|
|
|
Full Restriction Denies access to all methods on all microagents on all nodes, including group operations |
|
|
|
|
Node Access: All Nodes Grants point-to-point and group operation invocation access to all methods on all microagents. |
|
|
|
|
Node Access: All Nodes Grants point-to-point invocation access to all methods on all microagents. Does not grant group operation invocation access. |
|
|
|
|
Node Access: Named node Grants invocation access to all methods on all microagents on the named node. You can add several lines for one user to provide access to a set of nodes. |
|
|
|
|
Node Restriction: All Nodes Denies point-to-point and group operation invocation access to all methods on all microagents. |
|
|
|
|
Node Restriction: All Nodes Denies group operation invocation access to all methods on all microagents. (Does not deny point-to-point operation invocations.) |
|
|
|
|
Node Restriction: Named node Denies invocation access to all methods on all microagents on the named node. You can add several lines for one user to provide access to a set of nodes. |
|
|
|
|
Microagent Access Grants access to all methods on the specified microagent. Wildcard characters can be used in place of a specific node name. See Node Access. |
|
|
|
|
Microagent Restriction Denies access to all methods on the specified microagent. Wildcard characters can be used in the Node columns. See Node Restriction above. |
|
|
|
|
Method Access Grants access to all Wildcard characters can be used in the Node and Microagent columns. |
|
|
|
|
Method Access Grants access to all Wildcard characters can be used in the Node and Microagent columns. |
|
|
|
|
Method Access Grants access to the specified method on the specified microagent. Wildcard characters can be used in the Node and Microagent columns. |
|
|
|
|
Method Restriction Denies access to all methods on the specified microagent. Wildcard characters can be used in the Node and Microagent columns. |
|
|
|
|
Method Restriction Denies access to all Wildcard characters can be used in the Node and Microagent columns. |
|
|
|
|
Method Restriction Denies access to the specified method on the specified microagent. Wildcard characters can be used in the Node and Microagent columns. |
|
|
|
|