To Use the Trusted Model
Two sample access control files are included with TIBCO Hawk.
| • | Trusted.txt can be used on UNIX or Microsoft Windows. It is used when the command line specifies Trusted. |
| • | TrustedWithDomain.txt is for use on Microsoft Windows only, and is used when the command line specifies TrustedWithDomain. |
The access control files, Trusted.txt and TrustedWithDomain.txt, are described in the next section.
To use the Trusted model:
If you have multiple Hawk agents running on a machine and these Hawk agents, in turn, belong to different Hawk domains, you can specify separate access control files for each domain.
| 1. | For each Hawk domain, create a directory: |
CONFIG_FOLDER/hawk/domain/<domain-name>/security where <domain-name> is the name of the Hawk domain.
| 2. | Provide a remote Trusted.txt file to configure a security URL on Agent, |
| — | add/append the following system parameter to java.extended.properties in tibhawkagent.tra |
-Dhawk.security_file_url=file:///D:/temp/Trusted.txt
Or
-Dhawk.security_file_url=http://<hostname:port>/Trusted.txt
The Agent always gives precedence to the local file, if found in hawk/domain folder.
| 3. | Modify the appropriate sample access control file, Trusted.txt or TrustedWithDomain.txt, according to the requirements of your system. |
| 4. | Save the modified file in the directory you created, without changing the filename. The program automatically searches for the access control file in this directory. |
| 5. | Ensure that the security_policy parameter in Hawk agent configuration is set to one of the following, before starting TIBCO Hawk Agent and Hawk Console: |
COM.TIBCO.hawk.security.trusted.Trusted
or
COM.TIBCO.hawk.security.trusted.TrustedWithDomain
The Trusted model is now in effect. The security policy stays in force as long as the process is running.