To Use the Trusted Model

Two sample access control files are included with TIBCO Hawk.

Trusted.txt can be used on UNIX or Microsoft Windows. It is used when the command line specifies Trusted.
TrustedWithDomain.txt is for use on Microsoft Windows only, and is used when the command line specifies TrustedWithDomain.

The access control files, Trusted.txt and TrustedWithDomain.txt, are described in the next section.

To use the Trusted model:

If you have multiple Hawk agents running on a machine and these Hawk agents, in turn, belong to different Hawk domains, you can specify separate access control files for each domain.

1. For each Hawk domain, create a directory:

CONFIG_FOLDER/hawk/domain/<domain-name>/security where <domain-name> is the name of the Hawk domain.

2. Provide a remote Trusted.txt file to configure a security URL on Agent,
add/append the following system parameter to java.extended.properties in tibhawkagent.tra

-Dhawk.security_file_url=file:///D:/temp/Trusted.txt

Or

-Dhawk.security_file_url=http://<hostname:port>/Trusted.txt

The Agent always gives precedence to the local file, if found in hawk/domain folder.

3. Modify the appropriate sample access control file, Trusted.txt or TrustedWithDomain.txt, according to the requirements of your system.
4. Save the modified file in the directory you created, without changing the filename. The program automatically searches for the access control file in this directory.
5. Ensure that the security_policy parameter in Hawk agent configuration is set to one of the following, before starting TIBCO Hawk Agent and Hawk Console:
        COM.TIBCO.hawk.security.trusted.Trusted

or

        COM.TIBCO.hawk.security.trusted.TrustedWithDomain 

The Trusted model is now in effect. The security policy stays in force as long as the process is running.