To Use the Trusted Model
Two sample access control files are included with TIBCO Hawk.
• | Trusted.txt can be used on UNIX or Microsoft Windows. It is used when the command line specifies Trusted . |
• | TrustedWithDomain.txt is for use on Microsoft Windows only, and is used when the command line specifies TrustedWithDomain . |
The access control files, Trusted.txt
and TrustedWithDomain.txt
, are described in the next section.
To use the Trusted model:
If you have multiple Hawk agents running on a machine and these Hawk agents, in turn, belong to different Hawk domains, you can specify separate access control files for each domain.
1. | For each Hawk domain, create a directory: |
CONFIG_FOLDER
/hawk/domain/<domain-name>/security
where <domain-name>
is the name of the Hawk domain.
2. | Provide a remote Trusted.txt file to configure a security URL on Agent, |
— | add/append the following system parameter to java.extended.properties in tibhawkagent.tra |
-Dhawk.security_file_ur
l=file:///D:/temp/Trusted.txt
Or
-Dhawk.security_file_url
=http://<hostname:port
>/Trusted.txt
The Agent always gives precedence to the local file, if found in hawk/domain folder.
3. | Modify the appropriate sample access control file, Trusted.txt or TrustedWithDomain.txt , according to the requirements of your system. |
4. | Save the modified file in the directory you created, without changing the filename. The program automatically searches for the access control file in this directory. |
5. | Ensure that the security_policy parameter in Hawk agent configuration is set to one of the following, before starting TIBCO Hawk Agent and Hawk Console: |
COM.TIBCO.hawk.security.trusted.Trusted
or
COM.TIBCO.hawk.security.trusted.TrustedWithDomain
The Trusted model is now in effect. The security policy stays in force as long as the process is running.