Using Trusted Security Model in Hawk Console
You can use Hawk Trusted Security Model in Hawk Console to ensure that only authorized users can perform restricted actions.You can specify security policy to be applied to a domain when registering a domain using Hawk Console web interface or using configuration file.
To store access control information, the Trusted model uses an ASCII file. For more information about access control files and other configuration, see To Use the Trusted Model.
For more information about how to apply security policy when registering a domain using Hawk Console web interface, see TIBCO Hawk Console User’s Guide.
To apply security policy when registering a domain using configuration file, set the securityPolicy
parameter in the file DomainTransportConfig.yml
to one of the following:
COM.TIBCO.hawk.security.trusted.Trusted
or
COM.TIBCO.hawk.security.trusted.TrustedWithDomain