TIBCO Spotfire® Server and Environment Security

Settings and Configuration Tasks for TERR Service

You can use these settings to limit the capabilities of running TERR data functions.

Setting / Configuration task Default value Description
terr.restricted.execution.mode (Enforce restricted execution ) TRUE Enforce restricted execution mode for all scripts. Restricted execution mode in the TERR service allows executing arbitrary scripts without worrying that the script could do malicious things, such as deleting files or uploading confidential data to a server over the internet. For more information, see the topic "Safeguarding Your Environment" in the TIBCO® Enterprise Runtime for R - Server Edition documentation.
use.engine.containers
  • Windows: FALSE
  • Linux: TRUE
Available on Linux only.

If your deployment is on a Linux server, then the default configuration for the TERR service is to use containers (the property use.engine.containers: TRUE). Running the TERR service with containers enabled prevents the engines from having access to the host system. See the topic "Containerized TERR Service" in the TIBCO® Enterprise Runtime for R - Server Edition documentation for more information.

disable.spotfire.trust.checks FALSE Disable the trust check only if the TERR service is installed on Linux, with Docker containers, where extra means have been taken to secure the container environment or if all Spotfire users in the environment can be trusted.
Set file size upload limit 100MB See the topic "File Size Upload Limit" in the TIBCO® Enterprise Runtime for R - Server Edition documentation for more information.
Set TERR engine ports range 61000 - 62000 See "TERR Engine Ports" in the TIBCO® Enterprise Runtime for R - Server Edition documentation for more information.
Enable JMX Monitoring OFF See "Monitoring the TERR service using JMX" in the TIBCO® Enterprise Runtime for R - Server Edition documentation for more information.