Coordination

To secure a system that uses TIBCO® Graph Database software, administrators and application developers must coordinate to share security requirements and artifacts. This topic highlights the artifacts and information that pertain to security.

TIBCO® Graph Database does a self-signed certificate with customizable parameters provided by the System Administrator. The parameters described below are used for Database Security and Transport Security.
  1. Cipher Suite. Administrator will choose a Cipher Suite that is consistent with the Corporate System Security Requirement. See Appendix C for Cipher Suite names.
    1. Cipher Name is a TLS 1.2 Name obtained from IANA Registry.
    2. https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-4
  2. Cipher Strength. Some Ciphers like the Diffie-Hellman Cipher Suites require minimum bit length to use for their algorithm to produce strong keys. Coordinate with your administrator to generate strong keys consistent with the Corporate System Security Requirement.
  3. Cipher Curve. For an Elliptic Curve based Cipher, a curve name must be provided.
  4. Expiry Interval. This parameter is used when the Cipher Suite is used to generate a dynamic certificate for SSL Transport negotiations.
  5. System User and Password. For every database, a system user and password must be provided. This user has all the privileges to the database.