Hurry! 20% Off Ends SoonRegister Now

Configure TIBCO Hawk Security Trusted Model

HAWK Security Trusted Model

The TIBCO Hawk product supports a security mechanism which enables all method invocation requests made of a TIBCO Hawk agent to be verified for authenticity and integrity and then authorized (or not) based on the identity of the user making the request.

USTED VS TRUSTEDWITHDOMAIN

An agent using the Trusted or TrustedWithDomain security model allows users with either Trusted or TrustedWithDomain to access the agent. 

  • To allow access to a user who starts Hawk Display (or the Console API application)  in Trusted security mode, the entry for specified in the agent’s Trusted.txt or   TrustedWithDomain.txt should not include the domain of the user who actually starts Hawk Display (or the Console API application).

  • To allow access to a user who starts Hawk Display in TrustedWithDomain security mode, the entry for specified in the agent’s Trusted.txt or TrustedWithDomain.txt  should include the domain of the user who actually starts Hawk Display.

Learn how to use Tibco Spotfire, from beginner basics to advanced techniques, with online video tutorials taught by industry experts. Enroll for Free Tibco Spotfire Training Demo!

MindMajix YouTube Channel

Trusted Model

I have implemented Trusted Model here by providing the Trusted class in Security Policy Class tab of Tibco hawk configuration utility as shown below in the screenshot.

Users are explicitly granted or denied access through the access control file. A user who is not in this file is not allowed to perform any operations on the TIBCO Hawk system. Access control information is in a plain ASCII file located in the C:ProgramDataTIBCO_HOMEtibcocfgmgmthawksecurity folder.

If the user is not mentioned in the Trusted.txt file, it won’t allow to perform any operation as shown below:

Once the security policy is loaded successfully, we can check it from self:getSecurityInfo microagent as shown below:

Below is the Trusted.txt file I have used, which implements the below actions:

Grants full access to all methods on all microagents on all nodes, including group operations.

#       – all ACTION methods on the Custom microagent on all nodes.
#       – the specified methods on the Repository microagent on all nodes.
#       – the specified methods on the RuleBaseEngine microagent on “nodeA”.

Trusted Model

Trusted Model: Trusted class in Security Policy Class tab of Tibco hawk configuration utility.

Explore Tibco Spotfire Sample Resumes! Download & Edit, Get Noticed by Top Employers!Download Now!

 

 

Job Support Program

Online Work Support for your on-job roles.

jobservice

Our work-support plans provide precise options as per your project tasks. Whether you are a newbie or an experienced professional seeking assistance in completing project tasks, we are here with the following plans to meet your custom needs:

  • Pay Per Hour
  • Pay Per Week
  • Monthly
Learn MoreGet Job Support
Course Schedule
NameDates
Tibco BW TrainingDec 24 to Jan 08View Details
Tibco BW TrainingDec 28 to Jan 12View Details
Tibco BW TrainingDec 31 to Jan 15View Details
Tibco BW TrainingJan 04 to Jan 19View Details
Last updated: 04 Apr 2023
About Author

Yamuna Karumuri is a content writer at Mindmajix.com. Her passion lies in writing articles on IT platforms including Machine learning, PowerShell, DevOps, Data Science, Artificial Intelligence, Selenium, MSBI, and so on. You can connect with her via  LinkedIn.

read less