23.11.2014 Views

TIBCO Spotfire Server 3.2.2 - TIBCO Product Documentation

TIBCO Spotfire Server 3.2.2 - TIBCO Product Documentation

TIBCO Spotfire Server 3.2.2 - TIBCO Product Documentation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Advanced Procedures<br />

<br />

For the <strong>TIBCO</strong> <strong>Spotfire</strong> <strong>Server</strong> cluster this is specified in the Allowed Users field(s).<br />

You can add as many users as you like. If you do not specify any users, then any<br />

authenticated user can issue impersonate calls. The most common use is to specify the<br />

same user as previously configured on the <strong>TIBCO</strong> <strong>Spotfire</strong> Web Player server. See the<br />

"<strong>TIBCO</strong> <strong>Spotfire</strong> Web Player - Installation and Configuration Manual" for more<br />

information.<br />

Specific requirements can also be made on the origin of an impersonate call. Typically,<br />

you would want to configure the <strong>TIBCO</strong> <strong>Spotfire</strong> <strong>Server</strong> cluster to only allow<br />

impersonation calls originating from the machines running a trusted <strong>TIBCO</strong> <strong>Spotfire</strong><br />

Web Player server.<br />

If one or more servers are listed in the Web Player <strong>Server</strong> field(s), then only calls<br />

originating from these machines are allowed. Allowed machines can be specified in<br />

two ways: originating IP number or originating name. The originating IP number<br />

should be the IP number of the machine, and a specified originating name is resolved<br />

to one (or more) IP numbers using DNS. Only calls originating from one of the<br />

mentioned machines are valid for impersonation. If no information is provided in the<br />

Web Player <strong>Server</strong> field, then calls originating from any machine are valid for<br />

impersonation.<br />

To enable impersonation:<br />

1 Start the <strong>TIBCO</strong> <strong>Spotfire</strong> Configuration Console.<br />

2 Go to the Impersonation tab.<br />

3 Click the Edit button in the toolbar.<br />

Comment: You will be prompted to stop the entire cluster.<br />

Response: The Enable Impersonation drop-down list will become active.<br />

4 Click on the Enable Impersonation drop-down, and select Yes.<br />

Response: The impersonation settings become editable.<br />

5 Select whether you want to require the impersonation call to be made on https by<br />

checking the Require SSL option. If you leave it blank both http and https are<br />

allowed. If you select https then you must make sure both the <strong>TIBCO</strong> <strong>Spotfire</strong> <strong>Server</strong><br />

and the <strong>TIBCO</strong> <strong>Spotfire</strong> Web Player server can communicate using https.<br />

6 Specify whether only certain users should be able to issue impersonation calls by<br />

entering those user names in the Allowed Users field. Only enter one user per row.<br />

Click the plus sign next to the field to add another row where you can specify an<br />

additional user.<br />

7 Specify whether the <strong>TIBCO</strong> <strong>Spotfire</strong> <strong>Server</strong> cluster should only accept impersonation<br />

calls from certain machines. If you want to limit impersonation calls in this way,<br />

specify the originating machine by entering the IP numer or host name in the Web<br />

Player <strong>Server</strong>s field. Only enter one machine per row. Click the plus sign next to the<br />

field to add another row where you can specify an additional machine.<br />

8 Click the Done button in the toolbar.<br />

126 (144) <strong>TIBCO</strong> <strong>Spotfire</strong>® <strong>Server</strong> <strong>3.2.2</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!