swacl.1m (2012 03)

s
swacl(1M) swacl(1M)
NAME
swacl - view or modify the Access Control Lists (ACLs) which protect software products
swfixrealm - updates default_realm in all SD ACL files
SYNOPSIS
swacl -l level [-D acl_entry |
-F acl_file | -M acl_entry ][-f software_file ][-t target_file ]
[
-x option=value ][-X option_file ][software_selections][
@ target_selections]
swfixrealm new_default_realm
Remarks
The swacl command supports operations on remote systems. See the Remote Operation section
below for details.
Type
man5sd
to display sd(5) for an overview of all SD commands.
The
swfixrealm command can only be run by superuser .
When operating on local ACLs with a
swacl command released in the year 2008 or later, mes-
sages previously written to
/var/adm/sw/swagentd.log
are instead written to stderr of the
swacl command. Messages describing changed ACLs are written to stderr and to
/var/adm/sw/swagentd.log
.
DESCRIPTION
The
swacl command displays or modifies the Access Control Lists (ACLs) which:
Protect the specified target_selections (hosts, software depots or root filesystems).
Protect the specified software_selections on each of the specified target_selections (software
depots only).
All root filesystems, software depots, and products in software depots are protected by ACLs. The SD
commands permit or prevent specific operations based on whether the ACLs on these objects permit the
operation. The
swacl command is used to view, edit, and manage these ACLs. The ACL must exist and
the user must have the appropriate permission (granted by the ACL itself) in order to modify it.
ACLs offer a greater degree of selectivity than standard file permissions. ACLs allow an object’s owner
(that is, the user who created the object) or the local superuser to define specific read, write, or modify
permissions to a specific list of users, groups, or combinations thereof.
Some operations allowed by ACLs are run as local superuser. Because files are loaded and scripts are
run as superuser, granting a user write permission on a root filesystem or insert permission on a host
effectively gives that user superuser privileges.
Protected Objects
The following objects are protected by ACLs:
Each host system on which software is being managed by SD,
Each root filesystem on a host (including alternate roots),
Each software depot on a host,
Each software product contained within a depot.
Remote Operation
You can enable SD to manage software on remote systems. To let the root user from a central SD con-
troller (also called the central management server or manager node) perform operations on a remote tar-
get (also called the host or agent ):
1) Set up the root, host, and template Access Control Lists (ACLs) on the remote machines to permit
root access from the controller system. To do this, run the following command on each remote sys-
tem:
/usr/lib/sw/mx/setaccess controller
NOTES:
controller is the name of the central management server.
HP-UX 11i Version 3: March 2012 1 Hewlett-Packard Company 1

Summary of content (12 pages)