*nix Documentation Project
·  Home
 +   man pages
·  Linux HOWTOs
·  FreeBSD Tips
·  *niX Forums

  man pages->HP-UX 11i man pages -> swacl (1m)              
Title
Content
Arch
Section
 

Contents


 swacl(1M)                                                         swacl(1M)




 NAME    [Toc]    [Back]
      swacl - view or modify the Access Control Lists (ACLs) which protect
      software products

 SYNOPSIS    [Toc]    [Back]
      swacl -l level [-D acl_entry| -F acl_file| -M acl_entry]
           [-f software_file] [-t target_file] [-x option=value]
           [-X option_file] [software_selections] [@ target_selections]

    Remarks    [Toc]    [Back]
           +  This command supports operations on remote systems. See the
              Remote Operation section below for details.

           +  Type man 5 sd to display sd(5) for an overview of all SD
              commands.

 DESCRIPTION    [Toc]    [Back]
      The swacl command displays or modifies the Access Control Lists (ACLs)
      which:

           +  Protect the specified target_selections (hosts, software
              depots or root filesystems).

           +  Protect the specified software_selections on each of the
              specified target_selections (software depots only).

      All root filesystems, software depots, and products in software depots
      are protected by ACLs.  The SD commands permit or prevent specific
      operations based on whether the ACLs on these objects permit the
      operation.  The swacl command is used to view, edit, and manage these
      ACLs.  The ACL must exist and the user must have the appropriate
      permission (granted by the ACL itself) in order to modify it.

      ACLs offer a greater degree of selectivity than standard file
      permissions.  ACLs allow an object's owner (i.e. the user who created
      the object) or the local superuser to define specific read, write, or
      modify permissions to a specific list of users, groups, or
      combinations thereof.

      Some operations allowed by ACLs are run as local superuser. Because
      files are loaded and scripts are run as superuser, granting a user
      write permission on a root filesystem or insert permission on a host
      effectively gives that user superuser privileges.

    Protected Objects    [Toc]    [Back]
      The following objects are protected by ACLs:

           +  Each host system on which software is being managed by SD,

           +  Each root filesystem on a host (including alternate roots),




 Hewlett-Packard Company            - 1 -              HP-UX 11i Version 2.0






 swacl(1M)                                                         swacl(1M)




           +  Each software depot on a host,

           +  Each software product contained within a depot.

    Remote Operation    [Toc]    [Back]
      You can enable SD to manage software on remote systems. To let the
      root user from a central SD controller (also called the central
      management server or manager node) perform operations on a remote
      target (also called the host or agent):

      1) Install a special HP ServiceControl Manager fileset on the remote
         systems.  This enables remote operations by automatically setting
         up the root, host, and template Access Control Lists (ACLs) on the
         remote machines and permitting root access from the controller
         system.  To install the fileset, run the following command on each
         remote system:

         swinstall -s controller:/var/opt/mx/depot11 AgentConfig.SD-CONFIG

         NOTES:

         +  controller is the name of the central management server.

         +  If the target is running HP-UX 10.20, use the same command but
            substitute depot10 for depot11.

         +  Targets previously set up by SD/OV to be managed by this
            controller do not need this step.

         +  SD does not require any other ServiceControl Manager filesets.

      2) (Optional) swinstall, swcopy, and swremove have enhanced GUI
         interfaces for remote operations. Enable the enhanced GUIs by
         creating the .sdkey file on the controller. Use this command:

         touch /var/adm/sw/.sdkey

         NOTES:

         +  This step is not required when you use SD from within the HP
            ServiceControl Manager.

         +  See sd(5), swinstall(1M), swcopy(1M), swjob(1M), swlist(1M) or
            swremove(1M) for more information on interactive operations.

      NOTE: You can also set up remote access by using swacl directly on the
      remote machines to grant root or non-root access to users from the
      controller system.

    Options    [Toc]    [Back]
      If the -D, -F, or -M option is not specified, swacl prints the



 Hewlett-Packard Company            - 2 -              HP-UX 11i Version 2.0






 swacl(1M)                                                         swacl(1M)




      requested ACL(s) to the standard output.

      The swacl command supports the following options:

           -D acl_entry   Deletes an existing entry from the ACL associated
                          with the specified object(s).  For this option,
                          the permission field of the ACL entry is not
                          required.  You can specify multiple -D options.
                          See the ACL Entries heading for more information.

           -f software_file
                          Read the list of software_selections from
                          software_file instead of (or in addition to) the
                          command line.

           -F acl_file    Assigns the ACL contained in acl_file to the
                          object.  All existing entries are removed and
                          replaced by the entries in the file.  Only the
                          ACL's entries are replaced; none of the
                          information contained in the comment portion
                          (lines with the prefix ``#'') of an ACL listing is
                          modified with this option.  The acl_file is
                          usually the edited output of a swacl list
                          operation.

                          If the replacement ACL contains no syntax errors
                          and the user has control permission on the ACL (or
                          is the local superuser), the replacement succeeds.

           -l level       Defines which level of SD ACLs to view/modify.

                          The supported levels of depot, host, root, and
                          product objects that can be protected are:

                          depot       View/modify the ACL protecting the
                                      software depot(s) identified by the
                                      target_selections.

                          host        View/modify the ACL protecting the
                                      host system(s) identified by the
                                      target_selections.

                          root        View/modify the ACL protecting the
                                      root filesystem(s) identified by the
                                      target_selections.

                          product     View/modify the ACL protecting the
                                      software product identified by the
                                      software_selection.  Applies only to
                                      products in depots, not installed
                                      products in roots.



 Hewlett-Packard Company            - 3 -              HP-UX 11i Version 2.0






 swacl(1M)                                                         swacl(1M)




                          The supported levels of templates are:

                          global_soc_template
                                      View/modify the template ACL used to
                                      initialize the ACL(s) of future
                                      software depot(s) or root
                                      filesystem(s) added to the host(s)
                                      identified by the target_selections.
                                      Additionally, swacl can create
                                      templates that you can re-use to
                                      create new ACLs.

                          global_product_template
                                      View/modify the template ACL used to
                                      initialize the product_template ACL(s)
                                      of future software depot(s) added to
                                      the host(s) identified by the
                                      target_selections.

                          product_template
                                      View/modify the template ACL used to
                                      initialize the ACL(s) of future
                                      product(s) added to the software
                                      depot(s) identified by the
                                      target_selections.

           -M acl_entry   Adds a new ACL entry or changes the permissions of
                          an existing entry.  You can specify multiple -M
                          options.  See the ACL Entries heading for more
                          information.

           -t target_file Read the list of target_selections from file
                          instead of (or in addition to) the command line.

           -x option=value
                          Set the session option to value and override the
                          default value (or a value in an alternate
                          option_file specified with the -X option).  You
                          can specify multiple -x options.

           -X option_file Read the session options and behaviors from
                          option_file.

      You can specify only one of the -D, -F, or -M options at each
      invocation of swacl.

    Operands    [Toc]    [Back]
      Most SD commands support two types of operands: software selections
      followed by target selections.  These operands are separated by the
      "@" (at) character. This syntax implies that the command operates on
      "software selections at targets".



 Hewlett-Packard Company            - 4 -              HP-UX 11i Version 2.0






 swacl(1M)                                                         swacl(1M)




    Software Selections    [Toc]    [Back]
      The swacl command supports the following syntax for each
      software_selection:

           product[,version]

           +  The = (equals) relational operator lets you specify selections
              with the following shell wildcard and pattern-matching
              notations:

                   [ ], *, ?

           +  The \* software specification selects all products in the
              depot when used with -l product.

      The version component usually has the following form:

           [,r <op> revision][,a <op> arch][,v <op> vendor]
           [,c <op> category]

           +  The <op> (relational operator) component can take the form:

                   =, ==, >=, <=, <, >, or !=

              which performs individual comparisons on dot-separated fields.

              For example, r>=B.10.00 chooses all revisions greater than or
              equal to B.10.00.  The system compares each dot-separated
              field to find matches. Shell patterns are not allowed with
              these operators.

           +  The = (equals) relational operator lets you specify selections
              with the shell wildcard and pattern-matching notations:

                   [ ], *, ?, !

              For example, the expression r=1[01].* returns any revision in
              version 10 or version 11.

           +  All version components are repeatable within a single
              specification (e.g.  r>=A.12, r<A.20).  If multiple components
              are used, the selection must match all components.

           +  Fully qualified software specs include the r=, a=, and v=
              version components even if they contain empty strings.

           +  No space or tab characters are allowed in a software
              selection.

           +  The software instance_id can take the place of the version
              component. It has the form:



 Hewlett-Packard Company            - 5 -              HP-UX 11i Version 2.0






 swacl(1M)                                                         swacl(1M)




                   [instance_id]

              within the context of an exported catalog, where instance_id
              is an integer that distinguishes versions of products and
              bundles with the same tag.

    Target Selections    [Toc]    [Back]
      The SD commands support this syntax for each target_selection.

           [host][:][/directory]

      The : (colon) is required if both a host and directory are specified.

 EXTERNAL INFLUENCES    [Toc]    [Back]
    Default Options
      In addition to the standard options, you can change SD behaviors and
      policy options by editing the default values found in:

           /var/adm/sw/defaults          the system-wide default values,

           $HOME/.swdefaults             the user-specific default values.

      You must use the following syntax to specify values in the defaults
      file:

           [command_name.]option=value

      The optional command_name prefix denotes one of the SD commands. Using
      the prefix limits the change in the default value to that command. If
      you leave the prefix off, the change applies to all commands.

      You can also override default values from the command line with the -x
      or -X options:

           command -x option=value

           command -X option_file

      The following section lists all of the keywords supported by the swacl
      command. If a default value exists, it is listed after the "=".

           admin_directory=/var/adm/sw (for normal mode)
           admin_directory=/var/home/LOGNAME/sw (for nonprivileged mode)
                     The location for SD logfiles and the default parent
                     directory for the installed software catalog. The
                     default value is /var/adm/sw for normal SD operations.
                     When SD operates in nonprivileged mode (that is, when
                     the run_as_superuser default option is set to true):

                     +  The default value is forced to /var/home/LOGNAME/sw




 Hewlett-Packard Company            - 6 -              HP-UX 11i Version 2.0






 swacl(1M)                                                         swacl(1M)




                     +  The path element LOGNAME is replaced with the name
                        of the invoking user, which SD reads from the system
                        password file.

                     +  If you set the value of this option to HOME/path, SD
                        replaces HOME with the invoking user's home
                        directory (from the system password file) and
                        resolves path relative to that directory. For
                        example, HOME/my_admin resolves to the my_admin
                        directory in your home directory.

                     +  If you set the value of the
                        installed_software_catalog default option to a
                        relative path, that path is resolved relative to the
                        value of this option.

                     SD's nonprivileged mode is intended only for managing
                     applications that are specially designed and packaged.
                     You cannot use this mode to manage the HP-UX operating
                     system or patches to it.  For a full explanation of
                     nonprivileged SD, see the Software Distributor
                     Administration Guide, available at the
                     http://docs.hp.com web site.

                     See also the installed_software_catalog and
                     run_as_superuser options.

           distribution_target_directory=/var/spool/sw
                     Defines the default location of the target depot.

           installed_software_catalog=products
                     Defines the directory path where the Installed Products
                     Database (IPD) is stored. This information describes
                     installed software. When set to an absolute path, this
                     option defines the location of the IPD. When this
                     option contains a relative path, the SD controller
                     appends the value to the value specified by the
                     admin_directory option to determine the path to the
                     IPD.  For alternate roots, this path is resolved
                     relative to the location of the alternate root.  This
                     option does not affect where software is installed,
                     only the IPD location.

                     This option permits the simultaneous installation and
                     removal of multiple software applications by multiple
                     users or multiple processes, with each application or
                     group of applications using a different IPD.

                     Caution: use a specific installed_software_catalog to
                     manage a specific application.  SD does not support
                     multiple descriptions of the same application in



 Hewlett-Packard Company            - 7 -              HP-UX 11i Version 2.0






 swacl(1M)                                                         swacl(1M)




                     multiple IPDs.

                     See also the admin_directory and run_as_superuser
                     options, which control SD's nonprivileged mode.  (This
                     mode is intended only for managing applications that
                     are specially designed and packaged.  You cannot use
                     this mode to manage the HP-UX operating system or
                     patches to it. For a full explanation of nonprivileged
                     SD, see the Software Distributor Administration Guide,
                     available at the http://docs.hp.com web site.)

           level=    Defines the level of SD ACLS to view/modify.  The
                     supported levels are: host, depot, root, product,
                     product_template, global_soc_template, or
                     global_product_template.

                     See the discussion of the -l option above for more
                     information.

           rpc_binding_info=ncacn_ip_tcp:[2121] ncadg_ip_udp:[2121]
                     Defines the protocol sequence(s) and endpoint(s) on
                     which the daemon listens and which the other commands
                     use to contact the daemon.  If the connection fails for
                     one protocol sequence, the next is attempted.  SD
                     supports both the tcp (ncacn_ip_tcp:[2121]) and udp
                     (ncadg_ip_udp:[2121]) protocol sequence on most
                     platforms.

           rpc_timeout=5
                     Relative length of the communications timeout.  This is
                     a value in the range from 0 to 9 and is interpreted by
                     the DCE RPC.  Higher values mean longer times; you may
                     need a higher value for a slow or busy network.  Lower
                     values will give faster recognition on attempts to
                     contact hosts that are not up, or are not running
                     swagentd.  Each value is approximately twice as long as
                     the preceding value.  A value of 5 is about 30 seconds
                     for the ncadg_ip_udp protocol sequence.  This option
                     may not have any noticeable impact when using the
                     ncacn_ip_tcp protocol sequence.

           run_as_superuser=true
                     This option controls SD's nonprivileged mode.  This
                     option is ignored (treated as true) when the invoking
                     user is super-user.

                     When set to the default value of true, SD operations
                     are performed normally, with permissions for operations
                     either granted to a local super-user or set by SD ACLs.
                     (See swacl (1m) for details on ACLs.)




 Hewlett-Packard Company            - 8 -              HP-UX 11i Version 2.0






 swacl(1M)                                                         swacl(1M)




                     When set to false and the invoking user is local and is
                     not super-user, nonprivileged mode is invoked:

                     +  Permissions for operations are based on the user's
                        file system permissions.

                     +  SD ACLs are ignored.

                     +  Files created by SD have the uid and gid of the
                        invoking user, and the mode of created files is set
                        according to the invoking user's umask.

                     SD's nonprivileged mode is intended only for managing
                     applications that are specially designed and packaged.
                     You cannot use this mode to manage the HP-UX operating
                     system or patches to it. For a full explanation of
                     nonprivileged SD, see the Software Distributor
                     Administration Guide, available at the
                     http://docs.hp.com web site.

                     See also the admin_directory and
                     installed_software_catalog options.

           select_local=true
                     If no target_selections are specified, select the
                     default target_directory of the local host as the
                     target_selection for the command.

           software= Defines the default software_selections.  There is no
                     supplied default.  If there is more than one software
                     selection, they must be separated by spaces.

           targets=  Defines the default target_selections.  There is no
                     supplied default (see select_local above).  If there is
                     more than one target selection, they must be separated
                     by spaces.

           verbose=1 Controls the verbosity of the output (stdout). A value
                     of
                     0   disables output to stdout.  (Error and warning
                         messages are always written to stderr).
                     1   enables verbose messaging to stdout.












 Hewlett-Packard Company            - 9 -              HP-UX 11i Version 2.0






 swacl(1M)                                                         swacl(1M)




    Environment Variables    [Toc]    [Back]
      SD programs are affected by external environment variables, set
      environment variables for use by the control scripts, and use other
      environment variables that affect command behavior.

      The external environment variable that affects the swacl command is:

           LANG      Determines the language in which messages are
                     displayed.  If LANG is not specified or is set to the
                     empty string, a default value of C is used.  See the
                     lang(5) man page by typing man 5 lang for more
                     information.

                     Note: The language in which the SD agent and daemon log
                     messages are displayed is set by the system
                     configuration variable script, /etc/rc.config.d/LANG.
                     For example, /etc/rc.config.d/LANG, must be set to
                     LANG=ja_JP.SJIS or LANG=ja_JP.eucJP to make the agent
                     and daemon log messages display in Japanese.

           LC_ALL    Determines the locale used to override any values for
                     locale categories specified by the settings of LANG or
                     any environment variables beginning with LC_.

           LC_CTYPE  Determines the interpretation of sequences of bytes of
                     text data as characters (e.g., single-versus multibyte
                     characters in values for vendor-defined attributes).

           LC_MESSAGES    [Toc]    [Back]
                     Determines the language in which messages are written.

           LC_TIME   Determines the format of dates (create_date and
                     mod_date) when displayed by swlist.  Used by all
                     utilities when displaying dates and times in stdout,
                     stderr, and logging.

           TZ        Determines the time zone for use when displaying dates
                     and times.

 OPERATION    [Toc]    [Back]
    ACL Entries
      Each entry in an ACL has the following form:

           entry_type[:key]:permissions

           For example: user:steve@newdist:crwit

      An ACL can contain multiple entries. See the Entry Types and
      Permissions headings below for more information.





 Hewlett-Packard Company           - 10 -              HP-UX 11i Version 2.0






 swacl(1M)                                                         swacl(1M)




    Entry Types    [Toc]    [Back]
      The following entry_types are supported:

           any_other      Permissions for all other users and hosts that do
                          not match a more specific entry in the ACL.
                          (Example: any_other:-r--t.)

           group          Permissions for a named group.  This type of ACL
                          entry must include a key that identifies that
                          group.  The format can be:
                          group:group_name:permissions or
                          group:group_name@hostname:permissions.  (Example:
                          group:adm:crwit.)

           host           Permissions for an SD agent from the specified
                          host system.  SD agents require product level read
                          access via either a host, other, or any_other
                          entry type in order to copy or install products
                          from depots.  This type of ACL entry must include
                          a key containing a hostname or number (in Internet
                          dot notation) of a system or the asterisk
                          character (*) to denote all systems.  (Example:
                          host:[email protected]:-r--t.)

           object_owner   Permissions for the object's owner, whose identity
                          is listed in the comment header.  (Example:
                          object_owner:crwit.)

           object_group   Permissions for members of the object's group,
                          whose identity is listed in the comment header.
                          (Example: object_group:crwit.)

           other          Permissions for others who are not otherwise named
                          by a more specific entry type.  The format for
                          other can be: other:permissions for others on the
                          local host (only one such entry allowed) or
                          other:@hostname:permissions for others at remote
                          hosts (Only one such entry per remote host
                          allowed).  (Example: other:@newdist:-r--t.)

           user           Permissions for a named user.  This type of ACL
                          entry must include a key that identifies that
                          user.  The format for user can be:
                          user:user_name:permissions or
                          user:user_name@hostname:permissions.  (Example:
                          user:rml:crwit.)

    Permissions    [Toc]    [Back]
      Permissions are represented as the single character abbreviations
      indicated below.  Some permissions either apply only to, or have
      different meaning for, certain types of objects, as detailed below.



 Hewlett-Packard Company           - 11 -              HP-UX 11i Version 2.0






 swacl(1M)                                                         swacl(1M)




      The following permissions may be granted:

           r ead       Grants permission to read the object.  On host,
                       depot, or root objects, read permission allows swlist
                       operations.  On products within depots, read
                       permission allows product files to be installed or
                       copied with swinstall or swcopy.

           w rite      Grants permission to modify the object itself.

                       +  On a root object (e.g. installed root filesystem),
                          this also grants permission to modify the products
                          installed (contained) within it.

                       +  On a depot object, it does not grant permission to
                          modify the products contained within it. Write
                          access on products is required to modify products
                          in a depot.

                       +  On a host container, write permission grants
                          permission to unregister depots.  It does not
                          grant permission to modify the depots or roots
                          contained within it.

           i nsert     On a host object, grants permission to create
                       (insert) a new software depot or root filesystem
                       object, and to register roots and depots.  On a depot
                       object, grants permission to create (insert) a new
                       product object into the depot.

           c ontrol    Grants permission to modify the ACL using swacl.

           t est       Grants permission to perform access checks and to
                       list the ACL.

           a ll        A wildcard which grants all of the above permissions.
                       It is expanded by swacl to crwit.

    List Output Format    [Toc]    [Back]
      The output of a list operation is in the following format:

                # swacl   Object_type     Access Control List
                #
                # For     depot|host:[host]:[/directory]
                #
                # Date:   date_stamp
                #
                # Object Ownership:  User=  user_name
                #                    Group= group_name
                #                    Realm= host_name
                #



 Hewlett-Packard Company           - 12 -              HP-UX 11i Version 2.0






 swacl(1M)                                                         swacl(1M)




                # default_realm = host_name
                entry_type:[key:]permissions
                entry_type:[key:]permissions
                entry_type:[key:]permissions

      You can save this output into a file, modified it, then use it as
      input to a swacl modify operation (see the -F option above).

    Object Ownership    [Toc]    [Back]
      An owner is also associated with every SD object, as defined by the
      user name, group and hostname.  The owner is the user who created the
      object.  When using swacl to view an ACL, the owner is printed as a
      comment in the header.

    Default Realm    [Toc]    [Back]
      An ACL defines a default realm for an object.  The realm is currently
      defined as the name of the host system on which the object resides.
      When using swacl to view an ACL, the default realm is printed as a
      comment in the header.

    Keys    [Toc]    [Back]
      Expressions (patterns) are not permitted in keys.

      A key is required for user, group and host entry types.  A key is
      optional for other entry types, and specifies the hostname to which
      the entry applies.  Only one other entry type may exist without a key,
      and this entry applies to users at the default realm (host) of the
      ACL.

      A hostname in a key is listed in its Internet address format (dot
      notation) if swacl cannot resolve the address using the local lookup
      mechanism (DNS, NIS, or /etc/hosts).  A hostname within an ACL entry
      must be resolvable when used with the -D and -M options.  Unresolvable
      hostname values are accepted in files provided with the -F option.

 RETURN VALUE    [Toc]    [Back]
      The swacl command returns:

           0   The software_selections and/or target_selections were
               successfully displayed or modified.
           1   The display/modify operation failed on all target_selections.
           2   The modify/modify operation failed on some target_selections.

 DIAGNOSTICS    [Toc]    [Back]
      The swacl command writes to stdout, stderr, and to the daemon logfile.

    Standard Output    [Toc]    [Back]
      The swacl command prints ACL information to stdout when the user
      requests an ACL listing.





 Hewlett-Packard Company           - 13 -              HP-UX 11i Version 2.0






 swacl(1M)                                                         swacl(1M)




    Standard Error    [Toc]    [Back]
      The swacl command writes messages for all WARNING and ERROR conditions
      to stderr.  A report that the software_selections do not exist is also
      given if the user has no access permissions to the object.

    Logging    [Toc]    [Back]
      The swacl command does not log summary events.  It logs events about
      each ACL which is modified to the swagentd logfile associated with
      each target_selection.

 EXAMPLES    [Toc]    [Back]
      To list the ACLs for the C and OPENVIEW products in depot
      /var/spool/swtest:

           swacl -l product C OPENVIEW  @ /var/spool/swtest

      The ACL listed to the standard output is similar to this example ACL:

                #
                # swacl   Product Access Control Lists
                #
                # For depot: newdist:/var/spool/swtest
                #
                # Date:  Wed May 26 11:14:31 2000
                #
                #
                # For product:  OPENVIEW,r=3.2
                #
                #
                # Object Ownership:  User=  robason
                #                    Group= swadm
                #                    Realm= newdist.fc.hp.com
                #
                # default_realm=newdist.fc.hp.com
                object_owner:crwit
                group:swadm:crwit
                any_other:-r--t
                #
                # For product:  C,r=9.4
                #
                #
                # Object Ownership:  User=  robason
                #                    Group= swadm
                #                    Realm= newdist.fc.hp.com
                #
                # default_realm=newdist.fc.hp.com
                object_owner:crwit
                user:[email protected]:-r--t
                user:barb:-r--t
                user:ramon:-r--t
                group:swadm:crwit



 Hewlett-Packard Company           - 14 -              HP-UX 11i Version 2.0






 swacl(1M)                                                         swacl(1M)




                other:-r--t
                host:lehi.fc.hp.com:-r--t

      To list the product template ACL on host newdist:

           swacl -l global_product_template  @ newdist

      To list the host ACL on the local system:

           swacl -l host

      To read, edit, then replace the ACL protecting the default depot
      /var/spool/sw:

           swacl -l depot > new_acl_file
           vi new_acl_file
           swacl -l depot -F new_acl_file

      To allow user allen to create, register, and manage all new depots and
      roots on the local system:

           swacl -l host -M user:allen:a
           swacl -l global_soc_template -M user:allen:a
           swacl -l global_product_template -M user:allen:a

      To allow user allen to fully manage my_depot, which already exists:

           swacl -l depot -M user:allen:a @ /my_depot
           swacl -l product_template -M user:allen:a @ /my_depot
           swacl -l product -M user:allen:a \* @ /my_depot

      To deny general access to a depot:

           swacl -l depot -M any_other:- @ /restricted_depot
           swacl -l product -M any_other:- \* @ /restricted_depot
           swacl -l product_template -M any_other:- @ /restricted_depot

      To allow user allen on host gemini access to restricted_depot and all
      products it currently contains:

           swacl -l depot -M host:*:rt @ /restricted_depot
           swacl -l depot -M user:allen@gemini:rt @ /restricted_depot
           swacl -l product -M user:allen@gemini:rt \* @ /restricted_depot

      To revoke previously granted ACL permission for user allen on host
      gemini to access the WDB product in the default depot on lehi:

           swacl -l product -D user:allen@gemini WDB @ lehi

      To deny access to the default depot on the local system from host
      numenal:



 Hewlett-Packard Company           - 15 -              HP-UX 11i Version 2.0






 swacl(1M)                                                         swacl(1M)




           swacl -l depot -M host:numenal:-

      To deny access to the OPENVIEW product in the default depot on host
      lehi to all users who do not have an explicit ACL entry:

           swacl -l product -M any_other:t OPENVIEW @ lehi

      To allow user george on host newdist access to the OPENVIEW product in
      the default depot on host lehi, you must specify both a user ACL for
      george and a host ACL for newdist:

           swacl -l product -M user:george@newdist:rt OPENVIEW @ lehi
           swacl -l product -M host:newdist:rt OPENVIEW @ lehi

      To revoke a user ACL for user allen on host gemini that allowed access
      to the OPENVIEW product in the default depot on host lehi:

           swacl -l product -D user:allen@gemini OPENVIEW @ lehi

      To revoke any previously issued access to the OPENVIEW product in the
      default depot on host lehi by users on host numenal:

           swacl -l product -D host:numenal OPENVIEW @ lehi

      To deny all access to the users steve and george for the depot
      /var/spool/sw at host newdist:

           swacl -l depot -M user:steve:- -M user:george:- \
                 @ newdist:/var/spool/sw

      To delete entries for local user rick from all products in the default
      local depot:

           swacl -l product -D user:rick \*

 WARNINGS    [Toc]    [Back]
      +    You can edit an ACL in such a way that it will leave a system
           inaccessible.  Do not remove all control permissions on an ACL.
           (Note, however, that the local super-user can always edit SD
           ACLs, regardless of permissions.)

      +    ACLs can grant the equivalent of local superuser permission. SD
           loads and runs files and scripts as superuser. Therefore, if an
           SD ACL gives a user write permission on a root filesystem or
           insert permission on a host, that user has the equivalent of
           superuser privileges.

      +    Note that swacl is not a general purpose ACL editor. It works
           only on ACLs protecting SD objects.





 Hewlett-Packard Company           - 16 -              HP-UX 11i Version 2.0






 swacl(1M)                                                         swacl(1M)




 FILES    [Toc]    [Back]
      $HOME/.swdefaults
           Contains the user-specific default values for some or all SD
           options.

      /usr/lib/sw/sys.defaults
           Contains the master list of current SD options (with their
           default values).

      /var/adm/sw/
           The directory which contains all of the configurable (and nonconfigurable)
 data for SD.  This directory is also the default
           location of logfiles.

      /var/adm/sw/defaults
           Contains the active system-wide default values for some or all SD
           options.

      /var/adm/sw/products/
           The Installed Products Database (IPD), a catalog of all products
           installed on a system.

      /var/adm/sw/security/
           The directory which contains ACLs for the system itself, template
           ACLS, and the secrets file used to authenticate remote requests.

      /var/spool/sw/
           The default location of a source and target software depot.

 AUTHOR    [Toc]    [Back]
      swacl was developed by the Hewlett-Packard Company.

 SEE ALSO    [Toc]    [Back]
      sd(5), sd(4), swpackage(4), swagentd(1M), swask(1M), swconfig(1M),
      swcopy(1M), swinstall(1M), swjob(1M), swlist(1M), swmodify(1M),
      swpackage(1M), swreg(1M), swremove(1M), swverify(1M), install-sd(1M).

      Software Distributor Administration Guide, available at
      http://docs.hp.com.

      SD customer web site at http://software.hp.com/SD_AT_HP/.


 Hewlett-Packard Company           - 17 -              HP-UX 11i Version 2.0
[ Back ]
      
      
 Similar pages
Name OS Title
setacl HP-UX modify access control lists (ACLs) for files (JFS File Systems only)
chacl HP-UX add, modify, delete, copy, or summarize access control lists (ACLs) of files
aclv HP-UX introduction to JFS access control lists (ACLs)
lsacl HP-UX list access control lists (ACLs) of files
getacl HP-UX list access control lists (ACLs) for files (JFS File Systems only)
swcopy HP-UX install and configure software products; software products for subsequent installation or distribution; respec
swinstall HP-UX install and configure software products; software products for subsequent installation or distribution; respec
swmodify HP-UX modify software products in a target root or depot
iftcntl Tru64 View and modify network interface traffic control settings
swverify HP-UX verify software products
Copyright © 2004-2005 DeniX Solutions SRL
newsletter delivery service