*nix Documentation Project
·  Home
 +   man pages
·  Linux HOWTOs
·  FreeBSD Tips
·  *niX Forums

  man pages->IRIX man pages -> sysadm/sysmgr (1)              
Title
Content
Arch
Section
 

Contents


sysmgr(1M)							    sysmgr(1M)


NAME    [Toc]    [Back]

     sysmgr - System Manager - Access to Desktop System	Administration

SYNOPSIS    [Toc]    [Back]

     /usr/sysadm/bin/sysmgr

DESCRIPTION    [Toc]    [Back]

     The sysmgr	command	is available from the Desktop Toolchest	and allows the
     user to access Desktop System Administration Managers and Active Guides.
     This document provides an overview	of the Desktop System Administration
     model and describes how to	use the	System Manager.

     IRIX 6.5.14 updates the System Manager appearance to adhere to modern SGI
     branding guidelines (layout, colors, and font), but System	Manager
     functionality is the same.

   Graphical Components    [Toc]    [Back]
     Desktop System Administration is made up of several graphical components:

     Manager    [Toc]    [Back]
	  Displays the icons for a set of similar objects on the system.  For
	  example, the Disk Manager displays one icon for each disk on the
	  system.  These icons may be dragged onto the Desktop for future
	  access.  Each	Manager	also provides access to	the common tasks that
	  can be performed on the icons	it displays.  For example, from	the
	  User Manager the user	can add	a new user account, change an account
	  password, or delete a	user account. These tasks appear in the	row of
	  buttons below	the item icons as well as in the Task menu of the
	  Manager.

     Active Guide    [Toc]    [Back]
	  A graphical interface	that steps the user through a specific System
	  Administration task.	For example, the Add a Modem Guide assists the
	  user in setting up the system	to recognize and use a modem that has
	  been attached	to this	system.	 No changes will be made to the	system
	  until	the user has filled in all of the required information and
	  pressed the "OK" button.  All	changes	to the system made through
	  Desktop System Administration	software will be logged	to
	  /var/sysadm/salog and	can be viewed by the System Administration Log
	  Viewer viewlog(1M).  See below for information about privileges and
	  system security.

     Status Panel    [Toc]    [Back]
	  Displays detailed information	about a	specific object	on this
	  system. For example, if the user selects a disk icon in the Disk
	  Manager and press the	"Get Info..." button, a	Status Panel will be
	  displayed that provides additional information about the disk. (The
	  user can also	select an icon on the Desktop and select "Get Info"
	  from the right-mouse-button menu to display the Status Panel). Each
	  Status Panel also provides access to common tasks that can be
	  performed on the selected item.




									Page 1






sysmgr(1M)							    sysmgr(1M)



   Privileges    [Toc]    [Back]
     The Privileges mechanism gives the	system administrator fine-grain
     control over which	users can access the System Administration tasks. root
     is	the Administrator account of the system. root has the ability to grant
     specific privileges to users so that they can perform a limited set of
     System Administration tasks, or root can designate	a user as privileged
     which allows that user to perform any System Administration task.	If
     there is no root password on the system, all users	are considered to be
     privileged	users.

     When a user attempts to launch a Manager or Active	Guide which requires
     privileges	and the	user has been granted that specific privilege or is a
     privileged	user, the item is launched.  If	the user is not	privileged, a
     dialog will appear.  The user must	enter the root password	to proceed,
     and has the option	of permanently gaining privileges for this item	(if
     the root password entered is correct).

     The graphical components of the Desktop System Administration software do
     not administer the	system directly.  Instead, they	use runpriv(1M)	to
     execute the desired commands.  This eliminates the	need for the graphical
     components	to be setuid root and thus eliminates a	class of possible
     attacks on	the system.

     The following setuid root programs	implement the privilege	mechanism.

     runpriv(1M)
	  Runs privileged operations on	behalf of a non-root privileged	user.

     checkpriv(1M)
	  Checks the privileged	database to see	if a non-root user has a
	  particular privilege.	 This needs to bet setuid root because it
	  needs	to be able to determine	whether	there is a root	password on
	  the system, and on systems this means	consulting /etc/shadow which
	  is typically not readable by non-root	users.

     The following setuid root programs	maintain the privilege database.  They
     are setuid	root so	they can do their work when a non-root user runs them
     and supplies the root password.  This allows a non-root user to use the
     graphical user interface PrivilegeManager(1M) to add and remove
     privileges	if that	user can supply	the root password.  The	ability	to
     change the	privilege database is not a privilege; root cannot assign
     privilege database	capabilities to	non-root users.

     addpriv(1M)
	  Adds privileges to a user.

     rmpriv(1M)
	  Removes privileges from a user.

     addprivuser(1M)
	  Makes	a user fully privileged.  A fully privileged user has all
	  system administration	privileges.



									Page 2






sysmgr(1M)							    sysmgr(1M)



     rmprivuser(1M)
	  Removes a user's fully privileged status.

     adddefpriv(1M)
	  Makes	a privilege a default privilege, which means that any user can
	  use it.  The system comes configured with several default privileges
	  which	enable non-root	users to find out information such as what
	  filesystems are on what disks.  See PrivilegeManager(1M) for the
	  list of default privileges on	the system.

     rmdefpriv(1M)
	  Remove a privilege's default privilege status.

     For example, if the administrator wishes to allow user "pat" to add and
     remove modems on the system, the administrator could use the command:
     '/usr/sysadm/bin/addpriv pat addmodem deletemodem'.  The administrator
     could also	use the	PrivilegeManager(1M) graphical interface.  See the
     above referenced man pages	for more details.

     There is also a chkconfig(1M) option that controls	whether	privileges are
     enabled.  If root runs chkconfig privileges off, non-root users will not
     be	able to	perform	system adminstration tasks unless they can provide the
     root password.  If	the administrator wishes to disable that functionality
     as	well, the setuid bits can be removed from the six programs described
     above and the privilege mechanism will be completely disabled.

     addpriv and rmpriv	support	the -chkconfig option for running chkconfig to
     turn privileges on	or off.

   Using System	Manager
     sysmgr displays a window divided into two vertical	columns.  The column
     on	the left is the	Table of Contents, listing the categories of System
     Administration Managers and Active	Guides available to the	user.  To
     display a category	in the right-hand column, click	on the hypertext name
     of	the category.

     The right-hand column of System Manager displays the current category.
     It	contains a brief description of	the category, and lists	each Manager
     and Active	Guide.	To launch a Manager or Active Guide, use the mouse to
     click on the hypertext title or icon of the item.	You may	also drag the
     icon for the item onto the	Desktop	for future use.

     sysmgr uses runcatalog(1M)	to launch Managers and runtask(1M) to launch
     Active Guides.  The items are launched in the background as separate
     processes,	so it is possible to interact with System Manager while	a
     Manager or	Active Guide is	up and running.	 Only one copy of a particular
     Manager or	Active Guide will run on the system at any given time.	If you
     attempt to	launch an item that is already running,	it will	be opened and
     raised to the top of the window hierarchy.






									Page 3






sysmgr(1M)							    sysmgr(1M)



     sysmgr comprises several categories:

     Overview    [Toc]    [Back]
	  The Overview describes the set of categories available in System
	  Manager.

     About This	System
	  The document for this	category is generated by the system at the
	  time the user	requests it.  The document is generated	by the cgi-bin
	  script /var/www/cgi-bin/ghinv/ghinvMain, which enhances and adds to
	  the output from the hinv(1) command.

     Search    [Toc]    [Back]
	  This section allows the user to do a keyword search on the Managers
	  and Active Guides that can be	launched via System Manager.  The
	  search looks at a pre-defined	set of keywords	that has been defined
	  for each Manager or Active Guide rather than looking at the text in
	  System Manager.  If a	match is found,	the title of the System
	  Manager page where the item resides is displayed along with the item
	  icon and title so that the item can be launched directly from	the
	  search results.

     Software    [Toc]    [Back]
	  This category	displays the set of Managers and Active	Guides that
	  allow	the user to install software and obtain	software licenses.
	  For more information,	see swmgr(1M) and LicenseManager(1M).

     Hardware and Devices    [Toc]    [Back]
	  This category	displays the set of Managers and Active	Guides that
	  allow	the user to add	or remove devices on this system.  Devices
	  include modems, MIDI devices,	printers, mouse	pointers, and tablets.
	  For more information,	see printers(1M), SerialDeviceManager(1M),
	  addSerialDevice(1M), deleteSerialDevice(1M), addModem(1M),
	  deleteModem(1M), DiskManager(1M), initDisk(1M), mountfs(1M),
	  umountfs(1M),	verifyDisk(1M),	xlvCreateLV(1M), xlvExtend(1M),
	  xlvDelete(1M), xlvShow(1M), mkfsXfs(1M), getDiskInfo(1M),
	  RemovableMediaManager(1M), formatRMedia(1M),
	  shareRemovableMedia(1M), unshareRemovableMedia(1M),
	  monitorRemovableMedia(1M), unmonitorRemovableMedia(1M)

     Security and Access Control    [Toc]    [Back]
	  This category	displays the set of Managers and Active	Guides that
	  allow	the user to add	and remove user	accounts and set the level of
	  security on this system.  For	more information, see
	  SecureSystem(1M), UserManager(1M), addUserAccount(1M),
	  checkPassword(1M), deleteUserAccount(1M), modifyUserAccount(1M),
	  configAutoLogin(1M), updateclogin(1M), permissions(1M),
	  modifyPermissionsAndOwnership(1M), sharemgr(1M), sharefs(1M),
	  unsharefs(1M), shareRemovableMedia(1M), unshareRemovableMedia(1M),
	  sharePrinters(1M), unsharePrinters(1M), PrivilegeManager(1M),
	  addpriv(1M), addprivuser(1M),	rmpriv(1M), rmprivuser(1M)




									Page 4






sysmgr(1M)							    sysmgr(1M)



     Network and Connectivity    [Toc]    [Back]
	  This category	displays the set of Managers and Active	Guides that
	  allow	the user to set	up connections to the local network and	to the
	  Internet.  For more information, see NetIfManager(1M),
	  configNetIf(1M), configec0state(1M), configdefaultRoute(1M),
	  configipforwardstate(1M), setNameServers(1M),	nisSetup(1M),
	  configResolver(1M), nfsSetup(1M), ypfiles(4),	filesystems(4),
	  sharefinder(1M), getExportList(1M), listPrinters(1M),
	  FilesystemManager(1M), listAllDiskFS(1M), mountfs(1M), umountfs(1M),
	  setFsNotifyLevel(1M),	xlvShow(1M), HostManager(1M), addHost(1M),
	  deleteHost(1M), ISDNManager(1M), execisdnconf(1M), execisdnstat(1M),
	  setisdnparm(1M), stopisdnd(1M), PPPManager(1M), addpppin(1M),
	  addpppout(1M), deleteppp(1M),	execppp(1M), getallpppinisdn(1M),
	  getallpppinmodem(1M),	getallpppoutisdn(1M), getallpppoutmodem(1M),
	  getpppin(1M),	getpppout(1M), removepppin(1M),	removepppout(1M),
	  stopppp(1M)

     Files and Data    [Toc]    [Back]
	  This category	displays the set of Managers and Active	Guides that
	  allow	the user to backup and restore the data	on this	system.	 For
	  more information, see	FilesystemManager(1M), listAllDiskFS(1M),
	  mountfs(1M), umountfs(1M), setFsNotifyLevel(1M), xlvCreateLV(1M),
	  xlvDelete(1M), xlvShow(1M), BackupAndRestoreManager(1M), backup(1M),
	  restore(1M), unschedBackup(1M)

     System Performance    [Toc]    [Back]
	  This category	displays the set of Managers and Active	Guides that
	  allow	the user to monitor and	tune System Performance.  For more
	  information, see SwapManager(1M), addLocalFileSwap(1M),
	  addVirtualSwap(1M), removeSwap(1M), ProcessManager(1M),
	  listProc(1M),	gmemusage(1), gr_osview(1), gr_top(1), sysmon(1M), and
	  viewlog(1M)

NOTES    [Toc]    [Back]

     The Restart System	and Shut Down System tasks are not available from
     System Manager but	instead	can be accessed	from the System	tile of	the
     Toolchest.	 For more information on these tasks, see dtshutdown(1M)

FILES    [Toc]    [Back]

     /usr/sysadm/
	  Root directory for sysadmdesktop executables and dso's

     /usr/sysadm/adminclass/
	  Contains the set of dso's for	each admin class. An admin class
	  monitors and administers a set of system administration objects.
	  For example, SaUserAccountClass.so is	responsible for	monitoring,
	  creating, modifying, and removing user account objects on the
	  system.

     /usr/sysadm/authdso/
	  Contains the set of dso's used for each type of authentication.  At
	  this time, only UNIX authentication (in other	words, request root



									Page 5






sysmgr(1M)							    sysmgr(1M)



	  password) is implemented.

     /usr/sysadm/bin/
	  Contains the set of commands that implement the sysadmdesktop
	  product.  These commands do not make changes to the target system,
	  but collectively allow the user to access the	tasks, managers,
	  status panels, and privileged	commands.  See the individual man
	  pages	for each command for more details.

     /usr/sysdm/privbin/
	  Contains the set of privileged commands that make changes to the
	  target system.  The user must	be privileged (in other	words, be root
	  or be	assigned the designated	privilege) to run these	commands.  See
	  runpriv(1M), privileges(4), and the man pages	for each privileged
	  command for more details.

     /usr/sysadm/catalogdso/*.so
	  Contains the dso's for each manager in the sysadmdesktop product.
	  For example, SaUserAccountCatalog.so implements the User Manager.

     /usr/sysadm/catalogdf/*.cdf
	  Contains a descriptor	file for each manager in the sysadmdesktop
	  product.  The	descriptor file	defines	information about a manager,
	  including dso	name, manager name, and	keywords without requiring the
	  manager code itself to be loaded into	memory.	For example,
	  SaUserAccountCatalog.cdf contains information	about the User
	  Manager.

     /usr/sysadm/paneldso/*.so
	  Contains the dso's for each status panel in the sysadmdesktop
	  product.  A status panel shows detailed information about a specific
	  system object. For example, SaUserAccountPanel.so implements the
	  user account status panel and	will display information about a
	  specific user	account.  Status panels	do not have a corresponding
	  descriptor file.  The	information describing a status	panel is
	  included in the relevant manager descriptor file.  For example,
	  /usr/sysadm/catalogdf/SaUserAccountCatalog.cdf contains the path of
	  the user account status panel	dso.

     /usr/sysadm/taskdso/*.so
	  Contains the dso's for each task in the sysadmdesktop	product.  For
	  example, SaAddUserTask.so implements the Add User Account task.

     /usr/sysadm/taskdf/*.tdf
	  Contains a descriptor	file for each task in the sysadmdesktop
	  product.  The	descriptor file	defines	information about a task,
	  including dso	name, task name, and keywords without requiring	the
	  task code itself to be loaded	into memory.  For example,
	  SaAddUserTask.tdf contains information about the Add User Account
	  task.





									Page 6






sysmgr(1M)							    sysmgr(1M)



     /usr/sysadm/taskdf/*.edf, /usr/sysadm/catalogdf/*.edf
	  Contains a descriptor	file for generic executable programs.  The
	  descriptor file defines information about an executable, including
	  icon type, executable	name, and keywords without requiring the
	  executable code itself to be loaded into memory.  For	example,
	  SaViewCPUUsageTask.edf allows	sysadmdesktop components to launch
	  gr_top, which	is not part of the sysadmdesktop product.

     /var/sysadm/
	  Root directory for sysadmdesktop configuration files.

     /var/sysadm/backups/
	  Contains a list of scheduled backups.	 These may be viewed with the
	  Backup and Restore Manager BackupAndRestoreManager(1M).

     /var/sysadm/config/clogin.conf
	  Read by clogin to determine which accounts to	show or	hide.  Values
	  are set by the Configure Clogin task.

     /var/sysadm/config/default.cshrc, /var/sysadm/config/default.login,
	  /var/sysadm/config/default.profile These are the default .cshrc,
	  .login, and .profile files that are copied into a new	home
	  directory, as	specified by /var/sysadm/config/newaccount.config and
	  /var/sysadm/config/newhomedir.config.

     /var/sysadm/config/deleteaccount.config
	  Determines what actions are taken when a user	is deleted from	the
	  system by the	Remove User Account task.  As shipped, the only	action
	  is to	run the	script /var/sysadm/config/deleteaccount.script (as
	  root). See file comments for details.

     /var/sysadm/config/deleteaccount.script
	  Default script invoked by /var/sysadm/config/deleteaccount.config
	  when a user account is deleted from the system by the	Remove User
	  Account task.	 As shipped, this script takes no action.  Note	that
	  this script will be run as root.  See	file comments for details.

     /var/sysadm/config/files.config
	  Lists	the system files that are considered "critical"	to system
	  functioning and which	are normally not available to sysadmdesktop
	  components.  For example, the	Permissions Manager will not change
	  the ownership	or permissions of files	listed here.

     /var/sysadm/config/groups.config
	  Lists	default	groups in /etc/group and controls how the
	  sysadmdesktop	product	will display them.  See	file comments for
	  details.

     /var/sysadm/config/newaccount.config
	  Determines what actions are taken when a new user account is created
	  by the Add User Account task.	 As shipped, the files
	  /var/sysadm/config/default.*	are copied into	the new	home directory



									Page 7






sysmgr(1M)							    sysmgr(1M)



	  (if they don't already exist)	and
	  /var/sysadm/config/newaccount.script is run (as root).  See file
	  comments for details.

     /var/sysadm/config/newaccount.script
	  Default script invoked by /var/sysadm/config/newaccount.config when
	  a new	user account is	added to the system by the Add User Account
	  task.	 This script is	shipped	with the default action	of creating
	  the new user's .lang file.  Note that	this script is run as root.
	  See file comments for	details.

     /var/sysadm/config/newhomedir.config
	  Determines what actions are taken when a new home directory is
	  created for an existing user by the Modify User Account task.	 As
	  shipped, the files /var/sysadm/config/default.* are copied into the
	  new home directory and /var/sysadm/config/newhomedir.script is run
	  (as root).  See file comments	for details.

     /var/sysadm/config/newhomedir.script
	  Performs actions on a	new home directory created for an existing
	  user by the Modify User Account task.	 As shipped, this script takes
	  no action.  Note that	this script is run as root.  See file comments
	  for details.

     /var/sysadm/config/useraccounts.config
	  Lists	special	user accounts in /etc/passwd (as shipped) and controls
	  how they are displayed.  The sysadmdesktop product will not allow
	  these	accounts to be modified	or removed using the Modify User
	  Account or Remove User Account tasks.	 See file comments for
	  details.

     /var/sysadm/defaultPrivileges/
	  Contains one file for	each privilege that is automatically granted
	  to all users.	 For example, as shipped, all users may	list the
	  available printers using the default privilege listPrinters. See
	  defaultPrivileges(4) for details.

     /var/sysadm/genNewUid
	  If this user-defined script exists, the Add User Account task	will
	  invoke it to generate	the next available UID for a new user.
	  Otherwise the	next UID will be chosen	at random.

     /var/sysadm/privenviron
	  List of allowed environment variables	when running a privileged
	  program using	runpriv(1m).  If a variable is listed with no value,
	  the value will be inherited from the current environment.  If	a
	  variable is not listed, it will not be available to the privileged
	  program.

     /var/sysadm/privhome/
	  Home directory for all privileged programs.




									Page 8






sysmgr(1M)							    sysmgr(1M)



     /var/sysadm/privilege
	  Database containing a	list of	all privileges and a list of which
	  users	have been granted those	specific privileges.  This database
	  should only be modified with PrivilegeManager(1M).

     /var/sysadm/salog
	  The System Administration Log.  Privileged commands write
	  information about who	invoked	them, what args	were used, what
	  actions were taken, and what errors were enountered.	Use
	  viewlog(1M) to view this log.

     /var/sysadm/salog.conf
	  System administration	log configuration details.  These values are
	  set using the	Set System Admin Log Options task.

     /var/sysadmdesktop/EZsetup/SysSetup/cgi-bin/SysSetup/
	  Contains scripts and commands	that implement System Setup (EZSetup).

     /var/www/cgi-bin/ghinv/
	  Contains programs that generate the "About this System" page for
	  sysmgr(1M).

     /var/www/cgi-bin/sysmgr/search
	  The program that implements the sysmgr(1M) search feature.

     /var/sysadmdesktop/EZsetup/SysSetup/
	  Root directory for System Setup documents.

     /var/www/htdocs/sysmgr/$LANG/
	  Root directory for localized HTML documents used by System Manager.

     $HOME/.noWarnInittab
	  This file is used to make sure that the user is only warned once
	  about	the existence of the file /etc/inittab.O after an IRIX
	  upgrade.

     $HOME/.desktop-{host}/SysadmStopNoRootWarnings
	  If this file exists, sysadmdesktop will not warn the user that there
	  is no	root password on the system.  The file is created when the
	  user is notified that	there is no root password and requests that
	  this warning not be shown again.

SEE ALSO    [Toc]    [Back]

      
      
     addpriv(1M), checkpriv(1M), runpriv(1M), runtask(1M), runcatalog(1M),
     chkconfig(1M), shadow(4).


									PPPPaaaaggggeeee 9999
[ Back ]
 Similar pages
Name OS Title
runcatalog IRIX run a system administration manager
sam HP-UX system administration manager
rmdefpriv IRIX remove a default system administration privilege from the system
adddefpriv IRIX add a default system administration privilege to the system
dtshutdown IRIX Notify desktop and shutdown the system
desktophelp IRIX IRIX Interactive Desktop(TM) Help System Subprogram
salog IRIX system administration log
dtSounds IRIX customization panel for controlling desktop & system sounds
viewlog IRIX view the system administration log
fsadm_hfs HP-UX HFS file system administration command
Copyright © 2004-2005 DeniX Solutions SRL
newsletter delivery service