HP WBEM Services for HP-UX and Linux System Administrator's Guide
7
HP WBEM Services for HP-UX and Linux
System Administrator’s Guide
Preface
This guide describes how a system administrator uses HP WBEM
Services for HP-UX and Linux systems. The contents are as follows:
•Chapter 1, Overview of WBEM Services, introduces WBEM Services:
what it is, where it comes from, and how you can learn more about it.
•Chapter 2, How Does WBEM Services Work?, gives you an idea of
how providers and clients work.
•Chapter 3, “HP WBEM Services Executables,” lists the commands,
executables and daemon processes that are available.
•Chapter 4, “Example of a Client Request,” shows a client request and
the response received, both encoded in XML.
•Chapter 5, Installing and Setting up WBEM Services,” describes
what system administrators should do before they actually use
WBEM Services for HP-UX. It tells how to prepare the system for
installation, and how to start WBEM Services. It lists the WBEM
Services configuration properties that can be set.
•Chapter 6, “Security Considerations,” describes WBEM Services
security, and describes WBEM Services authentication,
authorization, and encryption.
•Chapter 7, “Troubleshooting,” lists some suggestions to try if you
have trouble. It also lists the messages generated by WBEM
Services.
• Appendix A gives you some background into CIM terms used by
clients and providers to represent resources in the repository.
• Appendix B lists the operations implemented in WBEM Services.
• Appendix C explains the HP WBEM Services Configuration Options
Security Disclaimer.