Software Distributor Administration Guide for HP-UX 11i
SD-UX Security
ACL Entries
Chapter 9 275
When listing the ACL, the remote-host is printed in its Internet address
form (e.g., 15.12.89.10) if the local system cannot resolve the address
from its host lookup mechanism (DNS, NIS, or /etc/hosts). The
remote-host must be recognized (resolvable) when used in the -M and -D
options. Unrecognized remote-host values are accepted in files provided
with the -F option.
ACL Permissions
There are five different permissions grantable by the ACL: crwit.
In the ACL entry, these permissions are abbreviated c, t, i, w, and r. To
grant all permissions, you may use the shorthand letter a instead of the
crwit to denote all permissions.
The meaning of permissions is different for different types of objects, and
the permissions do not have to appear in any specific order. Roots do not
provide product level protection, so all permissions on products installed
on roots are controlled by the ACL protecting the root itself.
Product level protection is provided on depots in this way: the depot’s
ACL protects the depot itself while product ACLs protect the products
within the depot.
other [optionally, @
remote-host
]
any_other no key allowed
Table 9-4 SD-UX ACL Entry Key Values (Continued)
Entry Type Key Content
Table 9-5 ACL Permissions
control (c) Permission to edit or change the ACL.
test (t) Permission to test access to an object (i.e., read the
ACL).
insert (i) Permission to install a new product, depot or root.
write (w) Permission to change a host, depot, root or product.
read (r) Permission to list depot, roots and products and
attributes.