Software Distributor Administration Guide for HP-UX 11i

SD-UX Security
RPC Authorization
Chapter 9292
How Agents Handle Controller Requests
When a controller requests an agent to do an operation requiring the
participation of another agent, the two agents must each grant access to
the objects under their control before the operation can complete.
Figure 9-3 SD-UX Security Process
For example, to install a product P from depot D to root R:
1. User U sends an RPC request to swagentA on the target host H. User
U wants to install the product in root R (on the target host).
2. SwagentA checks the ACL protecting root R to confirm that user U is
authorized to insert products.
3. SwagentA (running as principal H) forms a request to swagentB
(running where depot D resides) to read the product.