sam.1m (2010 09)
s
sam(1M) sam(1M)
(TO BE OBSOLETED)
NAME
sam - HP System Administration Manager (HP SAM)
SYNOPSIS
/usr/sbin/sam
[ -f login | -r ]
DESCRIPTION
The
sam command launches the HP System Management Homepage (HP SMH) program for performing
system administration on the HP-UX operating system. HP SMH is an enhanced web-based program of
HP System Administration Manager (HP SAM) in the HP-UX 11i V3 release. For more information, see
smh(1M).
If the
DISPLAY environment variable is set, the Web-based HP SMH is displayed. If the
DISPLAY
environment variable is not set, the terminal user interface of HP SMH is displayed.
Deprecation Notice
The
sam command is deprecated in HP-UX 11i V3 release. HP recommends you use the
smh command.
Options
sam recognizes the following options.
-f login Execute SAM with the privileges associated with the specified login. When used in con-
junction with
-r, the Restricted SMH Builder is invoked and initialized with the
privileges associated with the specified login.
You must be a superuser to use this option. See Restricted SMH below for more informa-
tion.
-r Invokes Restricted SMH. This enables the system administrator to assign limited
privileged user access to SMH functionality. You must be a privileged user to use this
option. See the Restricted SMH section below for more information.
Restricted SMH
Generally, SMH requires privileged user rights to execute successfully. However, through the use of Res-
tricted SMH, SMH can be configured to allow subsets of its functionality to certain non-privileged users
or groups of users.
System administrators access Restricted SMH by invoking SMH with the
-r option (see Options above).
In Restricted SMH, system administrators may assign subsets of SAM functionality on a per-user or per-
group basis.
When Restricted SMH is used, non-privileged users are promoted to privileged users when necessary to
enable them to execute successfully.
By default, Restricted SMH executes all applications as privileged user. However, certain applications,
like software distributor (
swacl), have their own security mechanism and do not follow the Restricted
SMH security model. In such cases, the application launched through Restricted SMH will be executed
with the login ID of the user who invokes it.
A non-privileged user who has been given Restricted SMH privileges simply executes
/usr/sbin/smh
and sees only those areas the user is privileged to access.
All the SMH functional areas require the user to be promoted to be a privileged user in order to execute
successfully. SMH does this automatically as needed.
SMH provides a default set of SMH functional areas that the system administrator can assign to other
users.
Restricted SMH applies only to terminal user interfaces. Restricted SMH does not apply to Web-based
GUI (HP SMH) since HP SMH has its own roles. For more information, refer to the HP SMH documenta-
tion available at
http://www.hp.com/go/hpux-core-docs and the HP SMH product online help
system.
SAM Functional Areas
SAM has been replaced by SMH. For more information on the various functional areas, see smh(1M).
HP-UX 11i Version 3: September 2010 − 1 − Hewlett-Packard Company 1