smh.1m (2011 03)
s
smh(1M) smh(1M)
NAME
smh - HP System Management Homepage (HP SMH).
SYNOPSIS
/usr/sbin/smh
[ -F | -w | -r ]
DESCRIPTION
The
smh command launches HP System Management Homepage (HP SMH) for performing system
administration on an HP-UX system. HP SMH is an enhanced version of HP System Administration
Manager (HP SAM). HP SMH provides web-based graphical user interface (GUI), terminal user interface
(TUI), and command line interface (CLI). You can access these interfaces using the smh command. How-
ever, you can also use the sam(1M) command. The sam(1M) command behaves the same as the smh(1M)
command except that the deprecation message is displayed in the beginning. For more information on
HP SAM, refer to the sam (1M) manpage.
When you run either the
smh command or the
sam command and if the DISPLAY environment variable
is set, HP SMH opens in the default web browser. If the
DISPLAY environment variable is not set, HP
SMH opens in the terminal user interface (TUI).
Options
smh recognizes the following options.
-F Launches HP SMH on a web browser without security warnings.
-w Launches HP SMH on a web browser with security warnings.
-r The -r option applies only to the TUI of HP SMH. This option invokes Restricted SMH
which, enables the system administrator to assign limited privileged user access to SMH
functionality. You must be a privileged user to use this option. See the Restricted SMH
section below for more information.
Restricted SMH
SMH can be configured to provide a subset of its functionality to certain users or groups of users. This is
done through Restricted SMH. System administrators access Restricted SMH by invoking SMH with the
-r option (see "Options" above). In Restricted SMH, system administrators may assign subsets of SMH
functionality on a per-user or per-group basis.
Generally, SMH requires privileged user rights to execute successfully. However, through the use of Res-
tricted SMH, SMH can be configured to allow subsets of its capabilities to be used by non-privileged
users. When Restricted SMH is used, non-privileged users are promoted to privileged users when neces-
sary to enable them to execute successfully.
By default, Restricted SMH executes all applications as privileged user. However, certain applications
like software distributor have their own security mechanism (
swacl) and do not follow the Restricted
SMH security model. In such cases, the application launched through Restricted SMH will be executed
with the login id of the user who invokes it.
A non-privileged user that has been given Restricted SMH privileges simply executes
/usr/sbin/smh
and sees only those areas the user is privileged to access.
All the SMH functional areas require the user to be promoted to be a privileged user in order to execute
successfully. SMH does this automatically as needed.
SMH provides a default set of SMH functional areas that the system administrator can assign to other
users.
Restricted SMH does not apply to web-based GUI of HP SMH from HP-UX 11i v3 release as HP SMH has
its own roles. For more information, refer HP SMH documentation available at
http://www.hp.com/go/smh-docs and the HP SMH product online help system.
Logging
For information on logging, see samlog_viewer(1).
AUTHOR
smh was developed by HP.
HP-UX 11i Version 3: March 2011 − 1 − Hewlett-Packard Company 1