HP-UX Reference (11i v3 07/02) - 1M System Administration Commands N-Z (vol 4)
s
sam(1M) sam(1M)
(TO BE OBSOLETED)
NAME
sam - HP System Administration Manager (HP SAM)
SYNOPSIS
/usr/sbin/sam
[ -f login | -r ]
DESCRIPTION
The
sam command launches the HP System Management Homepage (HP SMH) program for performing
system administration on the HP-UX operating system. HP SMH is an enhanced web-based program of HP
System Administration Manager (HP SAM) in the HP-UX 11i V3 release. For more information, see
smh(1M).
If the DISPLAY environment variable is set, the Web-based HP SMH is displayed. If the
DISPLAY
environment variable is not set, the terminal user interface of HP SMH is displayed.
Deprecation Notice
The sam command is deprecated in HP-UX 11i V3 release. HP recommends you use the
smh command.
Options
sam recognizes the following options.
-f login Execute SAM with the privileges associated with the specified login. When used in con-
junction with
-r, the Restricted SMH Builder is invoked and initialized with the privileges
associated with the specified login.
You must be a superuser to use this option. See Restricted SMH below for more informa-
tion.
-r Invokes Restricted SMH. This enables the system administrator to assign limited
privileged user access to SMH functionality. You must be a privileged user to use this
option. See the Restricted SMH section below for more information.
Restricted SMH
Generally, SMH requires privileged user rights to execute successfully. However, through the use of Res-
tricted SMH, SMH can be configured to allow subsets of its functionality to certain non-privileged users or
groups of users.
System administrators access Restricted SMH by invoking SMH with the
-r option (see Options above).
In Restricted SMH, system administrators may assign subsets of SAM functionality on a per-user or per-
group basis.
When Restricted SMH is used, non-privileged users are promoted to privileged users when necessary to
enable them to execute successfully.
By default, Restricted SMH executes all applications as privileged user. However, certain applications, like
software distributor (
swacl), have their own security mechanism and do not follow the Restricted SMH
security model. In such cases, the application launched through Restricted SMH will be executed with the
login ID of the user who invokes it.
A non-privileged user who has been given Restricted SMH privileges simply executes /usr/sbin/smh
and sees only those areas the user is privileged to access.
All the SMH functional areas require the user to be promoted to be a privileged user in order to execute
successfully. SMH does this automatically as needed.
SMH provides a default set of SMH functional areas that the system administrator can assign to other
users.
Restricted SMH applies only to terminal user interfaces. Restricted SMH does not apply to Web-based GUI
(HP SMH) since HP SMH has its own roles. For more information, refer to the HP SMH documentation
available at http://docs.hp.com and the HP SMH product online help system.
SAM Functional Areas
SAM has been replaced by SMH. For more information on the various functional areas, see smh(1M).
SAM Logging
All actions taken by SAM are logged into the SAM log file at /var/sam/log/samlog. The log entries
in this file can be viewed using the SAM utility command samlog_viewer (see samlog_viewer(1)).
HP-UX 11i Version 3: February 2007 − 1 − Hewlett-Packard Company 295