HP-UX Reference (11i v3 07/02) - 1M System Administration Commands N-Z (vol 4)
s
smh(1M) smh(1M)
NAME
smh - HP System Management Homepage (HP SMH)
SYNOPSIS
/usr/sbin/smh
[ -F | -w | -r ]
DESCRIPTION
The
smh command launches HP System Management Homepage (HP SMH) for performing system
administration on an HP-UX system. HP SMH is an enhanced version of HP System Administration
Manager (HP SAM). HP SMH provides web-based graphical user interface (GUI), terminal user interface
(TUI), and command line interface (CLI).
You can access these interfaces using the
smh command. However you can also use the sam command
which behaves the same as
smh command except that the deprecation message is displayed in the begin-
ning. For more information on HP SAM, refer to the sam(1M) manpage.
When you run either the
smh command or the
sam command and if the DISPLAY environment variable is
set, HP SMH opens in the default web browser. If the
DISPLAY environment variable is not set, HP SMH
opens in the terminal user interface (TUI).
Options
smh recognizes the following options.
-F Launches HP SMH on a web browser without security warnings.
-w Launches HP SMH on a web browser with security warnings.
-r The -r option applies only to the TUI of HP SMH. This option invokes Restricted SMH
which, enables the system administrator to assign limited privileged user access to SMH
functionality. You must be a privileged user to use this option. See the Restricted SMH
section below for more information.
Restricted SMH
SMH can be configured to provide a subset of its functionality to certain users or groups of users. This is
done through Restricted SMH. System administrators access Restricted SMH by invoking SMH with the
-r option (see Options above). In Restricted SMH, system administrators may assign subsets of SMH
functionality on a per-user or per-group basis.
Generally, SMH requires privileged user rights to execute successfully. However, through the use of Res-
tricted SMH, SMH can be configured to allow subsets of its capabilities to be used by non-privileged users.
When Restricted SMH is used, non-privileged users are promoted to privileged users when necessary to
enable them to execute successfully.
By default, Restricted SMH executes all applications as privileged user. However, certain applications like
software distributor have their own security mechanism (swacl) and do not follow the Restricted SMH
security model. In such cases, the application launched through Restricted SMH will be executed with the
login id of the user who invokes it.
A non-privileged user that has been given Restricted SMH privileges simply executes
/usr/sbin/smh
and sees only those areas the user is privileged to access.
All the SMH functional areas require the user to be promoted to be a privileged user in order to execute
successfully. SMH does this automatically as needed.
SMH provides a default set of SMH functional areas that the system administrator can assign to other
users.
Restricted SMH does not apply to web-based GUI of HP SMH from HP-UX 11i V3 release as HP SMH has
its own roles. For more information, refer HP SMH documentation available at http://docs.hp.com
and the HP SMH product online help system.
Logging
For more information on logging, see samlog_viewer(1).
AUTHOR
smh was developed by HP.
HP-UX 11i Version 3: February 2007 − 1 − Hewlett-Packard Company 393