Software Distributor Administration Guide HP-UX 11i v1, 11i v2, and 11i v3 (5900-2561, March 2013)
7.2.1 Target Selection Window..........................................................................................121
7.2.2 Performing Actions...................................................................................................121
7.2.3 Selecting Multiple Targets.........................................................................................122
7.2.4 Selecting Individual Targets.......................................................................................123
7.2.5 Saving a Target Group.............................................................................................123
7.2.6 Adding a Target Group............................................................................................123
7.3 Setting Up Remote Operations..........................................................................................124
7.4 Remote Operations Tutorial...............................................................................................124
7.4.1 Tutorial Set-Up.........................................................................................................124
7.4.2 How to Perform a Single-Target Installation.................................................................125
7.5 Remote Interactive swlist...................................................................................................132
7.6 Remote Operations from the Command Line.......................................................................132
7.6.1 Target Selections......................................................................................................132
7.6.1.1 Syntax.............................................................................................................133
7.6.1.2 Target Files......................................................................................................133
7.6.2 Examples...............................................................................................................133
7.6.2.1 swacl..............................................................................................................133
7.6.2.2 swask.............................................................................................................134
7.6.2.3 swconfig.........................................................................................................134
7.6.2.4 swcopy...........................................................................................................134
7.6.2.5 swinstall..........................................................................................................134
7.6.2.6 swjob.............................................................................................................134
7.6.2.7 swlist..............................................................................................................134
7.6.2.8 swreg.............................................................................................................135
7.6.2.9 swremove........................................................................................................135
7.6.2.10 swverify.........................................................................................................135
8 Reliability and Performance ....................................................................137
8.1 Overview ......................................................................................................................137
8.2 Groups and Source Options.............................................................................................138
8.3 Large Numbers of Targets................................................................................................138
8.4 Timeout Options ............................................................................................................138
8.5 Retry RPC and Retry Interval.............................................................................................139
8.6 Retry Command.............................................................................................................139
8.7 Database Checkpointing ................................................................................................140
8.8 Compression .................................................................................................................140
8.8.1 INDEX and INFO Compression.................................................................................141
8.9 Staging ........................................................................................................................141
8.10 Recovery (Install Only) ...................................................................................................142
8.11 Installation With Separate Configuration...........................................................................143
8.12 Multiple Versions ..........................................................................................................143
9 SD-UX Security ......................................................................................145
9.1 Overview.......................................................................................................................145
9.1.1 Default Security........................................................................................................145
9.1.2 Depots and Depot Registration...................................................................................146
9.1.3 Modifying Target Systems..........................................................................................146
9.2 The swacl Command ......................................................................................................146
9.2.1 swacl Output...........................................................................................................147
9.3 Basic Security Tasks ........................................................................................................148
9.3.1 Listing User Access ..................................................................................................148
9.3.2 Allowing Users to Manage Products in a Depot ..........................................................150
9.3.3 Allowing Users to Manage Roots (Install/Remove) .......................................................150
Contents 7