Software Distributor Administration Guide HP-UX 11i v1, 11i v2, and 11i v3 (5900-2561, March 2013)
9.3.4 Restricting Access to Depots .....................................................................................151
9.3.5 Adding Target Hosts ...............................................................................................152
9.3.6 Temporarily Restricting Access ..................................................................................152
9.3.7 Closing the SD-UX Network .....................................................................................152
9.3.8 Editing an ACL .......................................................................................................153
9.4 How ACLs are Matched to the User ..................................................................................154
9.5 ACL Entries ....................................................................................................................154
9.5.1 ACL Keys ...............................................................................................................155
9.5.2 ACL Permissions .....................................................................................................156
9.5.3 Object Protection ....................................................................................................156
9.5.3.1 Host System ACLs ............................................................................................157
9.5.3.2 Root ACLs ......................................................................................................158
9.5.3.3 Depot ACLs ....................................................................................................158
9.5.3.4 Product ACLs ..................................................................................................159
9.5.4 ACL Templates .......................................................................................................159
9.5.4.1 Default ACL Template Entries .............................................................................160
9.5.4.1.1 Container ACL Template.............................................................................160
9.5.4.1.2 Product ACL Template................................................................................160
9.6 Security on SD-UX Systems ..............................................................................................161
9.7 SD-UX Internal Authentication ..........................................................................................162
9.7.1 SD-UX Credentials ...................................................................................................162
9.7.1.1 Controllers Run with the User’s Credentials and Privileges .......................................163
9.7.1.2 Agents Run with the System’s Identity ..................................................................163
9.7.2 Security Between Hosts: The Shared Secrets File ..........................................................163
9.8 RPC Authorization...........................................................................................................164
9.8.1 How Agents Handle Controller Requests ....................................................................164
9.8.2 Local Superuser Authorization ..................................................................................165
9.8.2.1 Delegation .....................................................................................................165
9.8.3 Depot Registration and Daemon/Agent Security .........................................................165
9.9 Security Use Models .......................................................................................................165
9.9.1 Security in Remote Distributions .................................................................................166
9.9.2 Security in Local Distributions ...................................................................................166
9.9.2.1 Restricting Installation to Specific Target Systems by Specific Users ..........................166
9.9.3 Security for Software Developers ...............................................................................166
9.10 Permission Requirements, by Command ...........................................................................167
9.10.1 Packaging (swpackage) ..........................................................................................167
9.10.2 Listing (swlist) ........................................................................................................167
9.10.3 Job Browsing (sd, swjob) ........................................................................................167
9.10.4 Copying (swcopy) .................................................................................................167
9.10.5 Installing (swinstall) ................................................................................................168
9.10.6 Removal (swremove) ..............................................................................................168
9.10.7 Configuration (swconfig) ........................................................................................168
9.10.8 Verify (swverify) ....................................................................................................168
9.10.9 Registering Depots (swreg) .....................................................................................168
9.10.10 Changing ACLs (swacl)..........................................................................................168
9.10.11 Request Scripts (swask)...........................................................................................169
9.10.12 Modify (swmodify)................................................................................................169
10 Creating Software Packages ..................................................................171
10.1 Overview of the Packaging Process .................................................................................171
10.1.1 Prerequisites ..........................................................................................................171
10.2 Identifying the Products to Package .................................................................................171
10.2.1 Determining Product Contents .................................................................................171
10.2.2 Determining Product Structure .................................................................................172
8 Contents