Software Distributor Administration Guide (March 2009)

Table Of Contents
9.3.1 Listing User Access ............................................................................................188
9.3.2 Allowing Users to Manage Products in a Depot ................................................190
9.3.3 Allowing Users to Manage Roots (Install/Remove) ...........................................190
9.3.4 Restricting Access to Depots ..............................................................................191
9.3.5 Adding Target Hosts ..........................................................................................192
9.3.6 Temporarily Restricting Access ..........................................................................193
9.3.7 Closing the SD-UX Network ..............................................................................193
9.3.8 Editing an ACL ...................................................................................................193
9.4 How ACLs are Matched to the User ..........................................................................195
9.5 ACL Entries ................................................................................................................196
9.5.1 ACL Keys ............................................................................................................197
9.5.2 ACL Permissions ................................................................................................197
9.5.3 Object Protection ................................................................................................198
9.5.3.1 Host System ACLs ......................................................................................199
9.5.3.2 Root ACLs ..................................................................................................200
9.5.3.3 Depot ACLs ................................................................................................200
9.5.3.4 Product ACLs .............................................................................................201
9.5.4 ACL Templates ...................................................................................................202
9.5.4.1 Default ACL Template Entries ...................................................................203
9.5.4.1.1 Container ACL Template....................................................................204
9.5.4.1.2 Product ACL Template.......................................................................204
9.6 Security on SD-UX Systems ........................................................................................204
9.7 SD-UX Internal Authentication ..................................................................................206
9.7.1 SD-UX Credentials .............................................................................................206
9.7.1.1 Controllers Run with the Users Credentials and Privileges .....................207
9.7.1.2 Agents Run with the System’s Identity ......................................................207
9.7.2 Security Between Hosts: The Shared Secrets File ...............................................207
9.8 RPC Authorization......................................................................................................208
9.8.1 How Agents Handle Controller Requests ..........................................................209
9.8.2 Local Superuser Authorization ..........................................................................210
9.8.2.1 Delegation ..................................................................................................210
9.8.3 Depot Registration and Daemon/Agent Security ..............................................210
9.9 Security Use Models ...................................................................................................210
9.9.1 Security in Remote Distributions .......................................................................211
9.9.2 Security in Local Distributions ...........................................................................211
9.9.2.1 Restricting Installation to Specific Target Systems by Specific Users ........212
9.9.3 Security for Software Developers .......................................................................212
9.10 Permission Requirements, by Command .................................................................213
9.10.1 Packaging (swpackage) ....................................................................................213
9.10.2 Listing (swlist) ..................................................................................................213
9.10.3 Job Browsing (sd, swjob) ..................................................................................213
9.10.4 Copying (swcopy) ............................................................................................213
9.10.5 Installing (swinstall) .........................................................................................214
9.10.6 Removal (swremove) ........................................................................................214
Table of Contents 9