Software Distributor (SD-UX) Administration Guide HP-UX 11i v1, 11i v2, and 11i v3 (762797-001, March 2014)

Table Of Contents
Adding a Target Group....................................................................................................120
Setting Up Remote Operations...............................................................................................121
Remote Operations Tutorial....................................................................................................121
Tutorial Set-Up.................................................................................................................121
How to Perform a Single-Target Installation..........................................................................122
Remote Interactive swlist........................................................................................................129
Remote Operations from the Command Line.............................................................................129
Target Selections..............................................................................................................129
Syntax.......................................................................................................................130
Target Files.................................................................................................................130
Examples........................................................................................................................130
swacl.........................................................................................................................130
swask........................................................................................................................131
swconfig....................................................................................................................131
swcopy......................................................................................................................131
swinstall.....................................................................................................................131
swjob........................................................................................................................131
swlist.........................................................................................................................131
swreg........................................................................................................................132
swremove...................................................................................................................132
swverify.....................................................................................................................132
8 Reliability and Performance ....................................................................133
Overview ...........................................................................................................................133
Groups and Source Options...................................................................................................134
Large Numbers of Targets......................................................................................................134
Timeout Options ..................................................................................................................134
Retry RPC and Retry Interval...................................................................................................135
Retry Command...................................................................................................................135
Database Checkpointing ......................................................................................................136
Compression .......................................................................................................................136
INDEX and INFO Compression..........................................................................................137
Staging ..............................................................................................................................137
Recovery (Install Only) ..........................................................................................................138
Installation With Separate Configuration..................................................................................139
Multiple Versions .................................................................................................................139
9 SD-UX Security ......................................................................................141
Overview............................................................................................................................141
Default Security...............................................................................................................141
Depots and Depot Registration..........................................................................................142
Modifying Target Systems.................................................................................................142
The swacl Command ............................................................................................................142
swacl Output...................................................................................................................143
Basic Security Tasks .............................................................................................................144
Listing User Access ..........................................................................................................144
Allowing Users to Manage Products in a Depot ..................................................................146
Allowing Users to Manage Roots (Install/Remove) ...............................................................146
Restricting Access to Depots .............................................................................................147
Adding Target Hosts ........................................................................................................148
Temporarily Restricting Access ..........................................................................................148
Closing the SD-UX Network ..............................................................................................148
Editing an ACL ...............................................................................................................149
How ACLs are Matched to the User .......................................................................................150
ACL Entries .........................................................................................................................150
ACL Keys .......................................................................................................................151
Contents 7