Software Distributor (SD-UX) Administration Guide HP-UX 11i v1, 11i v2, and 11i v3 (762797-001, March 2014)

Table Of Contents
ACL Permissions ..............................................................................................................152
Object Protection ............................................................................................................152
Host System ACLs .......................................................................................................153
Root ACLs .................................................................................................................154
Depot ACLs ...............................................................................................................154
Product ACLs .............................................................................................................154
ACL Templates ................................................................................................................155
Default ACL Template Entries ........................................................................................156
Container ACL Template..........................................................................................156
Product ACL Template.............................................................................................156
Security on SD-UX Systems ....................................................................................................157
SD-UX Internal Authentication ................................................................................................158
SD-UX Credentials ...........................................................................................................158
Controllers Run with the User’s Credentials and Privileges ................................................158
Agents Run with the System’s Identity ............................................................................159
Security Between Hosts: The Shared Secrets File ..................................................................159
RPC Authorization.................................................................................................................159
How Agents Handle Controller Requests ............................................................................160
Local Superuser Authorization ...........................................................................................161
Delegation ................................................................................................................161
Depot Registration and Daemon/Agent Security .................................................................161
Security Use Models ............................................................................................................161
Security in Remote Distributions .........................................................................................161
Security in Local Distributions ............................................................................................162
Restricting Installation to Specific Target Systems by Specific Users ....................................162
Security for Software Developers .......................................................................................162
Permission Requirements, by Command ..................................................................................163
Packaging (swpackage) ...................................................................................................163
Listing (swlist) .................................................................................................................163
Job Browsing (sd, swjob) ..................................................................................................163
Copying (swcopy) ...........................................................................................................163
Installing (swinstall) .........................................................................................................163
Removal (swremove) ........................................................................................................164
Configuration (swconfig) ..................................................................................................164
Verify (swverify) ..............................................................................................................164
Registering Depots (swreg) ...............................................................................................164
Changing ACLs (swacl).....................................................................................................164
Request Scripts (swask).....................................................................................................164
Modify (swmodify)...........................................................................................................164
10 Creating Software Packages ..................................................................165
Overview of the Packaging Process ........................................................................................165
Prerequisites ...................................................................................................................165
Identifying the Products to Package ........................................................................................165
Determining Product Contents ...........................................................................................165
Determining Product Structure ...........................................................................................166
Adding Control Scripts..........................................................................................................166
Creating a Product Specification File (PSF) ..............................................................................167
Product Specification File Examples ...................................................................................167
Minimal PSF ..............................................................................................................167
Typical PSF.................................................................................................................168
PSF Syntax .....................................................................................................................169
PSF Object Syntax ......................................................................................................170
Control Files...........................................................................................................171
Selecting the PSF Layout Version ...................................................................................172
8 Contents