Sponsored Content
Full Discussion: /etc/hosts via ssh
Operating Systems AIX /etc/hosts via ssh Post 302108081 by dukessd on Thursday 22nd of February 2007 08:32:43 PM
Old 02-22-2007
The HMC is based on linux but cannot be used as, or like, a UNIX machine, you only have a restricted shell.
You do not need to add your managed systems to /etc/hosts.

To add a managed system, select the Server Management bar and choose Add
Managed System(s)

Last edited by dukessd; 02-23-2007 at 07:59 PM..
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

How to setup SSH between 4 hosts ?

Hi, I logged into h0011awe server. I am executing a script on this server which connects to other 3 hosts (h0022sam, h0033jar, h0044orc). In the script the command are like this orapmon=`ssh $USR@$host ps -ef|grep -v grep|grep pmon` I am using secured shell. How to setup that between these... (2 Replies)
Discussion started by: dreams5617
2 Replies

2. Shell Programming and Scripting

Please advise on ssh to many hosts; su - and then commands

Hi, I would like to do ssh to many hosts and then would like to do 'su -' with respective host's passwords and execute certain commands. This being a secure and big network , we have to login every server individually and then su with different passwords. So is there a way to achive it? ... (2 Replies)
Discussion started by: newbewie
2 Replies

3. Red Hat

How to block ssh via /etc/hosts.deny

Hi.., I am using redhat5 server, i want to know the details about to block ssh via /etc/hosts.deny. Need help immediately (1 Reply)
Discussion started by: thakshina
1 Replies

4. Shell Programming and Scripting

ssh to multiple hosts and saving the output in the local host

hi I have a script to login from a host "A" to a list of hosts in a file and perform some commands inside it...its somethin like this for i in `cat file` do ssh -t $i " command1 ; command2; ..." done I wanna save the outputs in a file in the current host "A" i.e from where I am... (3 Replies)
Discussion started by: ningy
3 Replies

5. UNIX for Advanced & Expert Users

how to check if I'm allowed to ssh several hosts.

Hi guys! I'm working on a little script. I have a txtfile with several hosts, Unix team has copied my keys into several of those servers, but not all of them, I need to figure out which ones I don't have access to, (I want a list of servers I don't have access to, so I can request for it). This... (1 Reply)
Discussion started by: erick_tuk
1 Replies

6. Shell Programming and Scripting

Logon to multiple hosts using ssh hardcode password

Hi im trying to write a script to logon to list of servers with same userID. I have no option/plan to implement ssh-keygen sharing between the systems, so i have written script creating 2 files, file1 holds list of hosts host1 host2 host3 file2 has following script for i in `cat file1`... (1 Reply)
Discussion started by: dreamaix
1 Replies

7. Shell Programming and Scripting

SSH to remote hosts in shell scripting

Hi There, I have a file contaning some 100 servers names one by one the file called redhat_servers.txt I want to prepare a script where it should give me the host name and kernal version. I wrote like this, #!/bin/bash while read line do ssh $line "uname -nr" done <... (3 Replies)
Discussion started by: kumar85shiv
3 Replies

8. Red Hat

Force ssl/ssh to use the hosts file

does anyone know how to force ssh/ssl to use the hosts file instead of DNS? I have disabled the DNS servers but ssh still will not resolve a host in the hosts file. thanks in advance for the help! DS (3 Replies)
Discussion started by: derrell simpson
3 Replies

9. UNIX for Dummies Questions & Answers

How to search using ssh on multiple hosts?

Hi guys - I am having a hard time trying to figure how to search for a certain string on config files hosted on multiple hosts. This is an example: Hostnames: myhost1.mycompany.com|myhost2.mycompany.com|myhost3.mycompany.com String to search for: myipaddress.somehost.com Directory... (9 Replies)
Discussion started by: DallasT
9 Replies

10. Shell Programming and Scripting

Ssh to validate multiple remote hosts connection validation.

Dear Folks, I am trying to read a config file contains ip and port numbers. i want to read each line of the config file and check ssh connection is happening or not. Kindly guide. Config file: abc@1.2.342 22 abc@1.2.343 22 abc@1.2.344 22 abc@1.2.345 22... (9 Replies)
Discussion started by: sadique.manzar
9 Replies
wbemadmin(1M)						  System Administration Commands					     wbemadmin(1M)

NAME
wbemadmin - start Sun WBEM User Manager SYNOPSIS
/usr/sadm/bin/wbemadmin DESCRIPTION
The wbemadmin utility starts Sun WBEM User Manager, a graphical user interface that enables you to add and delete authorized WBEM users and to set their access privileges. Use this application to manage access to groups of managed resources, such as disks and installed software, in the Solaris operating environment. The wbemadmin utility allows you to perform the following tasks: Manage user access rights Use the wbemadmin utility to add, delete, or modify an individual user's access rights to a namespace on a WBEM-enabled system. Manage namespace access rights Use the wbemadmin utility to add, delete, or modify access rights for all users to a namespace. The Sun WBEM User Manager displays a Login dialog box. You must log in as root or a user with write access to the rootsecurity namespace to grant access rights to users. By default, Solaris users have guest privileges, which grants them read access to the default namespaces. Managed resources are described using a standard information model called Common Information Model (CIM). A CIM object is a computer repre- sentation, or model, of a managed resource, such as a printer, disk drive, or CPU. CIM objects can be shared by any WBEM-enabled system, device, or application. CIM objects are grouped into meaningful collections called schema. One or more schemas can be stored in directory- like structures called namespaces. All programming operations are performed within a namespace. Two namespaces are created by default during installation: o root o rootsecurity -- Contains the security classes used by the CIM Object Manager to represent access rights for users and namespaces. When a WBEM client application connects to the CIM Object Manager in a particular namespace, all subsequent operations occur within that namespace. When you connect to a namespace, you can access the classes and instances in that namespace (if they exist) and in any names- paces contained in that namespace. When a WBEM client application accesses CIM data, the WBEM system validates the user's login information on the current host. By default, a validated WBEM user is granted read access to the Common Information Model (CIM) Schema. The CIM Schema describes managed objects on your system in a standard format that all WBEM-enabled systems and applications can interpret. You can set access privileges on individual namespaces or for a user-namespace combination. When you add a user and select a namespace, by default the user is granted read access to CIM objects in the selected namespace. An effective way to combine user and namespace access rights is to first restrict access to a namespace. Then grant individual users read, read and write, or write access to that namespace. You cannot set access rights on individual managed objects. However you can set access rights for all managed objects in a namespace as well as on a per-user basis. If you log in to the root account, you can set the following types of access to CIM objects: o Read Only -- Allows read-only access to CIM Schema objects. Users with this privilege can retrieve instances and classes, but cannot create, delete, or modify CIM objects. o Read/Write -- Allows full read, write, and delete access to all CIM classes and instances. o Write -- Allows write and delete, but not read access to all CIM classes and instances. o None -- Allows no access to CIM classes and instances. Context help is displayed in the left side of the wbemadmin dialog boxes. When you click on a field, the help content changes to describe the selected field. No context help is available on the main User Manager window. The wbemadmin security administration tool updates the following Java classes in the rootsecurity namespace: o Solaris_UserAcl -- Updated when access rights are granted or changed for a user. o Solaris_namespaceAcl -- Updated when access rights are granted or changed for a namespace. USAGE
The wbemadmin utility is not the tool for a distributed environment. It is used for local administration on the machine on which the CIM Object Manager is running. EXIT STATUS
The wbemadmin utility terminates with exit status 0. WARNING
The rootsecurity namespace stores access privileges. If you grant other users access to the rootsecurity namespace, those users can grant themselves or other users rights to all other namespaces. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWwbcor | +-----------------------------+-----------------------------+ SEE ALSO
mofcomp(1M), wbemlogviewer(1M), init.wbem(1M), attributes(5) SunOS 5.10 7 Oct 1999 wbemadmin(1M)
All times are GMT -4. The time now is 05:26 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy