12-07-2015
Quote:
Originally Posted by
dukessd
The document is dated 2011 - and a lot has changed - in particular the way RBAC works - and WPARs are extremely dependent on RBAC settings (as RBAC is used to protect/isolate the hosting partition as well as other WPARs from each other.
Unfortunately, for you - I stopped being really active with WPAR when WPAR manager went into the now defunct Director.
Assuming you have some SUMA support with IBM - have you tried opening a PMR with a question on this?
As far as my ever looking further, I would need more info, in particular, what error messages do you get?
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi Friends,
Can any of you explain me about the below line of code?
mn_code=`env|grep "..mn"|awk -F"=" '{print $2}'`
Im not able to understand, what exactly it is doing :confused:
Any help would be useful for me.
Lokesha (4 Replies)
Discussion started by: Lokesha
4 Replies
2. Linux
supermicro(dual core) server getting rebooted after "decompressing the kernel;booting the kernel" message comes.
I tried giving acpi=off to the kernel command line but same problem.It shows everything ok and no problem with memory and processors and power supplies.Wt could be the reason?
It has... (1 Reply)
Discussion started by: pankajd
1 Replies
3. Solaris
I was asked to look into a problem with a Sun Netra 440 in another department. On the server in question, the relevant 'uname -a' information is, "SunOS host1 5.9 Generic_118558-16 sun4u sparc SUNW,Netra-440". That information aside, while the other admin is logged into the ALOM, these errors are... (0 Replies)
Discussion started by: Borealis
0 Replies
4. Shell Programming and Scripting
Hi,
I have line in input file as below:
3G_CENTRAL;INDONESIA_(M)_TELKOMSEL;SPECIAL_WORLD_GRP_7_FA_2_TELKOMSEL
My expected output for line in the file must be :
"1-Radon1-cMOC_deg"|"LDIndex"|"3G_CENTRAL|INDONESIA_(M)_TELKOMSEL"|LAST|"SPECIAL_WORLD_GRP_7_FA_2_TELKOMSEL"
Can someone... (7 Replies)
Discussion started by: shis100
7 Replies
5. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
Create a Shell script that looks for all text files in your home directory (including subdirectories).
List... (3 Replies)
Discussion started by: rollinator
3 Replies
6. Solaris
Hi,
I have one question regarding the understanding of “load average” in a platform with virtual processors.
Suppose in this situation:
Total number of physical processors: 1
Number of virtual processors: 32
Total number of cores: 4
Number of cores per physical... (1 Reply)
Discussion started by: MDING
1 Replies
7. AIX
Hi everybody.
is anyone using versioned WPAR's?
Has anyone clustered them with PowerHA?
Please share your experience.
Regards, firefox (7 Replies)
Discussion started by: firefox111
7 Replies
8. UNIX for Dummies Questions & Answers
How to use "mailx" command to do e-mail reading the input file containing email address, where column 1 has name and column 2 containing “To” e-mail address
and column 3 contains “cc” e-mail address to include with same email.
Sample input file, email.txt
Below is an sample code where... (2 Replies)
Discussion started by: asjaiswal
2 Replies
9. Shell Programming and Scripting
Hello.
System : opensuse leap 42.3
I have a bash script that build a text file.
I would like the last command doing :
print_cmd -o page-left=43 -o page-right=22 -o page-top=28 -o page-bottom=43 -o font=LatinModernMono12:regular:9 some_file.txt
where :
print_cmd ::= some printing... (1 Reply)
Discussion started by: jcdole
1 Replies
LEARN ABOUT HPUX
acps.conf
acps.conf(4) Kernel Interfaces Manual acps.conf(4)
NAME
acps.conf - configuration file for the Access Control Policy Switch (ACPS)
SYNOPSIS
DESCRIPTION
The ACPS configuration file controls which modules are consulted for making an access control decision, the order in which the modules are
consulted, and the rules for combining their responses to return a result back to the application.
Syntax and Default Behavior
The file consists of one or more entries in the following format:
Whitespace in these entries is combined into a single blank (" ") character and removed from the beginning and end of each field. If mul-
tiple flags are specified, they should be separated with a comma character.
The individual parameters are defined as follows:
The label provides a human-readable name for the module entry.
The module name identifies the actual shared library to load to effect
the authorization decision. The module name is specified without a path or a suffix (for example, both of which are
assumed from the architecture.
The arguments are defined by the module (that is, module dependent) and are
used to provide additional configuration flexibility.
The field is used to modify the switch's behavior in interpreting the results of the module. See for more details and
possible values for this field.
The order of the entries in the acps.conf file denote the order in which the modules should be called to perform the access check. Each
entry is called in turn until an "authoritative result code" is returned. In the currently defined result code, everything except is
authoritative. Once an authoritative result code is returned by a decision provider module, the code is returned immediately to the appli-
cation. If is returned, the module is ignored and the next module is referenced.
is returned to the application if no module returns an authoritative result.
Entry Flags
In some cases, the default rules for ordering access requests and combining results do not behave as expected for a particular decision
provider module. In this case, it is possible to affect the processing of the ACPS by specifying one or more of the pre-defined flags. If
you specify multiple flags, you should separate them with a comma character.
There is currently only one flag recognized by the switch. The following flag may be specified on a per-module basis:
Short for 'non-authoritative', this flag is used for policy modules that always return
authoritative responses, even when they should not. Specifically, modifies the processing of the entry such that a return
of The effect of this is that multiple modules may be stacked with this flag, such that if any module returns then the
switch returns
EXAMPLES
The following is an example configuration file. Lines that begin with the symbol are treated as comments, and therefore ignored.
# First, attempt to satisfy access request using custom
# module, (e.g. granting all users access to a particular
# object foo, but only between 9am - 5pm). The custom
# module verifies the time and that the object matches
# the specified argument. (In this case, "foo".) If this
# module returns ACPS_DENY, keep going to the next entry
# rather than just returning deny to the application.
HP-UX RBAC : libacpm_timebased : foo : NONATTV
# If custom rule does not match, use default local RBAC
# rule processing
HP-UX RBAC : libacpm_hpux_rbac : :
SEE ALSO
acps(3), acps_api(3), acps_spi(3).
acps.conf(4)