cfgmgr.auth(4) osf1 man page | unix.com

Man Page: cfgmgr.auth

Operating Environment: osf1

Section: 4

cfgmgr.auth(4)						     Kernel Interfaces Manual						    cfgmgr.auth(4)

NAME
cfgmgr.auth - Configuration management server authorization database
SYNOPSIS
/etc/cfgmgr.auth
DESCRIPTION
The cfgmgr.auth file lists the remote systems that are authorized to modify the local system's kernel subsystem configuration. Using the sysconfig command, system administrators can maintain the kernel subsystem configuration on local and remote hosts. To secure access to the kernel subsystem configuration, the local configuration management server (cfgmgr) answers requests from remote systems only when the remote system is listed in the cfgmgr.auth file. Each entry in the file has the following form: host-name Where host-name specifies the full domain name of the remote host. You must list each remote host on a separate line and only the first 128 characters of each line are read and processed. Lines beginning with the pound sign (#) are comments. If the cfgmgr.auth file does not exist, the configuration management server assumes no remote system administrators are allowed to config- ure, reconfigure, or unconfigure any kernel subsystem on the local host.
EXAMPLES
The following shows entries in the cfgmgr.auth file on a host named buster: salmon.zk3.dec.com trout.zk3.dec.com bluefish.zk3.dec.com This cfgmgr.auth file allows system administrators on the salmon, trout, and bluefish hosts to configure, reconfigure, and unconfigure sub- systems on buster.
RELATED INFORMATION
Commands: cfgmgr(8), sysconfig(8), sysconfigdb(8), kloadsrv(8) Files: /etc/sysconfigtab(4) System Administration delim off cfgmgr.auth(4)
Related Man Pages
cfg_subsys_attr_t(9s) - osf1
cfg_connect(3) - osf1
cfg_subsys_unconfig(3) - osf1
sys_attrs_tc(5) - osf1
cfg_attr_t(9s) - osf1
Similar Topics in the Unix Linux Community
creating link for a file of remote server
add SSA pdisk to array to become hdisk
Interesting Problem! 2 VIOs, One is problematic, assigning disks and resources from the other only
Computer secure management
Computer secure management