10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hello All
Why is hpux is not much spoken in the unix/Linux platform. what is the disadvantes in HPUX
Thanks,
VJ (1 Reply)
Discussion started by: Vijaykannan T
1 Replies
2. HP-UX
This site,with good packages drop support for 11.23
HP-UX Porting and Archiving Centre | What´s New?
Someone know a good site with packages?
Thanks (0 Replies)
Discussion started by: Linusolaradm1
0 Replies
3. Infrastructure Monitoring
Hello,
I have to monitoring a log in a machine HPUX B.11.00. I defined config file:
$seekfilesdir = '/opt/tools/capmau/log';
@logs = (
{
tag => 'sybase',
logfile => '/opt/sybase/ASE-12_0/install/errorlog',
criticalpatterns =>,
},
);
and defined in nrpe.cfg:
... (0 Replies)
Discussion started by: msanbrug
0 Replies
4. HP-UX
Please clarify
Version: HP-UX <hostname> B.11.31 U ia64 unlimited-user license
Physical Configured is 36 GB
CPU info:
4 Intel(R) Itanium 2 9000 series processors (1.6 GHz, 24 MB)
533 MT/s bus, CPU version C2
12 logical processors
Memory: 36813 MB (35.95 GB)... (10 Replies)
Discussion started by: sidharthmellam
10 Replies
5. HP-UX
I'm sharing this in case anybody needs it. Modified from the original solaris pwage script. This modified hpux script will check /etc/password file on hpux trusted systems search /tcb and grep the required u_succhg field. Calculate days to expiry and notify users via email.
original solaris... (2 Replies)
Discussion started by: sparcguy
2 Replies
6. Shell Programming and Scripting
Hello.
I cant figure out how can i move entire row up , so it pasted on the one above at the end , or to do that for one character.
In notepads,word, or some other text editors we would do that with backspace button.
Example.
Content of my text file is this :
I am trying to do
that.
And... (2 Replies)
Discussion started by: tonijel
2 Replies
7. Shell Programming and Scripting
I am running HPUX and using WLM (workload manager). I want to write a script to fork CPUs to basically take CPUs from other servers to show that the communication is working and CPU licensing is working. Basically, I want to build a script that will use up CPU on a server. Any ideas? (2 Replies)
Discussion started by: cpolikowsky
2 Replies
8. UNIX for Dummies Questions & Answers
Hi,
I am a SAP Basis admin recentely been asked to administer a HPUX server. Could someone recommend some good study material to learn with the Sap
prespective.
-carry (1 Reply)
Discussion started by: carryclare
1 Replies
9. HP-UX
:( i got couple of weeks ago a : HP Visualize workstation , model B100.
everithing is ok in the box the only problem is that i 'am not familiar with this operational sys, and i try to uninstall and see if i can get on it windows net server 64 bit. or any other 64 bit operational sys that i'll... (1 Reply)
Discussion started by: newbird
1 Replies
10. UNIX for Dummies Questions & Answers
Is there any problems of binaries compatibility between HPUX 10.20 et 11 ? (2 Replies)
Discussion started by: Olivier
2 Replies
roleadm(1M) roleadm(1M)
NAME
roleadm - noninteractive editing of role-related information in RBAC databases
SYNOPSIS
[comments]
[role]
DESCRIPTION
is a noninteractive command that allows users with the appropriate authorization to modify and list the role information in and
See rbac(5) for information on these RBAC databases.
HP recommends that only the and commands be used to edit and view the RBAC databases. Do not edit the RBAC files directly.
Options
recognizes the following options:
Add a role to the system list of valid roles.
Appends a line in file with rolename. You can enter an optional comment after the role.
Remove a role from the system list of valid roles.
If role is present in remove entry. If role is not present, then returns an error code; see
Change the name of a role.
This option causes a modification of the RBAC databases and replacing each occurrence of oldrolename with newrolename.
Assign a role to a user or a group.
First verifies that the user is a valid user, and the role is present in the file. When this is the case, the role is appended to
the user->role mapping in the file. If user argument has an ampersand at the beginning (such as &users), then it is assumed that
what follows after the ampersand is a group name - the ampersand must be shell escaped or put in quotes such as users or "&users".
An administrator may specify a default set of roles by assigning roles to the keyword. If a user is not otherwise explicitly
assigned roles in the database, he or she will be given roles assigned to the role.
Revoke a role from the specified user.
If no role is specified, then all roles are revoked for the given user. (The user entry is removed from If user argument has an
ampersand at the beginning (such as &users), then it is assumed that what follows after the ampersand is a group name - the amper-
sand must be shell escaped or put in quotes such as users or "&users".
List user and role information from the RBAC databases, and
If neither nor are specified, then list all the users with assigned roles.
If is specified, then only the role(s) of the specified user will be listed. If user has an ampersand at the beginning (such as
&users), then it is assumed that what follows after the ampersand is a group name - the ampersand must be shell escaped or put in
quotes such as users or "&users". If only is specified, then only list the user(s) assigned to the specified role. If both and are
specified, then the entry with the user username and role rolename will be listed, if it exists.
If the specified user does not exist in the system and there exists the special user, in the database, then the roles listed for the
specified user will be those of the user. In the event that there is more than one user defined in the database, the system will
recognize only the last one.
If is specified, then all the roles in the roles database, will be listed. When is specified, no other argument will be taken by
Authorizations
In order to invoke the user must either be root, (running with effective uid of 0), or have the appropriate authorization(s). The follow-
ing is a list of the required authorizations for running with particular options:
hpux.security.access.role.add,*
Allows user to run roleadm with "add" option.
hpux.security.access.role.delete,*
Allows user to run roleadm with "delete" option.
hpux.security.access.role.modify,*
Allows user to run roleadm with "modify" option.
hpux.security.access.role.assign,*
Allows user to run roleadm with "assign" option.
hpux.security.access.role.revoke,*
Allows user to run roleadm with "revoke" option.
hpux.security.access.role.list,*
Allows user to run roleadm with "list" option.
EXTERNAL INFLUENCES
Environment Variables
determines the language in which messages are displayed.
International Code Set Support
Single-byte character code set is supported.
RETURN VALUE
Upon completion, returns one of the following values:
Success.
Failure.
An appropiate error message is printed to stderr.
EXAMPLES
The following command will append the line to file.
The following command will append the line to the file.
The following command will delete line in file and other databases.
The following command will delete line from the file.
The following command will replace role name with in and
The following command will append line
to file:
The following command will remove the line from file:
The following command will remove all the roles for user from file:
The following command will remove all the roles for group name from file:
The following command will list all the roles for user
The following command will list all users and groups with role
The following command will list entries with user and rolename
The following command will list entries with group name
The following command will list all the entries in
FILES
Database containing valid definitions of all roles.
Database containing definitions of all valid authorizations.
Database specifying the roles allowed for each specified user.
Database that defines the allowed authorization for each specified role.
Database containing the authorization to execute specified commands
and the privileges to alter uid and gid for command execution.
SEE ALSO
authadm(1M), cmdprivadm(1M), privrun(1M), rbacdbchk(1M), rbac(5).
roleadm(1M)