home *** CD-ROM | disk | FTP | other *** search
Wrap
ssssyyyyssssmmmmggggrrrr((((1111MMMM)))) ssssyyyyssssmmmmggggrrrr((((1111MMMM)))) NNNNAAAAMMMMEEEE sysmgr - System Manager - Access to Desktop System Administration SSSSYYYYNNNNOOOOPPPPSSSSIIIISSSS ////uuuussssrrrr////ssssyyyyssssaaaaddddmmmm////bbbbiiiinnnn////ssssyyyyssssmmmmggggrrrr DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNN The _s_y_s_m_g_r command is available from the Desktop Toolchest and allows the user to access Desktop System Administration Managers and Active Guides. This document provides an overview of the Desktop System Administration model and describes how to use the System Manager. IRIX 6.5.14 updates the System Manager appearance to adhere to modern SGI branding guidelines (layout, colors, and font), but System Manager functionality is the same. GGGGrrrraaaapppphhhhiiiiccccaaaallll CCCCoooommmmppppoooonnnneeeennnnttttssss _D_e_s_k_t_o_p _S_y_s_t_e_m _A_d_m_i_n_i_s_t_r_a_t_i_o_n is made up of several graphical components: MMMMaaaannnnaaaaggggeeeerrrr Displays the icons for a set of similar objects on the system. For example, the _D_i_s_k _M_a_n_a_g_e_r displays one icon for each disk on the system. These icons may be dragged onto the Desktop for future access. Each _M_a_n_a_g_e_r also provides access to the common tasks that can be performed on the icons it displays. For example, from the _U_s_e_r _M_a_n_a_g_e_r the user can _a_d_d _a _n_e_w _u_s_e_r _a_c_c_o_u_n_t, _c_h_a_n_g_e _a_n _a_c_c_o_u_n_t _p_a_s_s_w_o_r_d, or _d_e_l_e_t_e _a _u_s_e_r _a_c_c_o_u_n_t. These tasks appear in the row of buttons below the item icons as well as in the Task menu of the _M_a_n_a_g_e_r. AAAAccccttttiiiivvvveeee GGGGuuuuiiiiddddeeee A graphical interface that steps the user through a specific System Administration task. For example, the _A_d_d _a _M_o_d_e_m Guide assists the user in setting up the system to recognize and use a modem that has been attached to this system. No changes will be made to the system until the user has filled in all of the required information and pressed the "OK" button. All changes to the system made through Desktop System Administration software will be logged to ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////ssssaaaalllloooogggg and can be viewed by the System Administration Log Viewer _v_i_e_w_l_o_g(_1_M). See below for information about privileges and system security. SSSSttttaaaattttuuuussss PPPPaaaannnneeeellll Displays detailed information about a specific object on this system. For example, if the user selects a disk icon in the _D_i_s_k _M_a_n_a_g_e_r and press the "Get Info..." button, a _S_t_a_t_u_s _P_a_n_e_l will be displayed that provides additional information about the disk. (The user can also select an icon on the Desktop and select "Get Info" from the right-mouse-button menu to display the _S_t_a_t_u_s _P_a_n_e_l). Each _S_t_a_t_u_s _P_a_n_e_l also provides access to common tasks that can be performed on the selected item. PPPPaaaaggggeeee 1111 ssssyyyyssssmmmmggggrrrr((((1111MMMM)))) ssssyyyyssssmmmmggggrrrr((((1111MMMM)))) PPPPrrrriiiivvvviiiilllleeeeggggeeeessss The _P_r_i_v_i_l_e_g_e_s mechanism gives the system administrator fine-grain control over which users can access the System Administration tasks. _r_o_o_t is the Administrator account of the system. _r_o_o_t has the ability to grant specific privileges to users so that they can perform a limited set of System Administration tasks, or _r_o_o_t can designate a user as _p_r_i_v_i_l_e_g_e_d which allows that user to perform any System Administration task. If there is no _r_o_o_t password on the system, all users are considered to be _p_r_i_v_i_l_e_g_e_d users. When a user attempts to launch a Manager or Active Guide which requires privileges and the user has been granted that specific privilege or is a _p_r_i_v_i_l_e_g_e_d user, the item is launched. If the user is not privileged, a dialog will appear. The user must enter the root password to proceed, and has the option of permanently gaining privileges for this item (if the root password entered is correct). The graphical components of the Desktop System Administration software do not administer the system directly. Instead, they use _r_u_n_p_r_i_v(_1_M) to execute the desired commands. This eliminates the need for the graphical components to be setuid root and thus eliminates a class of possible attacks on the system. The following setuid root programs implement the privilege mechanism. _r_u_n_p_r_i_v(1M) Runs privileged operations on behalf of a non-root privileged user. _c_h_e_c_k_p_r_i_v(1M) Checks the privileged database to see if a non-root user has a particular privilege. This needs to bet setuid root because it needs to be able to determine whether there is a root password on the system, and on systems this means consulting /_e_t_c/_s_h_a_d_o_w which is typically not readable by non-root users. The following setuid root programs maintain the privilege database. They are setuid root so they can do their work when a non-root user runs them and supplies the root password. This allows a non-root user to use the graphical user interface _P_r_i_v_i_l_e_g_e_M_a_n_a_g_e_r(1M) to add and remove privileges if that user can supply the root password. The ability to change the privilege database is not a privilege; root cannot assign privilege database capabilities to non-root users. _a_d_d_p_r_i_v(1M) Adds privileges to a user. _r_m_p_r_i_v(1M) Removes privileges from a user. _a_d_d_p_r_i_v_u_s_e_r(1M) Makes a user ffffuuuullllllllyyyy pppprrrriiiivvvviiiilllleeeeggggeeeedddd. A ffffuuuullllllllyyyy pppprrrriiiivvvviiiilllleeeeggggeeeedddd user has all system administration privileges. PPPPaaaaggggeeee 2222 ssssyyyyssssmmmmggggrrrr((((1111MMMM)))) ssssyyyyssssmmmmggggrrrr((((1111MMMM)))) _r_m_p_r_i_v_u_s_e_r(1M) Removes a user's ffffuuuullllllllyyyy pppprrrriiiivvvviiiilllleeeeggggeeeedddd status. _a_d_d_d_e_f_p_r_i_v(1M) Makes a privilege a ddddeeeeffffaaaauuuulllltttt pppprrrriiiivvvviiiilllleeeeggggeeee, which means that any user can use it. The system comes configured with several ddddeeeeffffaaaauuuulllltttt pppprrrriiiivvvviiiilllleeeeggggeeeessss which enable non-root users to find out information such as what filesystems are on what disks. See _P_r_i_v_i_l_e_g_e_M_a_n_a_g_e_r(1M) for the list of default privileges on the system. _r_m_d_e_f_p_r_i_v(1M) Remove a privilege's ddddeeeeffffaaaauuuulllltttt pppprrrriiiivvvviiiilllleeeeggggeeee status. For example, if the administrator wishes to allow user "pat" to add and remove modems on the system, the administrator could use the command: '////uuuussssrrrr////ssssyyyyssssaaaaddddmmmm////bbbbiiiinnnn////aaaaddddddddpppprrrriiiivvvv ppppaaaatttt aaaaddddddddmmmmooooddddeeeemmmm ddddeeeelllleeeetttteeeemmmmooooddddeeeemmmm'. The administrator could also use the _P_r_i_v_i_l_e_g_e_M_a_n_a_g_e_r(1M) graphical interface. See the above referenced man pages for more details. There is also a _c_h_k_c_o_n_f_i_g(1M) option that controls whether privileges are enabled. If root runs _c_h_k_c_o_n_f_i_g _p_r_i_v_i_l_e_g_e_s _o_f_f, non-root users will not be able to perform system adminstration tasks unless they can provide the root password. If the administrator wishes to disable that functionality as well, the setuid bits can be removed from the six programs described above and the privilege mechanism will be completely disabled. _a_d_d_p_r_i_v and _r_m_p_r_i_v support the ----cccchhhhkkkkccccoooonnnnffffiiiigggg option for running _c_h_k_c_o_n_f_i_g to turn privileges on or off. UUUUssssiiiinnnngggg SSSSyyyysssstttteeeemmmm MMMMaaaannnnaaaaggggeeeerrrr _s_y_s_m_g_r displays a window divided into two vertical columns. The column on the left is the Table of Contents, listing the categories of System Administration Managers and Active Guides available to the user. To display a category in the right-hand column, click on the hypertext name of the category. The right-hand column of System Manager displays the current category. It contains a brief description of the category, and lists each Manager and Active Guide. To launch a Manager or Active Guide, use the mouse to click on the hypertext title or icon of the item. You may also drag the icon for the item onto the Desktop for future use. _s_y_s_m_g_r uses _r_u_n_c_a_t_a_l_o_g(_1_M) to launch Managers and _r_u_n_t_a_s_k(_1_M) to launch Active Guides. The items are launched in the background as separate processes, so it is possible to interact with System Manager while a Manager or Active Guide is up and running. Only one copy of a particular Manager or Active Guide will run on the system at any given time. If you attempt to launch an item that is already running, it will be opened and raised to the top of the window hierarchy. PPPPaaaaggggeeee 3333 ssssyyyyssssmmmmggggrrrr((((1111MMMM)))) ssssyyyyssssmmmmggggrrrr((((1111MMMM)))) _s_y_s_m_g_r comprises several categories: OOOOvvvveeeerrrrvvvviiiieeeewwww The Overview describes the set of categories available in System Manager. AAAAbbbboooouuuutttt TTTThhhhiiiissss SSSSyyyysssstttteeeemmmm The document for this category is generated by the system at the time the user requests it. The document is generated by the cgi-bin script ////vvvvaaaarrrr////wwwwwwwwwwww////ccccggggiiii----bbbbiiiinnnn////gggghhhhiiiinnnnvvvv////gggghhhhiiiinnnnvvvvMMMMaaaaiiiinnnn,,,, which enhances and adds to the output from the _h_i_n_v(_1) command. SSSSeeeeaaaarrrrcccchhhh This section allows the user to do a keyword search on the Managers and Active Guides that can be launched via System Manager. The search looks at a pre-defined set of keywords that has been defined for each Manager or Active Guide rather than looking at the text in System Manager. If a match is found, the title of the System Manager page where the item resides is displayed along with the item icon and title so that the item can be launched directly from the search results. SSSSooooffffttttwwwwaaaarrrreeee This category displays the set of Managers and Active Guides that allow the user to install software and obtain software licenses. For more information, see _s_w_m_g_r(_1_M) and _L_i_c_e_n_s_e_M_a_n_a_g_e_r(_1_M). HHHHaaaarrrrddddwwwwaaaarrrreeee aaaannnndddd DDDDeeeevvvviiiicccceeeessss This category displays the set of Managers and Active Guides that allow the user to add or remove devices on this system. Devices include modems, MIDI devices, printers, mouse pointers, and tablets. For more information, see _p_r_i_n_t_e_r_s(_1_M), _S_e_r_i_a_l_D_e_v_i_c_e_M_a_n_a_g_e_r(_1_M), _a_d_d_S_e_r_i_a_l_D_e_v_i_c_e(_1_M), _d_e_l_e_t_e_S_e_r_i_a_l_D_e_v_i_c_e(_1_M), _a_d_d_M_o_d_e_m(_1_M), _d_e_l_e_t_e_M_o_d_e_m(_1_M), _D_i_s_k_M_a_n_a_g_e_r(_1_M), _i_n_i_t_D_i_s_k(_1_M), _m_o_u_n_t_f_s(_1_M), _u_m_o_u_n_t_f_s(_1_M), _v_e_r_i_f_y_D_i_s_k(_1_M), _x_l_v_C_r_e_a_t_e_L_V(_1_M), _x_l_v_E_x_t_e_n_d(_1_M), _x_l_v_D_e_l_e_t_e(_1_M), _x_l_v_S_h_o_w(_1_M), _m_k_f_s_X_f_s(_1_M), _g_e_t_D_i_s_k_I_n_f_o(_1_M), _R_e_m_o_v_a_b_l_e_M_e_d_i_a_M_a_n_a_g_e_r(_1_M), _f_o_r_m_a_t_R_M_e_d_i_a(_1_M), _s_h_a_r_e_R_e_m_o_v_a_b_l_e_M_e_d_i_a(_1_M), _u_n_s_h_a_r_e_R_e_m_o_v_a_b_l_e_M_e_d_i_a(_1_M), _m_o_n_i_t_o_r_R_e_m_o_v_a_b_l_e_M_e_d_i_a(_1_M), _u_n_m_o_n_i_t_o_r_R_e_m_o_v_a_b_l_e_M_e_d_i_a(_1_M) SSSSeeeeccccuuuurrrriiiittttyyyy aaaannnndddd AAAAcccccccceeeessssssss CCCCoooonnnnttttrrrroooollll This category displays the set of Managers and Active Guides that allow the user to add and remove user accounts and set the level of security on this system. For more information, see _S_e_c_u_r_e_S_y_s_t_e_m(_1_M), _U_s_e_r_M_a_n_a_g_e_r(_1_M), _a_d_d_U_s_e_r_A_c_c_o_u_n_t(_1_M), _c_h_e_c_k_P_a_s_s_w_o_r_d(_1_M), _d_e_l_e_t_e_U_s_e_r_A_c_c_o_u_n_t(_1_M), _m_o_d_i_f_y_U_s_e_r_A_c_c_o_u_n_t(_1_M), _c_o_n_f_i_g_A_u_t_o_L_o_g_i_n(_1_M), _u_p_d_a_t_e_c_l_o_g_i_n(_1_M), _p_e_r_m_i_s_s_i_o_n_s(_1_M), _m_o_d_i_f_y_P_e_r_m_i_s_s_i_o_n_s_A_n_d_O_w_n_e_r_s_h_i_p(_1_M), _s_h_a_r_e_m_g_r(_1_M), _s_h_a_r_e_f_s(_1_M), _u_n_s_h_a_r_e_f_s(_1_M), _s_h_a_r_e_R_e_m_o_v_a_b_l_e_M_e_d_i_a(_1_M), _u_n_s_h_a_r_e_R_e_m_o_v_a_b_l_e_M_e_d_i_a(_1_M), _s_h_a_r_e_P_r_i_n_t_e_r_s(_1_M), _u_n_s_h_a_r_e_P_r_i_n_t_e_r_s(_1_M), _P_r_i_v_i_l_e_g_e_M_a_n_a_g_e_r(_1_M), _a_d_d_p_r_i_v(_1_M), _a_d_d_p_r_i_v_u_s_e_r(_1_M), _r_m_p_r_i_v(_1_M), _r_m_p_r_i_v_u_s_e_r(_1_M) PPPPaaaaggggeeee 4444 ssssyyyyssssmmmmggggrrrr((((1111MMMM)))) ssssyyyyssssmmmmggggrrrr((((1111MMMM)))) NNNNeeeettttwwwwoooorrrrkkkk aaaannnndddd CCCCoooonnnnnnnneeeeccccttttiiiivvvviiiittttyyyy This category displays the set of Managers and Active Guides that allow the user to set up connections to the local network and to the Internet. For more information, see _N_e_t_I_f_M_a_n_a_g_e_r(_1_M), _c_o_n_f_i_g_N_e_t_I_f(_1_M), _c_o_n_f_i_g_e_c_0_s_t_a_t_e(_1_M), _c_o_n_f_i_g_d_e_f_a_u_l_t_R_o_u_t_e(_1_M), _c_o_n_f_i_g_i_p_f_o_r_w_a_r_d_s_t_a_t_e(_1_M), _s_e_t_N_a_m_e_S_e_r_v_e_r_s(_1_M), _n_i_s_S_e_t_u_p(_1_M), _c_o_n_f_i_g_R_e_s_o_l_v_e_r(_1_M), _n_f_s_S_e_t_u_p(_1_M), _y_p_f_i_l_e_s(_4), _f_i_l_e_s_y_s_t_e_m_s(_4), _s_h_a_r_e_f_i_n_d_e_r(_1_M), _g_e_t_E_x_p_o_r_t_L_i_s_t(_1_M), _l_i_s_t_P_r_i_n_t_e_r_s(_1_M), _F_i_l_e_s_y_s_t_e_m_M_a_n_a_g_e_r(_1_M), _l_i_s_t_A_l_l_D_i_s_k_F_S(_1_M), _m_o_u_n_t_f_s(_1_M), _u_m_o_u_n_t_f_s(_1_M), _s_e_t_F_s_N_o_t_i_f_y_L_e_v_e_l(_1_M), _x_l_v_S_h_o_w(_1_M), _H_o_s_t_M_a_n_a_g_e_r(_1_M), _a_d_d_H_o_s_t(_1_M), _d_e_l_e_t_e_H_o_s_t(_1_M), _I_S_D_N_M_a_n_a_g_e_r(_1_M), _e_x_e_c_i_s_d_n_c_o_n_f(_1_M), _e_x_e_c_i_s_d_n_s_t_a_t(_1_M), _s_e_t_i_s_d_n_p_a_r_m(_1_M), _s_t_o_p_i_s_d_n_d(_1_M), _P_P_P_M_a_n_a_g_e_r(_1_M), _a_d_d_p_p_p_i_n(_1_M), _a_d_d_p_p_p_o_u_t(_1_M), _d_e_l_e_t_e_p_p_p(_1_M), _e_x_e_c_p_p_p(_1_M), _g_e_t_a_l_l_p_p_p_i_n_i_s_d_n(_1_M), _g_e_t_a_l_l_p_p_p_i_n_m_o_d_e_m(_1_M), _g_e_t_a_l_l_p_p_p_o_u_t_i_s_d_n(_1_M), _g_e_t_a_l_l_p_p_p_o_u_t_m_o_d_e_m(_1_M), _g_e_t_p_p_p_i_n(_1_M), _g_e_t_p_p_p_o_u_t(_1_M), _r_e_m_o_v_e_p_p_p_i_n(_1_M), _r_e_m_o_v_e_p_p_p_o_u_t(_1_M), _s_t_o_p_p_p_p(_1_M) FFFFiiiilllleeeessss aaaannnndddd DDDDaaaattttaaaa This category displays the set of Managers and Active Guides that allow the user to backup and restore the data on this system. For more information, see _F_i_l_e_s_y_s_t_e_m_M_a_n_a_g_e_r(_1_M), _l_i_s_t_A_l_l_D_i_s_k_F_S(_1_M), _m_o_u_n_t_f_s(_1_M), _u_m_o_u_n_t_f_s(_1_M), _s_e_t_F_s_N_o_t_i_f_y_L_e_v_e_l(_1_M), _x_l_v_C_r_e_a_t_e_L_V(_1_M), _x_l_v_D_e_l_e_t_e(_1_M), _x_l_v_S_h_o_w(_1_M), _B_a_c_k_u_p_A_n_d_R_e_s_t_o_r_e_M_a_n_a_g_e_r(_1_M), _b_a_c_k_u_p(_1_M), _r_e_s_t_o_r_e(_1_M), _u_n_s_c_h_e_d_B_a_c_k_u_p(_1_M) SSSSyyyysssstttteeeemmmm PPPPeeeerrrrffffoooorrrrmmmmaaaannnncccceeee This category displays the set of Managers and Active Guides that allow the user to monitor and tune System Performance. For more information, see _S_w_a_p_M_a_n_a_g_e_r(_1_M), _a_d_d_L_o_c_a_l_F_i_l_e_S_w_a_p(_1_M), _a_d_d_V_i_r_t_u_a_l_S_w_a_p(_1_M), _r_e_m_o_v_e_S_w_a_p(_1_M), _P_r_o_c_e_s_s_M_a_n_a_g_e_r(_1_M), _l_i_s_t_P_r_o_c(_1_M), _g_m_e_m_u_s_a_g_e(_1), _g_r__o_s_v_i_e_w(_1), _g_r__t_o_p(_1), _s_y_s_m_o_n(_1_M), and _v_i_e_w_l_o_g(_1_M) NNNNOOOOTTTTEEEESSSS The _R_e_s_t_a_r_t _S_y_s_t_e_m and _S_h_u_t _D_o_w_n _S_y_s_t_e_m tasks are not available from System Manager but instead can be accessed from the System tile of the Toolchest. For more information on these tasks, see _d_t_s_h_u_t_d_o_w_n(_1_M) FFFFIIIILLLLEEEESSSS ////uuuussssrrrr////ssssyyyyssssaaaaddddmmmm//// Root directory for sysadmdesktop executables and dso's ////uuuussssrrrr////ssssyyyyssssaaaaddddmmmm////aaaaddddmmmmiiiinnnnccccllllaaaassssssss//// Contains the set of dso's for each _a_d_m_i_n _c_l_a_s_s. An admin class monitors and administers a set of system administration objects. For example, _S_a_U_s_e_r_A_c_c_o_u_n_t_C_l_a_s_s._s_o is responsible for monitoring, creating, modifying, and removing user account objects on the system. ////uuuussssrrrr////ssssyyyyssssaaaaddddmmmm////aaaauuuutttthhhhddddssssoooo//// Contains the set of dso's used for each type of authentication. At this time, only UNIX authentication (in other words, request root PPPPaaaaggggeeee 5555 ssssyyyyssssmmmmggggrrrr((((1111MMMM)))) ssssyyyyssssmmmmggggrrrr((((1111MMMM)))) password) is implemented. ////uuuussssrrrr////ssssyyyyssssaaaaddddmmmm////bbbbiiiinnnn//// Contains the set of commands that implement the sysadmdesktop product. These commands do not make changes to the target system, but collectively allow the user to access the tasks, managers, status panels, and privileged commands. See the individual man pages for each command for more details. ////uuuussssrrrr////ssssyyyyssssddddmmmm////pppprrrriiiivvvvbbbbiiiinnnn//// Contains the set of privileged commands that make changes to the target system. The user must be privileged (in other words, be root or be assigned the designated privilege) to run these commands. See _r_u_n_p_r_i_v(_1_M), _p_r_i_v_i_l_e_g_e_s(_4), and the man pages for each privileged command for more details. ////uuuussssrrrr////ssssyyyyssssaaaaddddmmmm////ccccaaaattttaaaallllooooggggddddssssoooo////****....ssssoooo Contains the dso's for each manager in the sysadmdesktop product. For example, _S_a_U_s_e_r_A_c_c_o_u_n_t_C_a_t_a_l_o_g._s_o implements the User Manager. ////uuuussssrrrr////ssssyyyyssssaaaaddddmmmm////ccccaaaattttaaaallllooooggggddddffff////****....ccccddddffff Contains a _d_e_s_c_r_i_p_t_o_r _f_i_l_e for each manager in the sysadmdesktop product. The descriptor file defines information about a manager, including dso name, manager name, and keywords without requiring the manager code itself to be loaded into memory. For example, _S_a_U_s_e_r_A_c_c_o_u_n_t_C_a_t_a_l_o_g._c_d_f contains information about the User Manager. ////uuuussssrrrr////ssssyyyyssssaaaaddddmmmm////ppppaaaannnneeeellllddddssssoooo////****....ssssoooo Contains the dso's for each status panel in the sysadmdesktop product. A status panel shows detailed information about a specific system object. For example, _S_a_U_s_e_r_A_c_c_o_u_n_t_P_a_n_e_l._s_o implements the user account status panel and will display information about a specific user account. Status panels do not have a corresponding descriptor file. The information describing a status panel is included in the relevant manager descriptor file. For example, /usr/sysadm/catalogdf/SaUserAccountCatalog.cdf contains the path of the user account status panel dso. ////uuuussssrrrr////ssssyyyyssssaaaaddddmmmm////ttttaaaasssskkkkddddssssoooo////****....ssssoooo Contains the dso's for each task in the sysadmdesktop product. For example, _S_a_A_d_d_U_s_e_r_T_a_s_k._s_o implements the Add User Account task. ////uuuussssrrrr////ssssyyyyssssaaaaddddmmmm////ttttaaaasssskkkkddddffff////****....ttttddddffff Contains a descriptor file for each task in the sysadmdesktop product. The descriptor file defines information about a task, including dso name, task name, and keywords without requiring the task code itself to be loaded into memory. For example, _S_a_A_d_d_U_s_e_r_T_a_s_k._t_d_f contains information about the Add User Account task. PPPPaaaaggggeeee 6666 ssssyyyyssssmmmmggggrrrr((((1111MMMM)))) ssssyyyyssssmmmmggggrrrr((((1111MMMM)))) ////uuuussssrrrr////ssssyyyyssssaaaaddddmmmm////ttttaaaasssskkkkddddffff////****....eeeeddddffff,,,, ////uuuussssrrrr////ssssyyyyssssaaaaddddmmmm////ccccaaaattttaaaallllooooggggddddffff////****....eeeeddddffff Contains a descriptor file for generic executable programs. The descriptor file defines information about an executable, including icon type, executable name, and keywords without requiring the executable code itself to be loaded into memory. For example, _S_a_V_i_e_w_C_P_U_U_s_a_g_e_T_a_s_k._e_d_f allows sysadmdesktop components to launch gr_top, which is not part of the sysadmdesktop product. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm//// Root directory for sysadmdesktop configuration files. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////bbbbaaaacccckkkkuuuuppppssss//// Contains a list of scheduled backups. These may be viewed with the Backup and Restore Manager _B_a_c_k_u_p_A_n_d_R_e_s_t_o_r_e_M_a_n_a_g_e_r(_1_M). ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////ccccoooonnnnffffiiiigggg////ccccllllooooggggiiiinnnn....ccccoooonnnnffff Read by clogin to determine which accounts to show or hide. Values are set by the Configure Clogin task. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////ccccoooonnnnffffiiiigggg////ddddeeeeffffaaaauuuulllltttt....ccccsssshhhhrrrrcccc,,,, ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////ccccoooonnnnffffiiiigggg////ddddeeeeffffaaaauuuulllltttt....llllooooggggiiiinnnn,,,, ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////ccccoooonnnnffffiiiigggg////ddddeeeeffffaaaauuuulllltttt....pppprrrrooooffffiiiilllleeee These are the default .cshrc, .login, and .profile files that are copied into a new home directory, as specified by /var/sysadm/config/newaccount.config and /var/sysadm/config/newhomedir.config. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////ccccoooonnnnffffiiiigggg////ddddeeeelllleeeetttteeeeaaaaccccccccoooouuuunnnntttt....ccccoooonnnnffffiiiigggg Determines what actions are taken when a user is deleted from the system by the Remove User Account task. As shipped, the only action is to run the script /var/sysadm/config/deleteaccount.script (as root). See file comments for details. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////ccccoooonnnnffffiiiigggg////ddddeeeelllleeeetttteeeeaaaaccccccccoooouuuunnnntttt....ssssccccrrrriiiipppptttt Default script invoked by /var/sysadm/config/deleteaccount.config when a user account is deleted from the system by the Remove User Account task. As shipped, this script takes no action. Note that this script will be run as root. See file comments for details. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////ccccoooonnnnffffiiiigggg////ffffiiiilllleeeessss....ccccoooonnnnffffiiiigggg Lists the system files that are considered "critical" to system functioning and which are normally not available to sysadmdesktop components. For example, the Permissions Manager will not change the ownership or permissions of files listed here. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////ccccoooonnnnffffiiiigggg////ggggrrrroooouuuuppppssss....ccccoooonnnnffffiiiigggg Lists default groups in /etc/group and controls how the sysadmdesktop product will display them. See file comments for details. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////ccccoooonnnnffffiiiigggg////nnnneeeewwwwaaaaccccccccoooouuuunnnntttt....ccccoooonnnnffffiiiigggg Determines what actions are taken when a new user account is created by the Add User Account task. As shipped, the files /var/sysadm/config/default.* are copied into the new home directory PPPPaaaaggggeeee 7777 ssssyyyyssssmmmmggggrrrr((((1111MMMM)))) ssssyyyyssssmmmmggggrrrr((((1111MMMM)))) (if they don't already exist) and /var/sysadm/config/newaccount.script is run (as root). See file comments for details. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////ccccoooonnnnffffiiiigggg////nnnneeeewwwwaaaaccccccccoooouuuunnnntttt....ssssccccrrrriiiipppptttt Default script invoked by /var/sysadm/config/newaccount.config when a new user account is added to the system by the Add User Account task. This script is shipped with the default action of creating the new user's .lang file. Note that this script is run as root. See file comments for details. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////ccccoooonnnnffffiiiigggg////nnnneeeewwwwhhhhoooommmmeeeeddddiiiirrrr....ccccoooonnnnffffiiiigggg Determines what actions are taken when a new home directory is created for an existing user by the Modify User Account task. As shipped, the files /var/sysadm/config/default.* are copied into the new home directory and /var/sysadm/config/newhomedir.script is run (as root). See file comments for details. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////ccccoooonnnnffffiiiigggg////nnnneeeewwwwhhhhoooommmmeeeeddddiiiirrrr....ssssccccrrrriiiipppptttt Performs actions on a new home directory created for an existing user by the Modify User Account task. As shipped, this script takes no action. Note that this script is run as root. See file comments for details. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////ccccoooonnnnffffiiiigggg////uuuusssseeeerrrraaaaccccccccoooouuuunnnnttttssss....ccccoooonnnnffffiiiigggg Lists special user accounts in /etc/passwd (as shipped) and controls how they are displayed. The sysadmdesktop product will not allow these accounts to be modified or removed using the Modify User Account or Remove User Account tasks. See file comments for details. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////ddddeeeeffffaaaauuuullllttttPPPPrrrriiiivvvviiiilllleeeeggggeeeessss//// Contains one file for each privilege that is automatically granted to all users. For example, as shipped, all users may list the available printers using the default privilege listPrinters. See _d_e_f_a_u_l_t_P_r_i_v_i_l_e_g_e_s(_4) for details. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////ggggeeeennnnNNNNeeeewwwwUUUUiiiidddd If this user-defined script exists, the Add User Account task will invoke it to generate the next available UID for a new user. Otherwise the next UID will be chosen at random. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////pppprrrriiiivvvveeeennnnvvvviiiirrrroooonnnn List of allowed environment variables when running a privileged program using _r_u_n_p_r_i_v(_1_m). If a variable is listed with no value, the value will be inherited from the current environment. If a variable is not listed, it will not be available to the privileged program. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////pppprrrriiiivvvvhhhhoooommmmeeee//// Home directory for all privileged programs. PPPPaaaaggggeeee 8888 ssssyyyyssssmmmmggggrrrr((((1111MMMM)))) ssssyyyyssssmmmmggggrrrr((((1111MMMM)))) ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////pppprrrriiiivvvviiiilllleeeeggggeeee Database containing a list of all privileges and a list of which users have been granted those specific privileges. This database should only be modified with _P_r_i_v_i_l_e_g_e_M_a_n_a_g_e_r(_1_M). ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////ssssaaaalllloooogggg The System Administration Log. Privileged commands write information about who invoked them, what args were used, what actions were taken, and what errors were enountered. Use _v_i_e_w_l_o_g(_1_M) to view this log. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmm////ssssaaaalllloooogggg....ccccoooonnnnffff System administration log configuration details. These values are set using the Set System Admin Log Options task. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmmddddeeeesssskkkkttttoooopppp////EEEEZZZZsssseeeettttuuuupppp////SSSSyyyyssssSSSSeeeettttuuuupppp////ccccggggiiii----bbbbiiiinnnn////SSSSyyyyssssSSSSeeeettttuuuupppp//// Contains scripts and commands that implement System Setup (EZSetup). ////vvvvaaaarrrr////wwwwwwwwwwww////ccccggggiiii----bbbbiiiinnnn////gggghhhhiiiinnnnvvvv//// Contains programs that generate the "About this System" page for _s_y_s_m_g_r(_1_M). ////vvvvaaaarrrr////wwwwwwwwwwww////ccccggggiiii----bbbbiiiinnnn////ssssyyyyssssmmmmggggrrrr////sssseeeeaaaarrrrcccchhhh The program that implements the _s_y_s_m_g_r(_1_M) search feature. ////vvvvaaaarrrr////ssssyyyyssssaaaaddddmmmmddddeeeesssskkkkttttoooopppp////EEEEZZZZsssseeeettttuuuupppp////SSSSyyyyssssSSSSeeeettttuuuupppp//// Root directory for System Setup documents. ////vvvvaaaarrrr////wwwwwwwwwwww////hhhhttttddddooooccccssss////ssssyyyyssssmmmmggggrrrr////$$$$LLLLAAAANNNNGGGG//// Root directory for localized HTML documents used by System Manager. $$$$HHHHOOOOMMMMEEEE////....nnnnooooWWWWaaaarrrrnnnnIIIInnnniiiittttttttaaaabbbb This file is used to make sure that the user is only warned once about the existence of the file /etc/inittab.O after an IRIX upgrade. $$$$HHHHOOOOMMMMEEEE////....ddddeeeesssskkkkttttoooopppp----{{{{hhhhoooosssstttt}}}}////SSSSyyyyssssaaaaddddmmmmSSSSttttooooppppNNNNooooRRRRoooooooottttWWWWaaaarrrrnnnniiiinnnnggggssss If this file exists, sysadmdesktop will not warn the user that there is no root password on the system. The file is created when the user is notified that there is no root password and requests that this warning not be shown again. SSSSEEEEEEEE AAAALLLLSSSSOOOO addpriv(1M), checkpriv(1M), runpriv(1M), runtask(1M), runcatalog(1M), chkconfig(1M), shadow(4). PPPPaaaaggggeeee 9999