IBM Books

Administration Guide


Tables

  1. SP trusted services
  2. DCE group names for use of SP trusted services
  3. Specifying nodes to start with cstartup
  4. Specifying nodes to shut down with cshutdown.
  5. Built-in Tcl commands and their default authorization callbacks
  6. Built-in extended Tcl commands and their default authorization callbacks
  7. ACL processing commands
  8. Service commands
  9. Other commands
  10. SP file collections
  11. Subcommands of supper
  12. Setting time service choices
  13. Perspectives high-level tasks
  14. Authorization required for each Perspective
  15. System Monitor to Perspectives cross reference
  16. HACWS configuration and task summary
  17. High Availability Control Workstation and task summary (SP-attached servers)
  18. Behavior of the Event Management subsystem with respect to trusted service authentication methods.
  19. Daemon and peer group security states
  20. Validation of EM client connection
  21. SDR authorizations on a system without DCE
  22. Commands invoked by SMIT panels


[ Top of Page | Previous Page | Next Page | Table of Contents | Index ]