Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
| Search for | Example | Results |
|---|---|---|
| A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
|
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
| Search for | Operator | Example |
|---|---|---|
|
Two or more words in the same topic |
|
|
| Either word in a topic |
|
|
| Topics that do not contain a specific word or phrase |
|
|
| Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
| A combination of search types | ( ) parentheses |
|
aaa utility
The aaa utility grants and revokes permissions for operations that use the OGFS. For example, the aaa utility grants permission for the readServerFilesystem operation, allowing you to browse a server’s file system in the SA Client. To run the aaa utility, you must belong to the Administrators user group.
The permissions granted and revoked by the aaa utility are stored in the /opsw/Permissions directory of the OGFS. For details on the contents of the directory, see /opsw/Permissions directory.
aaa syntax
The aaa utility has the following syntax:
aaa shell-perm (grant | revoke) -o operation [-u user-group]
[-f facility | -c customer | -g device-group [-s | -l login]]
The following table describes the command options and Global Shell operations (permissions) lists the operations that can be granted or revoked the aaa utility.
|
Option |
Description |
|---|---|
|
|
The operation on which to grant or revoke the permission. For a list of allowed values, see the Operation column in Global Shell operations. |
|
|
The SA user group that is assigned the permission. This value is inferred from the current working directory if it corresponds to a user group. If it cannot be inferred, specify a user group. |
|
|
The name, ID, or path to a facility, such as: |
|
|
The name, ID, or path to a customer, such as: |
|
|
The name, ID, or path to a public device group, such as: |
|
|
A login account on the servers that are specified by the |
|
-s |
The login account on the servers (specified by |
aaa usage rules
The following usage rules and recommendations apply to the aaa utility:
- For operations that are performed on a server, one of the
-f,-c, or-goptions is required. - As a best practice, when you are granting permissions, use care when you select servers so that you do not capture more servers than you intend. This is particularly important when using the
-cor-foption. For example, if you want to grant permission to theloginToServeroperation for all servers in theChicagofacility asroot, you could use the-foption to select all servers in a particular facility. However, this may also select Windows servers, which is probably not desired since therootuser does not typically exist on Windows servers. In this case, you should define a public device group that only includes servers in theChicagofacility which are running a UNIX operating system. - If you specify the
-f,-c, or-goption, you must also specify either the-sor-loption. The choice of the-sor-loption depends on the policies of your organization. If users log into managed servers with generic user names (such asroot), then you should specify the -l option. If users log into managed servers with individual user names, which are the same as their SA user names, they should specify the-soption. - The
-fand-coptions are provided as a convenience; however, in general, it is recommended that you define permissions based on device groups instead. - The
revokecommand can only remove a permission that was previously granted. If the permission was not previously granted, therevokecommand has no effect. - The
revokecommand only removes a permission for a specific user group. If a user has overlapping permissions, revoking permissions from a single user group will not prevent the user from performing that operation. For example, suppose a user belongs to two user groups that both have thelaunchGlobalShellpermission. If this permission is revoked from only one of those user groups, the user still has thelaunchGlobalShellpermission.
aaa examples
The following example gives all members of the AdvancedUsers group permission to open a Global Shell session:
aaa shell-perm grant -o launchGlobalShell \
-u ‘Advanced Users’
The following command allows members of the Advanced Users group to view the file systems as root of all UNIX servers:
aaa shell-perm grant -o readServerFilesystem \
-u 'Advanced Users' -g 'Public/All Unix Servers' -l root
The next example gives all members of the Unix Admin user group permission to log in as root to all servers in the Public/Trading Servers device group:
aaa shell-perm grant -o loginToServer -u ‘Unix Admin’\
-g ‘Public/Trading Servers’ -l root
The following example allows the Advanced Users group to run commands as root on servers associated with the Acme Inc customer.
aaa shell-perm grant -o runCommandOnServer \
-u ‘Advanced Users’ -c ‘Acme Inc’ -l root
The next example removes the permission for the UnixAdmin user group to log into servers that belong to the device group named Public/Unix Servers. The command applies to any login, because the -l option is not specified.
aaa shell-perm revoke -o loginToServer -u ‘Unix Admin’\
-g ‘Public/Unix Servers’
The following example allows the Oracle Users group to log into servers that belong to the device group OracleServers as the login oracle. For instance, if the SA user joe belongs to the Oracle Users group, he can log into the servers as the server user oracle.
aaa shell-perm grant -u ‘Oracle Administrators’ \
-o loginToServer -g ‘/opsw/Group/Public/Oracle Servers’ \
-l oracle
Instead of the -l option, the next example has the -s option, which allows the Oracle Users group to log into servers that belong to the device group Oracle Servers as the login that matches the SA user name. For instance, if the SA user joe belongs to the Oracle Users group, he can log into the servers as the server user joe.
aaa shell-perm grant -u ‘Oracle Administrators’ \
-o loginToServer -g ‘/opsw/Group/Public/Oracle Servers’ -s
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to hpe_sa_docs@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback:

