smh(1M)smh(1M)NAMEsmh - HP System Management Homepage (HP SMH).
[ | | | ]
The command launches HP System Management Homepage (HP SMH) for per‐
forming system administration on an HP-UX system. HP SMH is an enhanced
version of HP System Administration Manager (HP SAM). HP SMH provides
web-based graphical user interface (GUI), terminal user interface
(TUI), and command line interface (CLI). You can access these inter‐
faces using the smh command. However, you can also use the sam(1M) com‐
mand. The sam(1M) command behaves the same as the smh(1M) command
except that the deprecation message is displayed in the beginning. For
more information on HP SAM, refer sam(1M) manpage.
When you run either the command or the command and if the environment
variable is set, HP SMH opens in the default web browser. If the envi‐
ronment variable is not set, HP SMH opens in the terminal user inter‐
recognizes the following options.
Launches HP SMH on a web browser without security warnings.
Launches HP SMH on a web browser with security warnings.
The -r option applies only to the TUI of HP SMH. This option
invokes Restricted SMH which, enables the system administrator
assign limited privileged user access to SMH function‐
ality. You must be a privileged user to use this
option. See the section below for more information.
The -p option applies only to the CLI of HP SMH. This option
invokes the /opt/propplus/bin/cprop command which, provides a
command-line interface to most of the information available from
the HP SMH property pages. The -p option can be used with dif‐
ferent commands to view information about hardware and software,
operating system, network and other system devices.
See the cprop(1) manpage for more information on the
command and the option parameters.
SMH can be configured to provide a subset of its functionality to cer‐
tain users or groups of users. This is done through Restricted SMH.
System administrators access Restricted SMH by invoking SMH with the
option (see "Options" above). In Restricted SMH, system administrators
may assign subsets of SMH functionality on a per-user or per-group
Generally, SMH requires privileged user rights to execute successfully.
However, through the use of Restricted SMH, SMH can be configured to
allow subsets of its capabilities to be used by non-privileged users.
When Restricted SMH is used, non-privileged users are promoted to priv‐
ileged users when necessary to enable them to execute successfully.
By default, Restricted SMH executes all applications as privileged
user. However, certain applications like software distributor have
their own security mechanism and do not follow the Restricted SMH secu‐
rity model. In such cases, the application launched through Restricted
SMH will be executed with the login id of the user who invokes it.
A non-privileged user that has been given Restricted SMH privileges
simply executes and sees only those areas the user is privileged to
All the SMH functional areas require the user to be promoted to be a
privileged user in order to execute successfully. SMH does this auto‐
matically as needed.
SMH provides a default set of SMH functional areas that the system
administrator can assign to other users.
Restricted SMH does not apply to web-based GUI of HP SMH from HP-UX 11i
v3 release as HP SMH has its own roles. For more information, refer HP
SMH documentation available at http:/ /docs.hp.com and the HP SMH prod‐
uct online help system.
For information on logging, see samlog_viewer(1).
was developed by HP.
SEE ALSOsam(1M), samlog_viewer(1), ugweb(1M), evweb(9), fsweb(1M), secweb(1M),
ncweb(1M), hpsmh(1M), kcweb(1M), parmgr(1M), pdweb(1M), smhassist(1M),
smhstartconfig(1M), intro(7), cprop(1), HP SMH White Paper available at