Public key infrastructure, Realm, Principals – HP System Management Homepage-Software User Manual
Page 90: Multihomed
ticket. The session key for the TGT is encrypted using the user's long-term key, so the password
is needed to decrypt it from the AS' response to the user.
Kernel
Configuration tool
(kcweb)
The HP-UX Kernel Configuration (kcweb) tool is used to manage kernel tunables, modules and
alarms. The Kernel Configuration tool can be launched from the HP-UX System Administration
Manager (SAM) tool or from HP SMH
MIT
Massachusetts Institute of Technology.
multihomed
Multiple names set to a certificate.
parMgr
See Partition Manager.
Partition Manager
(parMgr)
Provides system administrators with a convenient GUI to configure and manage nPartitions on
HP server systems. Perform complex configuration tasks without having to remember commands
and parameters. Select nPartitions, cells, I/O chassis, or other components from the graphical
display, then select an action from a menu. You can use Partition Manager to perform the following
tasks: create, modify, and delete nPartitions; examine the nPartition configuration of a complex,
check the complex for potential configuration and hardware problems, and manage hardware
resources on the complex.
NOTE:
At this time, HP System Management Homepage does not support Partition Manager.
pdweb
See Peripheral Device tool.
Peripheral Device
tool (pdweb)
The HP-UX Peripheral Device (pdweb) tool can be used to easily and quickly view I/O devices
and OLRAD cards. It helps manage hot pluggable PCI slots on systems that support adding and
replacing cards without rebooting. On all HP-UX systems, pdweb displays the I/O devices and
can be used to (re)create device files for a selected device. The Peripheral Device tool can be
launched the HP-UX System Administration Manager (SAM) tool or from HP SMH.
PKI
See Public Key Infrastructure.
Principal
Users or service / host which are present in a Kerberos realm and are allowed to authenticate
to each other.
ProLiant or
Integrity Support
Pack
A set of HP software components that have been bundled together by HP, and verified to work
with a particular operating system. A ProLiant or Integrity Support Pack contains driver components,
agent components, and application and utility components. All of these are verified to install
together.
Public Key
Infrastructure (PKI)
Public Key Infrastructure is the combination of software, encryption technologies, and services
that enables enterprises to protect the security of their communications and business transactions
on the Internet.
Realm
Kerberos domain. Usually, it is the network's domain name in capital letters. For example, the
Kerberos realm for the smhkerberos.com would conventionally be called SMHKERBEROS.COM.
Red Hat Package
Manager (RPM)
The Red Hat Package Manager is a powerful package manager that can be used to build, install,
query, verify, update, and uninstall individual software packages. A package consists of an
archive of files and package information, including name, version, and description.
repository
The database that stores vital information about the managed cluster, including users, nodes,
node groups, roles, tools, and authorizations.
RPM
See Red Hat Package Manager.
SAM
See HP-UX System Administration Manager.
search criteria
A set of variables (information) used to define a requested subset of information from the set of
all information. The information set that can be filtered includes action information, some of the
system's information, and so on. A filter is composed of an permitted filter followed by a restricted
filter. The result of these two filtering operations is called a group. An example of a filter is a SQL
statement that creates viewable information or causes management operations to be performed.
Secure HTTP
(HTTPS)
An extension to the HTTP protocol that supports sending data securely over the Web.
Secure Shell (SSH)
A program that enables you to sign in to another system over a network and execute commands
on that system. It also enables you to move files from one system to another, and it provides
authentication and secure communications over insecure channels.
90
Glossary