Jump to content United States-English
HP.com Home Products and Services Support and Drivers Solutions How to Buy
» Contact HP
More options
HP.com home
HP-UX Reference > S


HP-UX 11i Version 3: February 2007

Technical documentation

» Feedback
Content starts here

 » Table of Contents

 » Index


smh — HP System Management Homepage (HP SMH)


/usr/sbin/smh [ -F | -w | -r ]


The smh command launches HP System Management Homepage (HP SMH) for performing system administration on an HP-UX system. HP SMH is an enhanced version of HP System Administration Manager (HP SAM). HP SMH provides web-based graphical user interface (GUI), terminal user interface (TUI), and command line interface (CLI).

You can access these interfaces using the smh command. However you can also use the sam command which behaves the same as smh command except that the deprecation message is displayed in the beginning. For more information on HP SAM, refer to the sam(1M) manpage.

When you run either the smh command or the sam command and if the DISPLAY environment variable is set, HP SMH opens in the default web browser. If the DISPLAY environment variable is not set, HP SMH opens in the terminal user interface (TUI).


smh recognizes the following options.


Launches HP SMH on a web browser without security warnings.


Launches HP SMH on a web browser with security warnings.


The -r option applies only to the TUI of HP SMH. This option invokes Restricted SMH which, enables the system administrator to assign limited privileged user access to SMH functionality. You must be a privileged user to use this option. See the Restricted SMH section below for more information.

Restricted SMH

SMH can be configured to provide a subset of its functionality to certain users or groups of users. This is done through Restricted SMH. System administrators access Restricted SMH by invoking SMH with the -r option (see Options above). In Restricted SMH, system administrators may assign subsets of SMH functionality on a per-user or per-group basis.

Generally, SMH requires privileged user rights to execute successfully. However, through the use of Restricted SMH, SMH can be configured to allow subsets of its capabilities to be used by non-privileged users. When Restricted SMH is used, non-privileged users are promoted to privileged users when necessary to enable them to execute successfully.

By default, Restricted SMH executes all applications as privileged user. However, certain applications like software distributor have their own security mechanism (swacl) and do not follow the Restricted SMH security model. In such cases, the application launched through Restricted SMH will be executed with the login id of the user who invokes it.

A non-privileged user that has been given Restricted SMH privileges simply executes /usr/sbin/smh and sees only those areas the user is privileged to access.

All the SMH functional areas require the user to be promoted to be a privileged user in order to execute successfully. SMH does this automatically as needed.

SMH provides a default set of SMH functional areas that the system administrator can assign to other users.

Restricted SMH does not apply to web-based GUI of HP SMH from HP-UX 11i V3 release as HP SMH has its own roles. For more information, refer HP SMH documentation available at http://docs.hp.com and the HP SMH product online help system.


For more information on logging, see samlog_viewer(1).


smh was developed by HP.


samlog_viewer(1), fsweb(1M), hpsmh(1M), kcweb(1M), ncweb(1M), parmgr(1M), pdweb(1M), sam(1M), secweb(1M), smhstartconfig(1M), ugweb(1M), intro(7), evweb(9).

HP SMH White Paper available on http://www.docs.hp.com.

Printable version
Privacy statement Using this site means you accept its terms Feedback to webmaster
© 1983-2007 Hewlett-Packard Development Company, L.P.