IBM RELEASE 7.3 Computer Drive User Manual


 
Table of Contents
Chapter 1. HPSS 7.1 Configuration Overview.....................................................................................15
1.1. Introduction...................................................................................................................................15
1.2. Starting the SSM GUI for the First Time.......................................................................................15
1.3. HPSS Configuration Roadmap (New HPSS Sites)........................................................................15
1.4. Initial HPSS Startup Roadmap (All Sites).....................................................................................16
1.5. Additional Configuration Roadmap (All Sites).............................................................................17
1.6. Verification Checklists (All Sites).................................................................................................17
1.6.1. Configuration Checklists.........................................................................................................................17
1.6.2. Operational Checklists.............................................................................................................................19
1.6.3. Performance Checklist.............................................................................................................................20
Chapter 2. Security and System Access................................................................................................21
2.1. Security Services...........................................................................................................................21
2.1.1. Security Services Configuration..............................................................................................................21
2.1.2. Security Mechanisms...............................................................................................................................22
2.1.2.1. UNIX...............................................................................................................................................22
2.1.2.2. Kerberos 5.......................................................................................................................................22
2.1.2.3. LDAP..............................................................................................................................................23
2.1.2.3.1. LDAP Administrative Tasks..................................................................................................23
2.2. HPSS Server Security ACLs..........................................................................................................25
2.3. SSM User Security........................................................................................................................26
2.4. Location Policy..............................................................................................................................26
2.4.1. Configuring/Updating a Location Policy.................................................................................................27
2.4.2. Location Policy Configuration Window..................................................................................................27
2.4.3. Deleting a Location Policy......................................................................................................................28
2.5. Restricting user access to HPSS. ..................................................................................................28
2.5.1. Restricted Users Window........................................................................................................................29
Chapter 3. Using SSM............................................................................................................................31
3.1. The SSM System Manager............................................................................................................31
3.1.1. Starting the SSM System Manager..........................................................................................................31
3.1.2. Tuning the System Manager RPC Thread Pool and Request Queue Sizes.............................................31
3.1.3. Labeling the System Manager RPC Program Number ...........................................................................32
3.2. Quick Startup of hpssgui...............................................................................................................33
3.3. Configuration and Startup of hpssgui and hpssadm.......................................................................34
3.3.1. Configuring the System Manager Authentication for SSM Clients.........................................................35
3.3.2. Creating the SSM User Accounts............................................................................................................35
3.3.2.1. The hpssuser Utility........................................................................................................................35
3.3.2.2. SSM User Authorization.................................................................................................................36
3.3.2.3. User Keytabs (For Use with hpssadm Only)...................................................................................37
3.3.2.3.1. Keytabs for Kerberos Authentication: hpss_krb5_keytab......................................................38
3.3.2.3.2. Keytabs for UNIX Authentication: hpss_unix_keytab...........................................................38
3.3.3. SSM Configuration File...........................................................................................................................39
HPSS Management Guide November 2009
Release 7.3 (Revision 1.0) 3