
Compare Table 
Table 3-2  Example of Authorizations Per Role
| Operation Component of Authorization | Role | 
 | 
 | 
 | 
| 
 | UserAdmin | NetworkAdmin | BackupOper | Admin | 
| hpux.user.add | • | 
 | 
 | • | 
| hpux.user.delete | • | 
 | 
 | • | 
| hpux.user.modify | • | 
 | 
 | • | 
| hpux.user.password.modify | 
 | 
 | 
 | • | 
| hpux.network.nfs.start | 
 | • | 
 | • | 
| hpux.network.nfs.stop | 
 | • | 
 | • | 
| hpux.network.nfs.config | 
 | • | 
 | • | 
| hpux.fs.backup | 
 | 
 | • | • | 
| hpux.fs.restore | 
 | 
 | • | • | 
NOTE: Table 
NOTE: 
HP-UX  RBAC Components
The following is a list of the primary 
Privilege shells (privsh, privksh, and privcsh) that allow a 
Integration with HP System Management Homepage (SMH), allowing for the management of local RBAC roles, authorizations, and commands through the Web interface of SMH Version 2.2 and higher.
Based on authorizations associated with a user, privrun invokes existing legacy applications with privileges after performing authorization checks and optionally 
Based on the authorizations associated with a user, privedit allows users to edit files they usually would not be able to edit because of file permissions or Access Control Lists (ACL).