UNIX/Linux commands are passed to the Command Control through scripts, commands, or replacement shells, using the methods described in Section 5.2, Integrating Command Control into User Environments.
When a command is received, Command Control uses the following to evaluate the command:
The command is validated against configured rule criteria such as submit user, submit host, run host requested, date/time, and the command name itself.
Any Perl scripts associated with the rules are executed, such as setting environment variables.
If the evaluation authorizes the command to run:
The command is executed on the requested run host unless a matching rule specifies a run host. When a rule specifies a run host, the command is executed on that host. Rule values always overwrite values in the command request.
The command is executed as the requested run user unless a matching rule specifies a run user. When a rule specifies a run user, the command is executed as that user. Rule values always overwrite values in the command request.
If the evaluation returns unauthorized, the command is not executed and the reason for the failure is returned.