From a2b71a0141763c20552bb45eeb4cb78c4b513118 Mon Sep 17 00:00:00 2001
From: bubulle
[global] - idmap backend = tdb - idmap uid = 1000000-1999999 - idmap gid = 1000000-1999999 + idmap domains = ALLDOMAINS + idmap config ALLDOMAINS:backend = ad + idmap config ALLDOMAINS:default = yes + idmap config ALLDOMAINS:range = 10000 - 300000000 - idmap config CORP : backend = ad - idmap config CORP : range = 1000-999999 -
The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar diff --git a/docs/htmldocs/manpages/idmap_adex.8.html b/docs/htmldocs/manpages/idmap_adex.8.html deleted file mode 100644 index 6952cd9890..0000000000 --- a/docs/htmldocs/manpages/idmap_adex.8.html +++ /dev/null @@ -1,44 +0,0 @@ -
idmap_adex — Samba's idmap_adex Backend for Winbind
- The idmap_adex plugin provides a way for Winbind to read - id mappings from an AD server that uses RFC2307 schema - extensions. This module implements both the idmap and nss_info - APIs and supports domain trustes as well as two-way cross - forest trusts. It is a read-only plugin requiring that the - administrator provide mappings in advance by adding the - POSIX attribute information to the users and groups objects - in AD. The most common means of doing this is using "Identity - Services for Unix" support on Windows 2003 R2 and later. -
- Note that you must add the uidNumber, gidNumber, and uid - attributes to the partial attribute set of the forest global - catalog servers. This can be done using the Active Directory Schema - Management MMC plugin (schmmgmt.dll). -
- The nss_info plugin supports reading the unixHomeDirectory, - gidNumber, loginShell, and uidNumber attributes from the user - object and the gidNumber attribute from the group object to - fill in information required by the libc getpwnam() and - getgrnam() family of functions. Group membership is filled in - according to the Windows group membership and not the - msSFU30PosixMember attribute. -
- Username aliases are implement by setting the uid attribute - on the user object. While group name aliases are implemented - by reading the displayname attribute from the group object. -
idmap_hash — Samba's idmap_hash Backend for Winbind
The idmap_hash plugin implements a hashing algorithm used - map SIDs for domain users and groups to a 31-bit uid and gid. - This plugin also implements the nss_info API and can be used - to support a local name mapping files if enabled via the - "winbind normlaize names" and "winbind nss info" - parameters in smb.conf. -
- Specifies the absolute path to the name mapping
- file used by the nss_info API. Entries in the file
- are of the form "unix name
- = qualified domain name
.
- Mapping of both user and group names is supported.
-
The following example utilizes the idmap_hash plugin for - the idmap and nss_info information. -
- [global] - idmap backend = hash - idmap uid = 1000-4000000000 - idmap gid = 1000-4000000000 - - winbind nss info = hash - winbind normalize names = yes - idmap_hash:name_map = /etc/samba/name_map.cfg -
- The follow sets of a LDAP configuration which uses two LDAP - directories, one for storing the ID mappings and one for retrieving - new IDs. +
+ Defines the available matching uid and gid range from which + winbindd can allocate for users and groups. If the parameter + is absent, Winbind fail over to use the "idmap uid" + and "idmap gid" options from smb.conf. +
+ The follow sets of a LDAP configuration which uses a slave server + running on localhost for fast fetching SID/gid/uid mappings, it + implies correct configuration of referrals. + The idmap alloc backend is pointed directly to the master to skip + the referral (and consequent reconnection to the master) that the + slave would return as allocation requires writing on the master.
[global] - idmap backend = ldap:ldap://localhost/ - idmap uid = 1000000-1999999 - idmap gid = 1000000-1999999 + idmap domains = ALLDOMAINS + idmap config ALLDOMAINS:default = yes + idmap config ALLDOMAINS:backend = ldap + idmap config ALLDOMAINS:ldap_base_dn = ou=idmap,dc=example,dc=com + idmap config ALLDOMAINS:ldap_url = ldap://localhost/ + idmap config ALLDOMAINS:range = 10000 - 50000 - idmap alloc backend = ldap - idmap alloc config : ldap_url = ldap://id-master/ - idmap alloc config : ldap_base_dn = ou=idmap,dc=example,dc=com + idmap alloc backend = ldap + idmap alloc config:ldap_base_dn = ou=idmap,dc=example,dc=com + idmap alloc config:ldap_url = ldap://master.example.com/ + idmap alloc config:range = 10000 - 50000
In order to use authentication against ldap servers you may need to provide a DN and a password. To avoid exposing the password in plain text in the configuration file we store it into a security store. The "net idmap " command is used to store a secret for the DN specified in a specific idmap domain. -
The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar diff --git a/docs/htmldocs/manpages/idmap_nss.8.html b/docs/htmldocs/manpages/idmap_nss.8.html index bd655990e6..c177691bf3 100644 --- a/docs/htmldocs/manpages/idmap_nss.8.html +++ b/docs/htmldocs/manpages/idmap_nss.8.html @@ -9,13 +9,18 @@ own domain while using allocation to create new mappings for trusted domains
[global] - idmap backend = tdb - idmap uid = 1000000-1999999 - idmap gid = 1000000-1999999 + idmap domains = SAMBA TRUSTEDDOMAINS - idmap config SAMBA : backend = nss - idmap config SAMBA : range = 1000-999999 -
+ idmap config SAMBA:backend = nss + idmap config SAMBA:readonly = yes + + idmap config TRUSTEDDOMAINS:default = yes + idmap config TRUSTEDDOMAINS:backend = tdb + idmap config TRUSTEDDOMAINS:range = 10000 - 50000 + + idmap alloc backend = tdb + idmap alloc config:range = 10000 - 50000 +
The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar diff --git a/docs/htmldocs/manpages/idmap_rid.8.html b/docs/htmldocs/manpages/idmap_rid.8.html index 1e76560df7..7495ee62a1 100644 --- a/docs/htmldocs/manpages/idmap_rid.8.html +++ b/docs/htmldocs/manpages/idmap_rid.8.html @@ -13,17 +13,18 @@ by default start at 1000 (512 hexadecimal), this means a good value for base_rid can be 1000 as the resulting ID is calculated this way: ID = RID - BASE_RID + LOW RANGE ID. -
- Use of this parameter is deprecated. -
This example shows how to configure 2 domains with idmap_rid
[global] - idmap backend = tdb - idmap uid = 1000000-1999999 - idmap gid = 1000000-1999999 + idmap domains = MAIN TRUSTED1 - idmap config TRUSTED : backend = rid - idmap config TRUSTED : range = 50000 - 99999 -
+ idmap config MAIN:backend = rid + idmap config MAIN:base_rid = 0 + idmap config MAIN:range = 10000 - 49999 + + idmap config TRUSTED1:backend = rid + idmap config TRUSTED1:base_rid = 1000 + idmap config TRUSTED1:range = 50000 - 99999 +
The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar diff --git a/docs/htmldocs/manpages/idmap_tdb.8.html b/docs/htmldocs/manpages/idmap_tdb.8.html index 933b2a020c..467bc00073 100644 --- a/docs/htmldocs/manpages/idmap_tdb.8.html +++ b/docs/htmldocs/manpages/idmap_tdb.8.html @@ -13,7 +13,19 @@ winbindd can allocate for users and groups. If the parameter is absent, Winbind fail over to use the "idmap uid" and "idmap gid" options from smb.conf. -
+ The following example is equivalent to the pre-3.0.25 default idmap + configuration using the "idmap backend = tdb" setting. +
+ [global] + idmap domains = ALLDOMAINS + idmap config ALLDOMAINS:default = yes + idmap config ALLDOMAINS:backend = tdb + idmap config ALLDOMAINS:range = 10000 - 50000 + + idmap alloc backend = tdb + idmap alloc config:range = 10000 - 50000 +
The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar diff --git a/docs/htmldocs/manpages/index.html b/docs/htmldocs/manpages/index.html index 600c284583..1447d6819d 100644 --- a/docs/htmldocs/manpages/index.html +++ b/docs/htmldocs/manpages/index.html @@ -3,8 +3,6 @@
list info about machines that respond to SMB name queries on a subnet
Samba's idmap_ad Backend for Winbind -
Samba's idmap_adex Backend for Winbind -
Samba's idmap_hash Backend for Winbind
Samba's idmap_ldap Backend for Winbind
Samba's idmap_nss Backend for Winbind
Samba's idmap_rid Backend for Winbind @@ -75,8 +73,6 @@
make a Samba share read only for a specified time period
Samba VFS recycle bin
Make a Samba share read only for a specified time period -
log Samba VFS read and write operations through a socket - to a helper application
EXPERIMENTAL module to store alternate data streams in a central directory. diff --git a/docs/htmldocs/manpages/net.8.html b/docs/htmldocs/manpages/net.8.html index a6b25bb896..94d7917bd1 100644 --- a/docs/htmldocs/manpages/net.8.html +++ b/docs/htmldocs/manpages/net.8.html @@ -167,20 +167,18 @@ user of the system can use this time to cancel the shutdown. announce the shutdown.
Print out sam database of remote server. You need to run this against the PDC, from a Samba machine joined as a BDC.
Export users, aliases and groups from remote server to local server. You need to run this against the PDC, from a Samba machine joined as a BDC. -
Print out status of machine account of the local machine in ADS.
Prints out quite some debug info. Aimed at developers, regular
-users should use NET ADS TESTJOIN
.
EXPRESSION
ATTRIBUTES...
Perform a raw LDAP search on a ADS server and dump the results. The expression is a standard LDAP search expression, and the attributes are a list of LDAP fields to show in the results.
Example: net ads search '(objectCategory=group)' sAMAccountName
-
DN
(attributes)
Perform a raw LDAP search on a ADS server and dump the results. The DN standard LDAP DN, and the attributes are a list of LDAP fields to show in the result. -
Example: net ads dn 'CN=administrator,CN=Users,DC=my,DC=domain' SAMAccountName
+
Example: net ads dn 'CN=administrator,CN=Users,DC=my,DC=domain' SAMAccountName
(Re)Create a BUILTIN group. Only a wellknown set of BUILTIN groups can be created with this command. This is the list of currently recognized group names: Administrators, @@ -190,78 +188,78 @@ compatible Access. This command requires a running Winbindd with idmap allocation properly configured. The group gid will be allocated out of the winbindd range. -
Create a LOCAL group (also known as Alias). This command requires a running Winbindd with idmap allocation properly configured. The group gid will be allocated out of the winbindd range. -
Map an existing Unix group and make it a Domain Group, the domain group will have the same name. -
Add a member to a Local group. The group can be specified only by name, the member can be specified by name or SID. -
Remove a member from a Local group. The group and the member must be specified by name. -
List the specified set of accounts by name. If verbose is specified, the rid and description is also provided for each account. -
Set the workstations a user account is allowed to log in from. -
Set or unset the "password must change" flag for a user account. -
Set a value for the account policy. Valid values can be: "forever", "never", "off", or a number. -
Only available if ldapsam:editposix is set and winbindd is running. Properly populates the ldap tree with the basic accounts (Administrator) and groups (Domain Users, Domain Admins, Domain Guests) on the ldap tree. -
Dumps the mappings contained in the local tdb file specified. This command is useful to dump only the mappings produced by the idmap_tdb backend. -
Store a secret for the specified domain, used primarily for domains that use idmap_ldap as a backend. In this case the secret is used as the password for the user DN used to bind to the ldap server. -
Starting with version 3.0.23, a Samba server now supports the ability for non-root users to add user defined shares to be exported using the "net usershare" commands.
@@ -290,7 +288,7 @@ can create user defined shares on demand using the commands below.
net usershare add sharename path [comment] [acl] [guest_ok=[y|n]] - to add or change a user defined share. |
net usershare delete sharename - to delete a user defined share. |
net usershare info [-l|--long] [wildcard sharename] - to print info about a user defined share. |
net usershare list [-l|--long] [wildcard sharename] - to list user defined shares. |
-
sharename
path
[comment]
[acl]
[guest_ok=[y|n]]
+
sharename
path
[comment]
[acl]
[guest_ok=[y|n]]
Add or replace a new user defined share, with name "sharename".
"path" specifies the absolute pathname on the system to be exported. @@ -327,11 +325,11 @@ sharename as the one you wish to modify and specify the new options you wish. The Samba smbd daemon notices user defined share modifications at connect time so will see the change immediately, there is no need to restart smbd on adding, deleting or changing a user defined share. -
sharename
Deletes the user defined share by name. The Samba smbd daemon immediately notices this change, although it will not disconnect any users currently connected to the deleted share. -
[-l|--long]
[wildcard sharename]
Get info on user defined shares owned by the current user matching the given pattern, or all users.
net usershare info on its own dumps out info on the user defined shares that were @@ -350,7 +348,7 @@ guest_ok=n And is a list of the current settings of the user defined share that can be modified by the "net usershare add" command. -
[-l|--long]
wildcard sharename
List all the user defined shares owned by the current user matching the given pattern, or all users.
net usershare list on its own list out the names of the user defined shares that were @@ -358,7 +356,7 @@ created by the current user, or restricts the list to share names that match the wildcard pattern ('*' matches one or more characters, '?' matches only one character). If the '-l' or '--long' option is also given, it includes the names of user defined shares created by other users. -
Starting with version 3.2.0, a Samba server can be configured by data stored in registry. This configuration data can be edited with the new "net conf" commands.
@@ -376,10 +374,10 @@ See the
+
Print the configuration data stored in the registry in a smb.conf-like format to
standard output.
-
This command imports configuration from a file in smb.conf format.
If a section encountered in the input file is present in registry,
its contents is replaced. Sections of registry configuration that have
@@ -389,30 +387,30 @@ Optionally, a section may be specified to restrict the effect of the
import command to that specific section. A test mode is enabled by specifying
the parameter "-T" on the commandline. In test mode, no changes are made to the
registry, and the resulting configuration is printed to standard output instead.
-
Show the definition of the share or section specified. It is valid to specify
"global" as sharename to retrieve the global configuration options from
registry.
- Create a new share definition in registry.
+ Create a new share definition in registry.
The sharename and path have to be given. The share name may
not be "global". Optionally, values for the very
common options "writeable", "guest ok" and a "comment" may be specified.
The same result may be obtained by a sequence of "net conf setparm"
commands.
-
Store a parameter in registry. The section may be global or a sharename.
The section is created if it does not exist yet.
-
Get the list of includes for the provided section (global or share).
Note that due to the nature of the registry database and the nature of include directives,
@@ -428,14 +426,14 @@ per share, and this list is evaluated after all the parameters of the share.
Further note that currently, only files can be included from registry
configuration. In the future, there will be the ability to include configuration
data from other registry keys.
-CONF LIST
CONF LIST
CONF IMPORT
[--test|-T]
filename
[section]
CONF SHOWSHARE
sharename
CONF ADDSHARE
sharename
path
[writeable={y|N}
[guest_ok={y|N}
[comment
]]] CONF ADDSHARE
sharename
path
[writeable={y|N}
[guest_ok={y|N}
[comment
]]] CONF SETPARM
section
parameter
value
CONF GETINCLUDES
section