search for: setting_up_a_share_using_

Displaying 4 results from an estimated 4 matches for "setting_up_a_share_using_".

2017 May 30
2
member domain idmap config ad/rid
...t the group on the share on the Unix > domain member to Domain Admins i.e. > chown root:Domain\ Admins /mnt/dados > > You will also need to give Domain Admins the rights to make changes on > the Unix domain member (aka fileserver), see here: > > https://wiki.samba.org/index.php/Setting_up_a_Share_Using_ > Windows_ACLs#Granting_the_SeDiskOperatorPrivilege_Privilege > > If you are logging in as Administrator, it should just work, this is > because Administrator is mapped to root. > > Rowland > > -- > To unsubscribe from this list go to the following URL and read the > i...
2017 May 30
2
member domain idmap config ad/rid
> > Yes, you have got it wrong ;-) :( If you do not want to add anything to AD, then you use the 'rid' > backend and 'ID' numbers will be calculated for you. You will also have > to place 'template' shell & homedir lines in smb.conf > If you want/need some of your users to have different login shells or > home directories, you will need to use the
2017 Aug 17
1
Retaining Permissions on a share
...gt; > > > > [HR] > > > > > path = /var/lib/samba/data/data/HR > > > > > read only = No > > > > > > > > > > Now go and read this: > > > > > > > > > > https://wiki.samba.org/index.php/Setting_up_a_Share_Using_ > Windows_ACLs > > > > > > > > > > You must use Windows ACLs on a DC. > > > > > > > > > > > > > Thanks I've cleaned up the smb.conf (and HR share) and had a full > > > > read again, but I'm still not sure ho...
2017 Jun 13
2
Retaining Permissions on a share
...; You should also make the [HR] share look like this: > > > > > > [HR] > > > path = /var/lib/samba/data/data/HR > > > read only = No > > > > > > Now go and read this: > > > > > > https://wiki.samba.org/index.php/Setting_up_a_Share_Using_Windows_ACLs > > > > > > You must use Windows ACLs on a DC. > > > > > > > Thanks I've cleaned up the smb.conf (and HR share) and had a full read > > again, but I'm still not sure how this will prevent users from > > becoming owner (shows usi...