search for: testgroups

Displaying 20 results from an estimated 113 matches for "testgroups".

Did you mean: testgroup
2024 Jan 30
2
Behavior of acl_xattr:ignore system acls = yes on a share
Hi folks, It seems that the setting acl_xattr:ignore system acls = yes reduces Windows compatibility when defined for a share. In all attempts I have used Windows tools (except editing smb.conf) Assume there is a share, where the files and folders in the share root should at least be readable by anybody having access to the share. For the sake of simplicity the following permissions apply on
2024 Jan 31
1
Behavior of acl_xattr:ignore system acls = yes on a share
Does you filesystem support extended attributes? What does "|getfattr -n security.NTACL |filename" return?|| On 30.01.2024 16:13, Peter Milesson wrote: > Hi folks, > > It seems that the setting acl_xattr:ignore system acls = yes reduces > Windows compatibility when defined for a share. In all attempts I have > used Windows tools (except editing smb.conf) > > Assume
2019 Aug 21
3
winbind on DC : how use gidNumber instead of primaryGroupID as user's primary group
Le mar. 20 ao?t 2019 ? 14:30, L.P.H. van Belle via samba <samba at lists.samba.org> a ?crit : > > Hai, > > > > > In short. My network design previously work with Debian Stretch > > Servers and clients and some Windows clients (not many). > > > > Debian Stretch use Samba 4.5.16 so there is no unix_primary_group > > option for the clients. So I have
2007 Sep 10
0
User not permitted to access this share
Hi, I have two samba domains. On one member of DOMAIN1 I set up a share "intranet" with valid users = +"DOMAIN1+webmaster" +"DOMAIN2+TestGroup" Winbindd is running. When I try to access the share from a DOMAIN2 workstation permission is denied. When I look at the logfile, I see that the server tries to find the group of DOMAIN2 (TestGroup) in ldap of the local
2019 Aug 20
0
winbind on DC : how use gidNumber instead of primaryGroupID as user's primary group
Hai, > > In short. My network design previously work with Debian Stretch > Servers and clients and some Windows clients (not many). > > Debian Stretch use Samba 4.5.16 so there is no unix_primary_group > option for the clients. So I have to use the "dirty" tweak of > modifying all my users "primaryGroupID" to the corresponding >
2008 Aug 31
2
LVM and hotswap (USB/iSCSI) devices?
Hi list, I'm having one of those 'I'm stupid' -problems with LVM on CentOS 5.2. I've been working with traditional partitions until now, but I've finally been sold on the theoretical benefits of using LVM, but for now I only have a huge pile of broken filesystems to show for my efforts. My scenario; I attach a disk, either over USB or iSCSI. I create a PV on this
2007 Sep 11
4
Questions about the new idmap interface
Hi, I tried to configure the new idmap interface. Currently without much success. I have two samba domains, trusting each other. Each PDC using it's own LDAP server. I tried idmap domains = DOM1, DOM2 idmap config DOM1:default = yes idmap config DOM1:backend = ldap idmap config DOM1:ldap_base_dn = ou=Idmap,dc=dom1,dc=mydomain,dc=de idmap config
2019 Aug 21
2
winbind on DC : how use gidNumber instead of primaryGroupID as user's primary group
Le mer. 21 ao?t 2019 ? 14:34, Rowland penny via samba <samba at lists.samba.org> a ?crit : > On 21/08/2019 09:04, Prunk Dump via samba wrote: > > Le mar. 20 ao?t 2019 ? 14:30, L.P.H. van Belle via samba > > <samba at lists.samba.org> a ?crit : > >> Hai, > >> > >>> In short. My network design previously work with Debian Stretch >
2019 Aug 20
4
winbind on DC : how use gidNumber instead of primaryGroupID as user's primary group
On 20/08/2019 11:16, L.P.H. van Belle via samba wrote >> The problem with that is, 'id' gets its info from the same place that >> 'getent' does, so the OP will still get the wrong group ;-) >> >> Rowland > Maybe i did not understand the question then. > In: id username |awk -F"=" '{ print $2 }'|cut -d"(" -f1 > $2 = GID
2019 Aug 21
0
winbind on DC : how use gidNumber instead of primaryGroupID as user's primary group
On 21/08/2019 09:04, Prunk Dump via samba wrote: > Le mar. 20 ao?t 2019 ? 14:30, L.P.H. van Belle via samba > <samba at lists.samba.org> a ?crit : >> Hai, >> >>> In short. My network design previously work with Debian Stretch >>> Servers and clients and some Windows clients (not many). >>> >>> Debian Stretch use Samba 4.5.16 so there is
2014 Apr 10
3
centos 6.5 sernet-samba 4.1.6 member server winbind idmap fail
Hi everybody, I've searched deeply into the samba wiki and the list for some working examples, but I cannot find my way out, I'm a kind of rough samba user (let's say almost newbie).. so asking help here: This is my setup: DC (samba.my.domain.com <http://samba.my.domain.com/>): CentOS 6.5 with sernet-samba 4.1.6 started in "ad" mode (upgraded successfully from
2020 Aug 24
0
Set/Restrict Owner Rights for OU-Admin
Hello everyone, we are in the process of changing from a Windows Domain to a Samba Domain and tried to implement some restrictions for OU-Admins. In the Windows Domain those restrictions can be implemented with Security ID: S-1-3-4 (Owner Rights). In our old Windows Domain everything works fine and as expected. In our Samba Domain, it doesnt work. We tried to implement the same rights as in
2019 Aug 22
1
winbind on DC : how use gidNumber instead of primaryGroupID as user's primary group
Le mer. 21 ao?t 2019 ? 17:04, Rowland penny via samba <samba at lists.samba.org> a ?crit : > > On 21/08/2019 15:14, Prunk Dump via samba wrote: > > Le mer. 21 ao?t 2019 ? 14:34, Rowland penny via samba <samba at lists.samba.org> > > a ?crit : > > > >> On 21/08/2019 09:04, Prunk Dump via samba wrote: > >>> Le mar. 20 ao?t 2019 ? 14:30, L.P.H.
2009 May 10
2
LDAP - valid users = @group
Hello, I have a strange problem with Samba and LDAP backend with the statement valid users = @group. The valid users = @username works great, but the @group oder +group statement does not work. But the users in the @group does never get access to the shares! I'm using Samba 3.2.5-4 on Debian Lenny the LDAP server is located at an Debian Etch system. But this ldap server works quite good.
2012 Dec 07
1
Samba Permissions
Hi, I have a case where I only want to restrict access to SMB shares via filesystem permissions (and POSIX ACLs). Therefore, I do not want Samba to verify security in any way at the SMB level. If the filesystem/ACL permissions allow access to the shared directory, so should Samba. If the filesystem does not allow access to the filesystem, Samba should deny as well. I thought I had this
2019 Aug 21
0
winbind on DC : how use gidNumber instead of primaryGroupID as user's primary group
On 21/08/2019 15:14, Prunk Dump via samba wrote: > Le mer. 21 ao?t 2019 ? 14:34, Rowland penny via samba <samba at lists.samba.org> > a ?crit : > >> On 21/08/2019 09:04, Prunk Dump via samba wrote: >>> Le mar. 20 ao?t 2019 ? 14:30, L.P.H. van Belle via samba >>> <samba at lists.samba.org> a ?crit : >>>> Hai, >>>>
2019 Feb 11
3
visibility of groups when multiple Samba servers use the same LDAP server
Hi, we are using a _single_ LDAP server as backend for _multiple_ Samba standalone file servers (security=user). This LDAP server serves mainly other purposes and access for Samba is read only so the situation is not optimal but "it works for us". Still I don't understand one phenomenon concerning visibility of LDAP groups. The LDAP configuration in smb.conf for all our Samba
2019 Feb 11
2
visibility of groups when multiple Samba servers use the same LDAP server
Am 11.02.19 um 13:22 schrieb Rowland Penny via samba: > On Mon, 11 Feb 2019 12:30:51 +0100 > Matthias Leopold via samba <samba at lists.samba.org> wrote: > >> Hi, >> >> we are using a _single_ LDAP server as backend for _multiple_ Samba >> standalone file servers (security=user). This LDAP server serves >> mainly other purposes and access for Samba is
2004 Sep 07
1
Problems with 'ntlm_auth --require-membership-of' using Samba 3.0.6
Hi there, I'm trying to configure Squid to use a windows domain for authentication, and all goes well until I add the "--require-membership-of" option on ntlm_auth. I need to restrict access based on group membership, however ntlm_auth does not seem to be behaving correctly. I'm using Samba 3.0.6 on Debian and I'm using a Windows 2000 (SP4) Domain Controller. I
2005 Nov 14
4
Using group membership to access a symlink directory
I am having a problem getting Samba to use the linux group membership when following a symlink. On the Linux side, I have a soft link from the user's home directory to the shared directory. ln -s /home/shared/testgroup testshare In the smb.conf I have: [homes] comment = Home Directories browseable = no writable = yes valid users = %S force create mode = 0660 delete