similar to: maintaining samba uid and gid in nt to ad migration

Displaying 20 results from an estimated 20000 matches similar to: "maintaining samba uid and gid in nt to ad migration"

2007 Aug 06
1
setfacl(1) - Can FreeBSD's ACLs contain groups from NT/AD domains ?
Hi all, I have "FreeBSD 7.0-CURRENT #1: Wed Jul 25" authenticating successfully against active directory via samba's winbindd(8). I need to manage samba shares via FreeBSD ACLs and CIFS ACLs. From my reading of setfacl(1) I should be able to set group permissions using the syntax of DOMAIN\group-name. For example: #setfacl -d -m g:"MYDOMAIN\mygroupname":rwx test
2005 Apr 20
3
gid and uid
hi! I'm studing samba as PDC (with ldap backend) and I would know: - gid and uid are useful in samba? in other words: if pdc admin knows users' uids, he can recovery some wrong situations ? Example: if a user was cancelled and then readded, if his uid changes implies some troubles with shared files? NT mantains, after deletion, association between shared file and uid user and so if
2019 Jul 03
4
cannot set filesystem permissions on shares
> > On the file serever: > > Collected config --- 2019-07-03-10:27 ----------- > > > > Hostname: srv > > DNS Domain: a.b.hu > > FQDN: srv.a.b.hu > > ipaddress: 10.0.3.15 192.168.0.8 > > ----------- > > Samba is running as a Unix domain member > > ----------- > > > > This computer is running Debian 10.0 x86_64 > >
2010 May 18
3
[PATCH] btrfs: should add a permission check for setfacl
On btrfs, do the following ------------------ # su user1 # cd btrfs-part/ # touch aaa # getfacl aaa # file: aaa # owner: user1 # group: user1 user::rw- group::rw- other::r-- # su user2 # cd btrfs-part/ # setfacl -m u::rwx aaa # getfacl aaa # file: aaa # owner: user1 # group: user1 user::rwx <- successed to setfacl group::rw- other::r-- ------------------ but we
2019 Feb 19
2
Computer Management - Share Security - No Read Access
On 2019-02-19 3:47 pm, Rowland Penny via samba wrote: > On Tue, 19 Feb 2019 15:25:51 -0500 >> What exactly does "START AGAIN" imply? Just chmod? > > 'ls' shows the correct ownership and Unix permissions: > > drwxrwx---+ 4 root domain admins 4096 Feb 17 19:13 programs > > But 'getfacl' show something different: > > getfacl:
2007 Sep 20
2
acl permissions not staying
Hi guys, I've got a problem where if I set permissions on a folder(Admin) "setfacl -R -d -m u::rwx,g::wrx,o::- Admin/" and "setfacl -m o:- Admin" I get the following. mail:/data/samba/shared # getfacl Admin/ # file: Admin # owner: BCP+administrator # group: samba user::rwx user:samba:rwx group::rwx group:BCP+admin:r-x mask::rwx other::--- default:user::rwx
2011 Sep 14
3
copy acls with getfacl / setfalc - invalid argument ....
I hav a problem porting my ACLS from my old filserver to a new one... My old Fileserver: I have my shares on a partition supporting acls with ext3 /dev/md0 on /data/raid type ext3 (rw,acl,user_xattr) My new Fileserver: /dev/md0 on /data/raid type ext4 (rw,acl,user_xattr) Now I copied all my shares to the new Fileserver with rsync and backed up my acls with: getfacl -R
2015 Jun 11
2
using the DC as a file Server in AD
Am 10.06.2015 um 03:25 schrieb Mike: > I'm learning to be very deliberate with changing posix and windows acl's so > I don't disturb users' access to files and folders. > I check acl's on a specific file/folder on the server with getfacl. > Then make one small acl modification to one file in a sub-directory of a > share. > Then record the difference reported
2007 Dec 19
3
Problem with ACL and Samba
Dear All I am facing a strange problem that I could not solve, so, maybe you can help me. Look at this situation: I created a new directory with those ACLs (through Samba using Windows XP) [root@server /home/smb/adm]# getfacl teste #file:teste #owner:1002 #group:1006 user::rwx group::rwx group:suporte:rwx group:administ:rwx mask::rwx other::--- [root@server /home/smb/adm]# getfacl -d teste
2018 Mar 25
2
Is it possible to clone an NT ACL from one file or dir to a totally different file or dir ?
Can I use a command like this to clone an NT ACL? getfattr -n security.NTACL templateFile | sed -e 's/templateFile/realFile/' | sudo setfattr --restore=- I can see that the attribute gets copied over but when I view the ACL in Windows security tab it's not the same ACL, it's much bigger and includes all kinds of default-like stuff. I'm trying to find a way to update
2003 May 20
1
readonly files get un-erasable from win nt clients #REPOST
Hi I posted this last week but go no answers. So I try again in case someone has any idea... I have a file server (linux with acl and quotas custom 2.4.18 kernel, samba 2.2.7a with acl, quotas and winbind) among others there's a share on which any user of the domain is allowed to put files, any user able to read and write other users' files (a public and free space) the problem is that
2018 Nov 30
3
Fw: AD usres are not show in Domain Controller when apply setfacl command
On Fri, 30 Nov 2018 09:06:34 +0000 Rowland Penny via samba <samba at lists.samba.org> wrote: > On Fri, 30 Nov 2018 06:16:42 +0000 (UTC) > barani tharan <aru_barani at yahoo.com> wrote: > > > Dear Rowland Penny > >  I follow your mentioned step still i am face the same problem > > I have 1 Domain Controller [sambadc] and 1 Domain member for Samba > >
2017 Jun 13
5
Retaining Permissions on a share
Hi Rowland, Thank you for the reply and info. On Tue, Jun 13, 2017 at 11:19 AM, Rowland Penny <rpenny at samba.org> wrote: > On Tue, 13 Jun 2017 09:15:40 +0200 > Neil via samba <samba at lists.samba.org> wrote: > > > OK, this a DC and therefore you will have to do things differently from > a Unix domain member. > > You might as well remove these lines from
2013 May 03
1
State of Gluster 3.4 alpha 3 NFS ACL support
Wonder if someone can point me in the right direction here - just built some new bricks running gluster 3.4 alpha 3 (from http://download.gluster.org) with the objective of testing them to replace some existing 3.2 systems in production. The main thing I was after was NFS ACL support, however on getting everything setup, I still don't seem to be able to see POSIX extended ACLs on the
2018 Aug 01
2
Samba share migration - looking for advices
Hello everyone, I plan to change an old samba share (SMB1) configured on an Samba PDC "old NT4 Style" server. For that plan, I choose to migrate domain from the old NT4 domain to on Microsoft Active Directory (Windows 2012 R2) set with posix attributes rfc2307, and then change the old Samba share with a new linux box (centos 7) with winbind, sssd configured against Microsoft AD. At
2019 Jul 23
2
errors restoring samba
> Jul 22 14:39:39 dc1 named[27846]: samba_dlz: Failed to connect to > /var/lib/samba/private/dns/sam.ldb The good news is I believe I've found the problem: RUNNING: # file: samba/private # owner: root # group: root user::rwx group::r-x group:bind:r-x mask::r-x other::--- RESTORE: # file: samba/private # owner: root # group: root user::rwx group::r-x other::--- The bad news is
2020 May 14
2
Default ACL inheritance question
A bit of a minor off-topic issue, but on the off-chance that someone understands how ACLs work ... I've been trying to see if using default ACLs would help with the following issue: I have a third party application that is running as a non-root user ('user-a') and creating log files with mode 0600 (read/write only to the owner) in a log directory I have another application that
2013 Mar 03
1
Samba4 as domain member and file server
Hi guys, I'm having trouble setting up my file server running Samba 4 (4.0.3). I had no problem joining the domain (also a Samba 4 (4.0.3) with AD) but I can't get the ACL to work properly. I'm sure my settings are wrong and hoping for some help. When I try to set a user permission I get this error: setfacl -m u:administrator:rwx test3.txt setfacl: test3.txt: Malformed access ACL
2019 Feb 19
2
Computer Management - Share Security - No Read Access
On 2019-02-19 3:05 pm, Rowland Penny via samba wrote: > On Tue, 19 Feb 2019 14:44:05 -0500 > Marco Shmerykowsky <marco at sce-engineers.com> wrote: > >> >> >> # user administrator workaround >> >> username map = /etc/samba/user.map >> > >> > Just to check, what is in the user.map ? >> >> root at
2007 Feb 15
4
Using setfacl to control access to /dev/kqemu
Solaris 10U3, latest kqemu, qemu-0.9.0-CVS plus TAP patch. I''m aware that a fair amount of "rootish" access is required for the TAP and bridge stuff, and I''m working on that. As kind of a secuirty thought, I figured I''d use setfacl to give myself access to the /dev/kqemu device instead of leaving it mode 664 or 666. However, that didn''t work.