similar to: Resolving computeraccount$

Displaying 20 results from an estimated 900 matches similar to: "Resolving computeraccount$"

2015 May 12
2
preexec and msdfs proxy
On 12/05/15 20:27, Greg Enlow wrote: > To the powers the might be, > > it seems that the "(root) preexec" function does not work when used with "msdfs proxy". Is that just "my" problem, an error or by design? > If it is by design, I would be curious to know why. > If it is an error, can it be addressed fairly quickly? > If it is none of the above,
2015 May 16
2
preexec and msdfs proxy
Hi, I was wondering if someone had any thoughts as to why "preexec" doesn't fire when "msdfs proxy" is used? Thank you, Greg Enlow -- Greg Enlow grenlow at hk.mailbox.de On 13 May 2015, at 11:18, Greg Enlow wrote: ok ok ... Names have been changed to protect the inoccent. This installation is being used to mitigate a server migration by providing read-only access
2015 May 18
2
preexec and msdfs proxy
On 18/05/15 07:36, Daniel M?ller wrote: > Msdfs proxy is pointing to another instance of samba servers, it passes > through. > I think running preexec there on the other instance will do the trick. > > Greetings > Daniel > > > EDV Daniel M?ller > > Leitung EDV > Tropenklinik Paul-Lechler-Krankenhaus > Paul-Lechler-Str. 24 > 72076 T?bingen > Tel.:
2015 May 19
4
preexec and msdfs proxy
Hi, Thank you for you input! We tried that already. That, however, doesn't do the same thing. It is then simply a DFS server and not the "magical" msdfs proxy - yes the user can now click on a link to get to the desired spot, but the proxy function _automagically_ sends the user, when they access the msdfs share, to the netapp's readonly share without the extra click. And it
2015 May 18
5
preexec and msdfs proxy
On Mon, May 18, 2015 at 03:31:55PM +0200, Greg Enlow wrote: > Hi, > > The Server to which the msdfs is pointing is a netapp. Though we theoretically can access the shell on it then begin to mess around there, we would really like to avoid that. Warranty and such make it a bit of a legal issue. That is the reason we went with a separate instance in the first place and now wonder why the
2015 May 21
1
preexec and msdfs proxy
Hey, thanks for the input! I am looking into that. It is however a bit complicated due to the authentication lines and share connect lines being only related due to proximity in the log. It would probably work for most of the instances, but it would not be 100% viable, meaning we would be getting compaints and questions from our user "I ain't got that share?! WTF!!" I was going to
2015 May 28
2
preexec and msdfs proxy
One more time: root preexec does: run a command or script if the user hit the share. Now with msdfs proxy it need to be run on the linked host that carries the share. So you are better to set root preexec on the share of the linked host. I think there is no other way. Server1 [sharepointtoserver2] msdfs root=yes msdfs proxy =\server2\shareonserver2 Server2 [shareonserver2] Root
2015 May 18
0
preexec and msdfs proxy
Hi, The Server to which the msdfs is pointing is a netapp. Though we theoretically can access the shell on it then begin to mess around there, we would really like to avoid that. Warranty and such make it a bit of a legal issue. That is the reason we went with a separate instance in the first place and now wonder why the preexec doesn't fire. There is nothing in tmp of the msdfs box. Like
2015 May 18
0
preexec and msdfs proxy
Msdfs proxy is pointing to another instance of samba servers, it passes through. I think running preexec there on the other instance will do the trick. Greetings Daniel EDV Daniel M?ller Leitung EDV Tropenklinik Paul-Lechler-Krankenhaus Paul-Lechler-Str. 24 72076 T?bingen Tel.: 07071/206-463, Fax: 07071/206-499 eMail: mueller at tropenklinik.de Internet: www.tropenklinik.de
2015 May 13
0
preexec and msdfs proxy
ok ok ... Names have been changed to protect the inoccent. This installation is being used to mitigate a server migration by providing read-only access to the new shares under the old server name. We have duplicated all the current shares on the new server (NETAPP) as {share name}_ro and created equivalent shares on the SAMBA installation as DFS proxies that point the client to that read-only
2015 May 21
0
preexec and msdfs proxy
Well, this doesn't fix the preexec issue, but you might scan through the samba logs finding connections to the RO share, identify that IP address there, track back to Hostname and/or user who authenticated to that share and the use that as the basis for the email address. On Tue, May 19, 2015 at 12:38 PM, Greg Enlow <grenlow at hk.mailbox.de> wrote: > Hi, > > Thank you for you
2015 May 28
0
preexec and msdfs proxy
Good Morning and thank you for your input. I had and still do understand what both preexec and root preexec do. I had also and still do understand the paths you had explained. I, however, had also already explained on 18 May 2015 15:31:55 CEST why your first solution was _not_ a viable option for us (server2 == NETAPP under warranty). I had also already explained on 21 May 2015 22:41:17 CEST
2015 May 27
0
preexec and msdfs proxy
Hi all, I was going to ask one more tine before I walk away sad and depressed - any hope on finding out why our installation won't fire 'preexec' with 'msdfs proxy' activated? 'til then! Greg Enlow -- Greg Enlow grenlow at hk.mailbox.de On 18 May 2015, at 18:20, Jeremy Allison wrote: On Mon, May 18, 2015 at 03:31:55PM +0200, Greg Enlow wrote: > Hi, > >
2015 Oct 29
4
Local Administrators (group) and delegation in AD
On 2015-10-29 09:52, Rowland Penny wrote: > On 29/10/15 08:34, Davor Vusir wrote: >> Hi all! >> >> We have got many delegations in our AD. To add a certain >> administrator group to the local Administrators group you can use GPO >> for Windowsservers. As Samba does not understand GPO I have initially >> used the "username map" feature to add a
2018 Mar 11
2
Run smbd in AD user context
2018-03-10 19:48 GMT+01:00 Jeremy Allison <jra at samba.org>: > On Sat, Mar 10, 2018 at 01:10:46PM +0100, Davor Vusir via samba wrote: > > > > Off list I got a tip on using become_user(). A soon as I get a grip on > how > > to extract the calling user's vuid I give it a try I have of course tried > > other functions; become_user_permanently( ),
2015 Jul 08
6
vfs module recycler
this module doesn't seem to want to work on anything but a root ubuntu filesystem. It won't work on any external drives or secondary drives just the main one. This poses as a problem for a system with several drives. if i delete on a secondary drive of any sort with any use in a samba share over smb i get the folders placed in the recycle bin but no file. I have a sent copy of the config
2015 Oct 29
3
Local Administrators (group) and delegation in AD
On 2015-10-29 12:23, Rowland Penny wrote: > On 29/10/15 09:47, Davor Vusir wrote: >> On 2015-10-29 09:52, Rowland Penny wrote: >>> On 29/10/15 08:34, Davor Vusir wrote: >>>> Hi all! >>>> >>>> We have got many delegations in our AD. To add a certain >>>> administrator group to the local Administrators group you can use
2015 Oct 29
2
Local Administrators (group) and delegation in AD
mathias dufresne skrev den 2015-10-29 14:31: > I'm thick :D > I don't really understand more :( > No. I'm having trouble explaining. Maybe these threads are more enlightning: https://lists.samba.org/archive/samba/2015-April/191020.html and http://www.spinics.net/lists/samba/msg123646.html. > Samba can share file, printers and when samba hosts a domain samba is also
2015 Oct 30
2
Local Administrators (group) and delegation in AD
On 2015-10-29 21:32, Rowland Penny wrote: > On 29/10/15 19:38, Davor Vusir wrote: >> >> >> mathias dufresne skrev den 2015-10-29 14:31: >>> I'm thick :D >>> I don't really understand more :( >>> >> >> No. I'm having trouble explaining. Maybe these threads are more >> enlightning: >>
2018 Mar 10
2
Run smbd in AD user context
2018-03-09 20:39 GMT+01:00 Jeremy Allison <jra at samba.org>: > On Fri, Mar 09, 2018 at 12:07:54PM +0100, Davor Vusir via samba wrote: > > Hi all! > > > > Is it possible to run smbd in an AD user's context? > > If not, is it possible to have smbd to tell a third-party function to not > > stray outside from logged on user's (AD user) context (home