Displaying 20 results from an estimated 40000 matches similar to: "Creating my 1st file server"
2016 Jan 26
1
Enable_extended_ACL_support_in_smb.conf
I am not 100% clear as to when the following is required in smb.conf on a
member server:
vfs objects = acl_xattr
map acl inherit = yes
store dos attributes = yes
https://wiki.samba.org/index.php/Shares_with_Windows_ACLs#Enable_extended_ACL_support_in_smb.conf
I have confirmed Samba is compiled with ACL support:
[root at centos7member ~]# smbd -b | grep HAVE_LIBACL
2016 Jan 26
1
Enable_extended_ACL_support_in_smb.conf
I am not 100% clear as to when the following is required in smb.conf on a
member server:
vfs objects = acl_xattr
map acl inherit = yes
store dos attributes = yes
https://wiki.samba.org/index.php/Shares_with_Windows_ACLs#Enable_extended_ACL_support_in_smb.conf
I have confirmed Samba is compiled with ACL support:
[root at centos7member ~]# smbd -b | grep HAVE_LIBACL
2016 Sep 05
3
Fileserver, AD, ACLs
Hi all,
Here is the smb.conf used on my test files server.
_________________________________________________________________________
[global]
workgroup = AD
realm = AD.DOMAIN
netbios name = SMBFS20
security = ads
client ldap sasl wrapping = seal
ldap server require strong auth = allow_sasl_over_tls
client use spnego = yes
client
2015 Oct 01
2
SeDiskOperatorPrivilege - NT_STATUS_NO_SUCH_PRIVILEGE
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Am 28.09.2015 um 13:22 schrieb Rowland Penny:
> On 28/09/15 11:30, Steffen Weißgerber wrote:
> Hello,
>
> after configuring kerberos and winbind for authentication against an A
D
> (Window 2008 R2) and succesful launching getent passwd I followed the
> instructions https://wiki.samba.org/index.php/Shares_with_Windows_ACLs
> for
2016 Nov 27
1
point n print driver deployment for canon ip7250
> On Mon, 21 Nov 2016 13:42:57 +0100
> "L.P.H. van Belle via samba" <samba at lists.samba.org> wrote:
>
>> Hi,
>>
>> Yes thats correct.
>> But try the following.
>> Make sure you use the usermapping.
>>
>> username map = /etc/samba/samba_usermapping
>> containing:
>> !root = NTDOM\Administrator NTDOM\administrator
2015 Nov 24
5
Permission Denied
I have created a [home] share:
user at jupiter:~$ sudo ls -l /srv/samba/
total 24
drwxrwxr-x 2 root domain admins 4096 Nov 22 21:38 Demo
drwxrwxr-x 2 root domain admins 4096 Nov 15 11:51 Finance
drwxrwxr-x+ 2 root domain admins 4096 Nov 25 08:08 home
drwxrwxr-x+ 9 root domain admins 4096 Nov 24 21:06 Printer_drivers
When i try to set the ACLs in Windows I get "Permission Denied"
In
2016 Jan 19
2
net rpc rights list
On 20 January 2016 at 07:08, Rowland penny <rpenny at samba.org> wrote:
> On 19/01/16 20:00, Henry McLaughlin wrote:
>
>>
>> On 20 January 2016 at 06:43, Rowland penny <rpenny at samba.org <mailto:
>> rpenny at samba.org>> wrote:
>>
>> On 19/01/16 19:34, Henry McLaughlin wrote:
>>
>> I have sssd configured and working
2016 Nov 21
2
point n print driver deployment for canon ip7250
Hi,
Yes thats correct.
But try the following.
Make sure you use the usermapping.
username map = /etc/samba/samba_usermapping
containing:
!root = NTDOM\Administrator NTDOM\administrator Administrator administrator
And according to the wiki. (https://wiki.samba.org/index.php/Configuring_Point%27n%27Print_automatic_printer_driver_deployment)
For POSIX ACLs:
# chgrp -R "SAMDOM\Domain
2016 Jul 07
7
cifs share for profiles
Hi,
I have installed samba 4.4.4 and configured and works perfect, now I need
to configure roaming profiles and reading
https://wiki.samba.org/index.php/Shares_with_Windows_ACLs
I have detected that I can't configure
chgrp "Domain Admins" /srv/samba/Demo/
I'm creating this share on our dc, but seem that with
# getent group "Domain Admins"
any samba AD group is
2016 Jul 09
2
Bug number for an old commit
On Thursday, July 07, 2016 01:46:59 PM Rowland penny wrote:
> On 07/07/16 13:09, John Mulligan wrote:
> > Hi Samba team,
> >
> > Digging through some old code and commits while trying to understand some
> > ACL related behavior we found the following:
> >
> > https://git.samba.org/?p=samba.git;a=commitdiff;h=6dcbb84d485b8a8ccf0c3a70
> >
2016 Oct 24
4
Fix sharing ACL
Gentlemen,
I am struggling to solve this problem.
My file server Samba 4.4.5.
Even the administrator user (domain admin) could not write to the share.
Could someone give me a hint, in order to solve this problem?
shared folder: /mnt/data
Folder permissions:
# getfacl /mnt/data/teste/
getfacl: Removing leading '/' from absolute path names
# file: mnt/data/teste/
# owner: ricardo
2016 Mar 23
2
Samba 4 with sssd - primary Windows group membership not honored
>
> OK, you should use the standard 'rwx' permissions *or* ACLs, not both. If
> you create a directory on Unix that you want to share, set the owner:group
> to root:'Domain Admins' and permissions to 0770. You will then be able to
> set the permissions from windows or with setfacl on the Unix machine, you
> do not need the 'force group' lines in smb.conf,
2016 Sep 05
0
Fileserver, AD, ACLs
On Mon, 5 Sep 2016 15:06:58 +0200
mathias dufresne via samba <samba at lists.samba.org> wrote:
> Hi all,
>
> Here is the smb.conf used on my test files server.
> _________________________________________________________________________
> [global]
> workgroup = AD
> realm = AD.DOMAIN
> netbios name = SMBFS20
>
> security = ads
2016 Oct 08
2
Roaming Profiles with Windows ACLs
On Fri, Oct 7, 2016 at 12:38 PM, Rowland Penny via samba <
samba at lists.samba.org> wrote:
> have you given Domain Admins the required rights ?
>
> net rpc rights grant DOMAIN\\"Domain Admins"
> SeDiskOperatorPrivilege -UAdministrator
>
Yes. I followed this wiki example:
https://wiki.samba.org/index.php/Shares_with_Windows_ACLs
Here is some output:
[nienberg at
2016 Oct 12
2
Roaming Profiles with Windows ACLs
On 10/12/2016 1:34 PM, Mark Nienberg via samba wrote:
> Well, the easy fix is to add this to the share definition:
>
> admin users = "@STA\domain admins"
>
> The wiki implies that this should not be necessary, so I don't know if the
> wiki is wrong or if I failed to follow it correctly. This was my first
> share using Windows ACLS and it was an interesting
2016 Dec 04
1
Mount share in Ubuntu
yes, ampersand :)
I have included the password in quotes in fstab
p.s. I previously hit reply and not reply all :)
On Sun, Dec 4, 2016 at 7:55 PM, Reindl Harald via samba
<samba at lists.samba.org> wrote:
>
>
> Am 04.12.2016 um 03:41 schrieb Henry via samba:
>>
>> I have a samba server with three shares.
>> I would like to permanently mount one of these shares
2016 Oct 13
1
Roaming Profiles with Windows ACLs
On 10/12/2016 7:32 PM, Mark Nienberg wrote:
> Yes, it looks like this:
>
> https://wiki.samba.org/index.php/Implementing_roaming_profiles#Profile_share_using_Windows_ACLs
>
> but as I say, it works now that I have added the admin users, so I am
> satisfied for now.
>
> On Wed, Oct 12, 2016 at 11:31 AM, lingpanda101--- via samba
> <samba at lists.samba.org
2016 Oct 25
3
Fix sharing ACL
I removed the vestments of the DC user.map.
I had already trying to reset the permissions, following this session:
https://wiki.samba.org/index.php/Shares_with_Windows_ACLs#Troubleshooting
When I try to reset the permissions as shown in the bottom page of the ACL Windows page, nothing happens.
# ls -l /mnt/data
total 20
drwxrwxr-x+ 3 administrator domain admins 4096 Set 30 09:44 NTI
2015 Nov 25
0
Permission Denied
If this is about problems on a member server, read on.
If its on a ADDC, then i dont know, but good info below. ;-)
( Rowland, maybe a thing to put on the wiki also, read on.. )
If you only use the share from windows machines, make your life easy.
Add : acl_xattr:ignore system acls = yes to the share.
And set the correct rights from within windows.
If you do use the shares /folders also
2016 Nov 24
5
getent only displays local users & groups
I have read numerous posts regarding this issue without finding a
resolution. I have a fresh Samba AD DC & a Samba Member server. the
member server has been setup using idmap config ad
wbinfo -u & wbinfo -g both work and list the domain users & groups
getent passwd & getent group both only display the local member server
users and groups
>From what I have read I understand