source: branches/samba-3.2.x/docs/manpages/smbcacls.1@ 201

Last change on this file since 201 was 201, checked in by Herwig Bauernfeind, 16 years ago

Update to Samba 3.2.3

File size: 8.7 KB
Line 
1.\" Title: smbcacls
2.\" Author:
3.\" Generator: DocBook XSL Stylesheets v1.73.1 <http://docbook.sf.net/>
4.\" Date: 08/27/2008
5.\" Manual: User Commands
6.\" Source: Samba 3.2
7.\"
8.TH "SMBCACLS" "1" "08/27/2008" "Samba 3\.2" "User Commands"
9.\" disable hyphenation
10.nh
11.\" disable justification (adjust text to left margin only)
12.ad l
13.SH "NAME"
14smbcacls - Set or get ACLs on an NT file or directory names
15.SH "SYNOPSIS"
16.HP 1
17smbcacls {//server/share} {filename} [\-D\ acls] [\-M\ acls] [\-a\ acls] [\-S\ acls] [\-C\ name] [\-G\ name] [\-\-numeric] [\-t] [\-U\ username] [\-h] [\-d]
18.SH "DESCRIPTION"
19.PP
20This tool is part of the
21\fBsamba\fR(7)
22suite\.
23.PP
24The
25smbcacls
26program manipulates NT Access Control Lists (ACLs) on SMB file shares\.
27.SH "OPTIONS"
28.PP
29The following options are available to the
30smbcacls
31program\. The format of ACLs is described in the section ACL FORMAT
32.PP
33\-a acls
34.RS 4
35Add the ACLs specified to the ACL list\. Existing access control entries are unchanged\.
36.RE
37.PP
38\-M acls
39.RS 4
40Modify the mask value (permissions) for the ACLs specified on the command line\. An error will be printed for each ACL specified that was not already present in the ACL list
41.RE
42.PP
43\-D acls
44.RS 4
45Delete any ACLs specified on the command line\. An error will be printed for each ACL specified that was not already present in the ACL list\.
46.RE
47.PP
48\-S acls
49.RS 4
50This command sets the ACLs on the file with only the ones specified on the command line\. All other ACLs are erased\. Note that the ACL specified must contain at least a revision, type, owner and group for the call to succeed\.
51.RE
52.PP
53\-U username
54.RS 4
55Specifies a username used to connect to the specified service\. The username may be of the form "username" in which case the user is prompted to enter in a password and the workgroup specified in the
56\fBsmb.conf\fR(5)
57file is used, or "username%password" or "DOMAIN\eusername%password" and the password and workgroup names are used as provided\.
58.RE
59.PP
60\-C name
61.RS 4
62The owner of a file or directory can be changed to the name given using the
63\fI\-C\fR
64option\. The name can be a sid in the form S\-1\-x\-y\-z or a name resolved against the server specified in the first argument\.
65.sp
66This command is a shortcut for \-M OWNER:name\.
67.RE
68.PP
69\-G name
70.RS 4
71The group owner of a file or directory can be changed to the name given using the
72\fI\-G\fR
73option\. The name can be a sid in the form S\-1\-x\-y\-z or a name resolved against the server specified n the first argument\.
74.sp
75This command is a shortcut for \-M GROUP:name\.
76.RE
77.PP
78\-\-numeric
79.RS 4
80This option displays all ACL information in numeric format\. The default is to convert SIDs to names and ACE types and masks to a readable string format\.
81.RE
82.PP
83\-t
84.RS 4
85Don\'t actually do anything, only validate the correctness of the arguments\.
86.RE
87.PP
88\-h|\-\-help
89.RS 4
90Print a summary of command line options\.
91.RE
92.PP
93\-d|\-\-debuglevel=level
94.RS 4
95\fIlevel\fR
96is an integer from 0 to 10\. The default value if this parameter is not specified is 0\.
97.sp
98The higher this value, the more detail will be logged to the log files about the activities of the server\. At level 0, only critical errors and serious warnings will be logged\. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\.
99.sp
100Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\.
101.sp
102Note that specifying this parameter here will override the
103\fIlog level\fR
104parameter in the
105\fIsmb\.conf\fR
106file\.
107.RE
108.PP
109\-V
110.RS 4
111Prints the program version number\.
112.RE
113.PP
114\-s <configuration file>
115.RS 4
116The file specified contains the configuration details required by the server\. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\. See
117\fIsmb\.conf\fR
118for more information\. The default configuration file name is determined at compile time\.
119.RE
120.PP
121\-l|\-\-log\-basename=logdirectory
122.RS 4
123Base directory name for log/debug files\. The extension
124\fB"\.progname"\fR
125will be appended (e\.g\. log\.smbclient, log\.smbd, etc\.\.\.)\. The log file is never removed by the client\.
126.RE
127.SH "ACL FORMAT"
128.PP
129The format of an ACL is one or more ACL entries separated by either commas or newlines\. An ACL entry is one of the following:
130.PP
131.RS 4
132.nf
133
134REVISION:<revision number>
135OWNER:<sid or name>
136GROUP:<sid or name>
137ACL:<sid or name>:<type>/<flags>/<mask>
138.fi
139.RE
140.PP
141The revision of the ACL specifies the internal Windows NT ACL revision for the security descriptor\. If not specified it defaults to 1\. Using values other than 1 may cause strange behaviour\.
142.PP
143The owner and group specify the owner and group sids for the object\. If a SID in the format S\-1\-x\-y\-z is specified this is used, otherwise the name specified is resolved using the server on which the file or directory resides\.
144.PP
145ACLs specify permissions granted to the SID\. This SID again can be specified in S\-1\-x\-y\-z format or as a name in which case it is resolved against the server on which the file or directory resides\. The type, flags and mask values determine the type of access granted to the SID\.
146.PP
147The type can be either ALLOWED or DENIED to allow/deny access to the SID\. The flags values are generally zero for file ACLs and either 9 or 2 for directory ACLs\. Some common flags are:
148.sp
149.RS 4
150.ie n \{\
151\h'-04'\(bu\h'+03'\c
152.\}
153.el \{\
154.sp -1
155.IP \(bu 2.3
156.\}
157\fB#define SEC_ACE_FLAG_OBJECT_INHERIT 0x1\fR
158.RE
159.sp
160.RS 4
161.ie n \{\
162\h'-04'\(bu\h'+03'\c
163.\}
164.el \{\
165.sp -1
166.IP \(bu 2.3
167.\}
168\fB#define SEC_ACE_FLAG_CONTAINER_INHERIT 0x2\fR
169.RE
170.sp
171.RS 4
172.ie n \{\
173\h'-04'\(bu\h'+03'\c
174.\}
175.el \{\
176.sp -1
177.IP \(bu 2.3
178.\}
179\fB#define SEC_ACE_FLAG_NO_PROPAGATE_INHERIT 0x4\fR
180.RE
181.sp
182.RS 4
183.ie n \{\
184\h'-04'\(bu\h'+03'\c
185.\}
186.el \{\
187.sp -1
188.IP \(bu 2.3
189.\}
190\fB#define SEC_ACE_FLAG_INHERIT_ONLY 0x8\fR
191.sp
192.RE
193.PP
194At present flags can only be specified as decimal or hexadecimal values\.
195.PP
196The mask is a value which expresses the access right granted to the SID\. It can be given as a decimal or hexadecimal value, or by using one of the following text strings which map to the NT file permissions of the same name\.
197.sp
198.RS 4
199.ie n \{\
200\h'-04'\(bu\h'+03'\c
201.\}
202.el \{\
203.sp -1
204.IP \(bu 2.3
205.\}
206\fIR\fR
207\- Allow read access
208.RE
209.sp
210.RS 4
211.ie n \{\
212\h'-04'\(bu\h'+03'\c
213.\}
214.el \{\
215.sp -1
216.IP \(bu 2.3
217.\}
218\fIW\fR
219\- Allow write access
220.RE
221.sp
222.RS 4
223.ie n \{\
224\h'-04'\(bu\h'+03'\c
225.\}
226.el \{\
227.sp -1
228.IP \(bu 2.3
229.\}
230\fIX\fR
231\- Execute permission on the object
232.RE
233.sp
234.RS 4
235.ie n \{\
236\h'-04'\(bu\h'+03'\c
237.\}
238.el \{\
239.sp -1
240.IP \(bu 2.3
241.\}
242\fID\fR
243\- Delete the object
244.RE
245.sp
246.RS 4
247.ie n \{\
248\h'-04'\(bu\h'+03'\c
249.\}
250.el \{\
251.sp -1
252.IP \(bu 2.3
253.\}
254\fIP\fR
255\- Change permissions
256.RE
257.sp
258.RS 4
259.ie n \{\
260\h'-04'\(bu\h'+03'\c
261.\}
262.el \{\
263.sp -1
264.IP \(bu 2.3
265.\}
266\fIO\fR
267\- Take ownership
268.sp
269.RE
270.PP
271The following combined permissions can be specified:
272.sp
273.RS 4
274.ie n \{\
275\h'-04'\(bu\h'+03'\c
276.\}
277.el \{\
278.sp -1
279.IP \(bu 2.3
280.\}
281\fIREAD\fR
282\- Equivalent to \'RX\' permissions
283.RE
284.sp
285.RS 4
286.ie n \{\
287\h'-04'\(bu\h'+03'\c
288.\}
289.el \{\
290.sp -1
291.IP \(bu 2.3
292.\}
293\fICHANGE\fR
294\- Equivalent to \'RXWD\' permissions
295.RE
296.sp
297.RS 4
298.ie n \{\
299\h'-04'\(bu\h'+03'\c
300.\}
301.el \{\
302.sp -1
303.IP \(bu 2.3
304.\}
305\fIFULL\fR
306\- Equivalent to \'RWXDPO\' permissions
307.SH "EXIT STATUS"
308.PP
309The
310smbcacls
311program sets the exit status depending on the success or otherwise of the operations performed\. The exit status may be one of the following values\.
312.PP
313If the operation succeeded, smbcacls returns and exit status of 0\. If
314smbcacls
315couldn\'t connect to the specified server, or there was an error getting or setting the ACLs, an exit status of 1 is returned\. If there was an error parsing any command line arguments, an exit status of 2 is returned\.
316.SH "VERSION"
317.PP
318This man page is correct for version 3 of the Samba suite\.
319.SH "AUTHOR"
320.PP
321The original Samba software and related utilities were created by Andrew Tridgell\. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed\.
322.PP
323smbcacls
324was written by Andrew Tridgell and Tim Potter\.
325.PP
326The conversion to DocBook for Samba 2\.2 was done by Gerald Carter\. The conversion to DocBook XML 4\.2 for Samba 3\.0 was done by Alexander Bokovoy\.
Note: See TracBrowser for help on using the repository browser.