1 | <html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Chapter 15. User Rights and Privileges</title><link rel="stylesheet" href="../samba.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.75.2"><link rel="home" href="index.html" title="The Official Samba 3.5.x HOWTO and Reference Guide"><link rel="up" href="optional.html" title="Part III. Advanced Configuration"><link rel="prev" href="idmapper.html" title="Chapter 14. Identity Mapping (IDMAP)"><link rel="next" href="AccessControls.html" title="Chapter 16. File, Directory, and Share Access Controls"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Chapter 15. User Rights and Privileges</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="idmapper.html">Prev</a> </td><th width="60%" align="center">Part III. Advanced Configuration</th><td width="20%" align="right"> <a accesskey="n" href="AccessControls.html">Next</a></td></tr></table><hr></div><div class="chapter" title="Chapter 15. User Rights and Privileges"><div class="titlepage"><div><div><h2 class="title"><a name="rights"></a>Chapter 15. User Rights and Privileges</h2></div><div><div class="author"><h3 class="author"><span class="firstname">Gerald</span> <span class="othername">(Jerry)</span> <span class="surname">Carter</span></h3><div class="affiliation"><span class="orgname">Samba Team<br></span><div class="address"><p><code class="email"><<a class="email" href="mailto:jerry@samba.org">jerry@samba.org</a>></code></p></div></div></div></div><div><div class="author"><h3 class="author"><span class="firstname">John</span> <span class="othername">H.</span> <span class="surname">Terpstra</span></h3><div class="affiliation"><span class="orgname">Samba Team<br></span><div class="address"><p><code class="email"><<a class="email" href="mailto:jht@samba.org">jht@samba.org</a>></code></p></div></div></div></div></div></div><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="sect1"><a href="rights.html#id376570">Rights Management Capabilities</a></span></dt><dd><dl><dt><span class="sect2"><a href="rights.html#id376833">Using the <span class="quote">“<span class="quote">net rpc rights</span>”</span> Utility</a></span></dt><dt><span class="sect2"><a href="rights.html#id377149">Description of Privileges</a></span></dt><dt><span class="sect2"><a href="rights.html#id377439">Privileges Supported by Windows 2000 Domain Controllers</a></span></dt></dl></dd><dt><span class="sect1"><a href="rights.html#id377883">The Administrator Domain SID</a></span></dt><dt><span class="sect1"><a href="rights.html#id378048">Common Errors</a></span></dt><dd><dl><dt><span class="sect2"><a href="rights.html#id378053">What Rights and Privileges Will Permit Windows Client Administration?</a></span></dt></dl></dd></dl></div><p>
|
---|
2 | <a class="indexterm" name="id376313"></a>
|
---|
3 | <a class="indexterm" name="id376320"></a>
|
---|
4 | <a class="indexterm" name="id376326"></a>
|
---|
5 | <a class="indexterm" name="id376333"></a>
|
---|
6 | The administration of Windows user, group, and machine accounts in the Samba
|
---|
7 | domain-controlled network necessitates interfacing between the MS Windows
|
---|
8 | networking environment and the UNIX operating system environment. The right
|
---|
9 | (permission) to add machines to the Windows security domain can be assigned
|
---|
10 | (set) to non-administrative users both in Windows NT4 domains and
|
---|
11 | Active Directory domains.
|
---|
12 | </p><p>
|
---|
13 | <a class="indexterm" name="id376346"></a>
|
---|
14 | <a class="indexterm" name="id376353"></a>
|
---|
15 | <a class="indexterm" name="id376360"></a>
|
---|
16 | <a class="indexterm" name="id376367"></a>
|
---|
17 | The addition of Windows NT4/2kX/XPPro machines to the domain necessitates the
|
---|
18 | creation of a machine account for each machine added. The machine account is
|
---|
19 | a necessity that is used to validate that the machine can be trusted to permit
|
---|
20 | user logons.
|
---|
21 | </p><p>
|
---|
22 | <a class="indexterm" name="id376379"></a>
|
---|
23 | <a class="indexterm" name="id376386"></a>
|
---|
24 | <a class="indexterm" name="id376393"></a>
|
---|
25 | <a class="indexterm" name="id376400"></a>
|
---|
26 | <a class="indexterm" name="id376406"></a>
|
---|
27 | <a class="indexterm" name="id376413"></a>
|
---|
28 | Machine accounts are analogous to user accounts, and thus in implementing them on a UNIX machine that is
|
---|
29 | hosting Samba (i.e., on which Samba is running), it is necessary to create a special type of user account.
|
---|
30 | Machine accounts differ from normal user accounts in that the account name (login ID) is terminated with a
|
---|
31 | <code class="literal">$</code> sign. An additional difference is that this type of account should not ever be able to
|
---|
32 | log into the UNIX environment as a system user and therefore is set to have a shell of
|
---|
33 | <code class="literal">/bin/false</code> and a home directory of <code class="literal">/dev/null.</code> The machine
|
---|
34 | account is used only to authenticate domain member machines during start-up. This security measure
|
---|
35 | is designed to block man-in-the-middle attempts to violate network integrity.
|
---|
36 | </p><div class="note" title="Note" style="margin-left: 0.5in; margin-right: 0.5in;"><h3 class="title">Note</h3><p>
|
---|
37 | <a class="indexterm" name="id376448"></a>
|
---|
38 | <a class="indexterm" name="id376454"></a>
|
---|
39 | <a class="indexterm" name="id376461"></a>
|
---|
40 | <a class="indexterm" name="id376468"></a>
|
---|
41 | <a class="indexterm" name="id376475"></a>
|
---|
42 | Machine (computer) accounts are used in the Windows NT OS family to store security
|
---|
43 | credentials for domain member servers and workstations. When the domain member
|
---|
44 | starts up, it goes through a validation process that includes an exchange of
|
---|
45 | credentials with a domain controller. If the domain member fails to authenticate
|
---|
46 | using the credentials known for it by domain controllers, the machine will be refused
|
---|
47 | all access by domain users. The computer account is essential to the way that MS
|
---|
48 | Windows secures authentication.
|
---|
49 | </p></div><p>
|
---|
50 | <a class="indexterm" name="id376489"></a>
|
---|
51 | <a class="indexterm" name="id376496"></a>
|
---|
52 | <a class="indexterm" name="id376503"></a>
|
---|
53 | <a class="indexterm" name="id376510"></a>
|
---|
54 | The creation of UNIX system accounts has traditionally been the sole right of
|
---|
55 | the system administrator, better known as the <code class="constant">root</code> account.
|
---|
56 | It is possible in the UNIX environment to create multiple users who have the
|
---|
57 | same UID. Any UNIX user who has a UID=0 is inherently the same as the
|
---|
58 | <code class="constant">root</code> account user.
|
---|
59 | </p><p>
|
---|
60 | <a class="indexterm" name="id376529"></a>
|
---|
61 | <a class="indexterm" name="id376536"></a>
|
---|
62 | <a class="indexterm" name="id376543"></a>
|
---|
63 | <a class="indexterm" name="id376550"></a>
|
---|
64 | All versions of Samba call system interface scripts that permit CIFS function
|
---|
65 | calls that are used to manage users, groups, and machine accounts
|
---|
66 | in the UNIX environment. All versions of Samba up to and including version 3.0.10
|
---|
67 | required the use of a Windows administrator account that unambiguously maps to
|
---|
68 | the UNIX <code class="constant">root</code> account to permit the execution of these
|
---|
69 | interface scripts. The requirement to do this has understandably met with some
|
---|
70 | disdain and consternation among Samba administrators, particularly where it became
|
---|
71 | necessary to permit people who should not possess <code class="constant">root</code>-level
|
---|
72 | access to the UNIX host system.
|
---|
73 | </p><div class="sect1" title="Rights Management Capabilities"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id376570"></a>Rights Management Capabilities</h2></div></div></div><p>
|
---|
74 | <a class="indexterm" name="id376578"></a>
|
---|
75 | <a class="indexterm" name="id376585"></a>
|
---|
76 | <a class="indexterm" name="id376592"></a>
|
---|
77 | <a class="indexterm" name="id376598"></a>
|
---|
78 | Samba 3.0.11 introduced support for the Windows privilege model. This model
|
---|
79 | allows certain rights to be assigned to a user or group SID. In order to enable
|
---|
80 | this feature, <a class="link" href="smb.conf.5.html#ENABLEPRIVILEGES" target="_top">enable privileges = yes</a>
|
---|
81 | must be defined in the <em class="parameter"><code>global</code></em> section of the <code class="filename">smb.conf</code> file.
|
---|
82 | </p><p>
|
---|
83 | <a class="indexterm" name="id376634"></a>
|
---|
84 | <a class="indexterm" name="id376641"></a>
|
---|
85 | <a class="indexterm" name="id376648"></a>
|
---|
86 | Currently, the rights supported in Samba-3 are listed in <a class="link" href="rights.html#rp-privs" title="Table 15.1. Current Privilege Capabilities">“Current Privilege Capabilities”</a>.
|
---|
87 | The remainder of this chapter explains how to manage and use these privileges on Samba servers.
|
---|
88 | </p><a class="indexterm" name="id376664"></a><a class="indexterm" name="id376671"></a><a class="indexterm" name="id376678"></a><a class="indexterm" name="id376684"></a><a class="indexterm" name="id376691"></a><a class="indexterm" name="id376698"></a><div class="table"><a name="rp-privs"></a><p class="title"><b>Table 15.1. Current Privilege Capabilities</b></p><div class="table-contents"><table summary="Current Privilege Capabilities" border="1"><colgroup><col align="right"><col align="left"></colgroup><thead><tr><th align="left">Privilege</th><th align="left">Description</th></tr></thead><tbody><tr><td align="right"><p>SeMachineAccountPrivilege</p></td><td align="left"><p>Add machines to domain</p></td></tr><tr><td align="right"><p>SePrintOperatorPrivilege</p></td><td align="left"><p>Manage printers</p></td></tr><tr><td align="right"><p>SeAddUsersPrivilege</p></td><td align="left"><p>Add users and groups to the domain</p></td></tr><tr><td align="right"><p>SeRemoteShutdownPrivilege</p></td><td align="left"><p>Force shutdown from a remote system</p></td></tr><tr><td align="right"><p>SeDiskOperatorPrivilege</p></td><td align="left"><p>Manage disk share</p></td></tr><tr><td align="right"><p>SeTakeOwnershipPrivilege</p></td><td align="left"><p>Take ownership of files or other objects</p></td></tr></tbody></table></div></div><br class="table-break"><div class="sect2" title="Using the “net rpc rights” Utility"><div class="titlepage"><div><div><h3 class="title"><a name="id376833"></a>Using the <span class="quote">“<span class="quote">net rpc rights</span>”</span> Utility</h3></div></div></div><p>
|
---|
89 | <a class="indexterm" name="id376844"></a>
|
---|
90 | <a class="indexterm" name="id376851"></a>
|
---|
91 | <a class="indexterm" name="id376858"></a>
|
---|
92 | <a class="indexterm" name="id376865"></a>
|
---|
93 | <a class="indexterm" name="id376871"></a>
|
---|
94 | There are two primary means of managing the rights assigned to users and groups
|
---|
95 | on a Samba server. The <code class="literal">NT4 User Manager for Domains</code> may be
|
---|
96 | used from any Windows NT4, 2000, or XP Professional domain member client to
|
---|
97 | connect to a Samba domain controller and view/modify the rights assignments.
|
---|
98 | This application, however, appears to have bugs when run on a client running
|
---|
99 | Windows 2000 or later; therefore, Samba provides a command-line utility for
|
---|
100 | performing the necessary administrative actions.
|
---|
101 | </p><p>
|
---|
102 | The <code class="literal">net rpc rights</code> utility in Samba 3.0.11 has three new subcommands:
|
---|
103 | </p><div class="variablelist"><dl><dt><span class="term">list [name|accounts]</span></dt><dd><p>
|
---|
104 | <a class="indexterm" name="id376909"></a>
|
---|
105 | <a class="indexterm" name="id376920"></a>
|
---|
106 | <a class="indexterm" name="id376927"></a>
|
---|
107 | <a class="indexterm" name="id376934"></a>
|
---|
108 | When called with no arguments, <code class="literal">net rpc list</code>
|
---|
109 | simply lists the available rights on the server. When passed
|
---|
110 | a specific user or group name, the tool lists the privileges
|
---|
111 | currently assigned to the specified account. When invoked using
|
---|
112 | the special string <code class="constant">accounts</code>,
|
---|
113 | <code class="literal">net rpc rights list</code> returns a list of all
|
---|
114 | privileged accounts on the server and the assigned rights.
|
---|
115 | </p></dd><dt><span class="term">grant <user> <right [right ...]></span></dt><dd><p>
|
---|
116 | <a class="indexterm" name="id376968"></a>
|
---|
117 | <a class="indexterm" name="id376975"></a>
|
---|
118 | <a class="indexterm" name="id376982"></a>
|
---|
119 | <a class="indexterm" name="id376989"></a>
|
---|
120 | When called with no arguments, this function is used to assign
|
---|
121 | a list of rights to a specified user or group. For example,
|
---|
122 | to grant the members of the Domain Admins group on a Samba domain controller,
|
---|
123 | the capability to add client machines to the domain, one would run:
|
---|
124 | </p><pre class="screen">
|
---|
125 | <code class="prompt">root# </code> net -S server -U domadmin rpc rights grant \
|
---|
126 | 'DOMAIN\Domain Admins' SeMachineAccountPrivilege
|
---|
127 | </pre><p>
|
---|
128 | The following syntax has the same result:
|
---|
129 | <a class="indexterm" name="id377011"></a>
|
---|
130 | </p><pre class="screen">
|
---|
131 | <code class="prompt">root# </code> net rpc rights grant 'DOMAIN\Domain Admins' \
|
---|
132 | SeMachineAccountPrivilege -S server -U domadmin
|
---|
133 | </pre><p>
|
---|
134 | More than one privilege can be assigned by specifying a
|
---|
135 | list of rights separated by spaces. The parameter 'Domain\Domain Admins'
|
---|
136 | must be quoted with single ticks or using double-quotes to prevent
|
---|
137 | the backslash and the space from being interpreted by the system shell.
|
---|
138 | </p></dd><dt><span class="term">revoke <user> <right [right ...]></span></dt><dd><p>
|
---|
139 | This command is similar in format to <code class="literal">net rpc rights grant</code>. Its
|
---|
140 | effect is to remove an assigned right (or list of rights) from a user or group.
|
---|
141 | </p></dd></dl></div><div class="note" title="Note" style="margin-left: 0.5in; margin-right: 0.5in;"><h3 class="title">Note</h3><p>
|
---|
142 | <a class="indexterm" name="id377060"></a>
|
---|
143 | <a class="indexterm" name="id377067"></a>
|
---|
144 | <a class="indexterm" name="id377074"></a>
|
---|
145 | You must be connected as a member of the Domain Admins group to be able to grant or revoke privileges assigned
|
---|
146 | to an account. This capability is inherent to the Domain Admins group and is not configurable. There are no
|
---|
147 | default rights and privileges, except the ability for a member of the Domain Admins group to assign them.
|
---|
148 | This means that all administrative rights and privileges (other than the ability to assign them) must be
|
---|
149 | explicitly assigned, even for the Domain Admins group.
|
---|
150 | </p></div><p>
|
---|
151 | <a class="indexterm" name="id377088"></a>
|
---|
152 | <a class="indexterm" name="id377095"></a>
|
---|
153 | <a class="indexterm" name="id377102"></a>
|
---|
154 | <a class="indexterm" name="id377108"></a>
|
---|
155 | By default, no privileges are initially assigned to any account because certain actions will be performed as
|
---|
156 | root once smbd determines that a user has the necessary rights. For example, when joining a client to a
|
---|
157 | Windows domain, <em class="parameter"><code>add machine script</code></em> must be executed with superuser rights in most
|
---|
158 | cases. For this reason, you should be very careful about handing out privileges to accounts.
|
---|
159 | </p><p>
|
---|
160 | <a class="indexterm" name="id377126"></a>
|
---|
161 | <a class="indexterm" name="id377133"></a>
|
---|
162 | <a class="indexterm" name="id377140"></a>
|
---|
163 | Access as the root user (UID=0) bypasses all privilege checks.
|
---|
164 | </p></div><div class="sect2" title="Description of Privileges"><div class="titlepage"><div><div><h3 class="title"><a name="id377149"></a>Description of Privileges</h3></div></div></div><p>
|
---|
165 | <a class="indexterm" name="id377157"></a>
|
---|
166 | <a class="indexterm" name="id377164"></a>
|
---|
167 | <a class="indexterm" name="id377171"></a>
|
---|
168 | The privileges that have been implemented in Samba-3.0.11 are shown below. It is possible, and likely, that
|
---|
169 | additional privileges may be implemented in later releases of Samba. It is also likely that any privileges
|
---|
170 | currently implemented but not used may be removed from future releases as a housekeeping matter, so it is
|
---|
171 | important that the successful as well as unsuccessful use of these facilities should be reported on the Samba
|
---|
172 | mailing lists.
|
---|
173 | </p><div class="variablelist"><dl><dt><span class="term">SeAddUsersPrivilege</span></dt><dd><p>
|
---|
174 | <a class="indexterm" name="id377192"></a>
|
---|
175 | <a class="indexterm" name="id377199"></a>
|
---|
176 | <a class="indexterm" name="id377206"></a>
|
---|
177 | This right determines whether or not smbd will allow the
|
---|
178 | user to create new user or group accounts via such tools
|
---|
179 | as <code class="literal">net rpc user add</code> or
|
---|
180 | <code class="literal">NT4 User Manager for Domains.</code>
|
---|
181 | </p></dd><dt><span class="term">SeDiskOperatorPrivilege</span></dt><dd><p>
|
---|
182 | <a class="indexterm" name="id377236"></a>
|
---|
183 | <a class="indexterm" name="id377242"></a>
|
---|
184 | <a class="indexterm" name="id377249"></a>
|
---|
185 | Accounts that possess this right will be able to execute
|
---|
186 | scripts defined by the <code class="literal">add/delete/change</code>
|
---|
187 | share command in <code class="filename">smb.conf</code> file as root. Such users will
|
---|
188 | also be able to modify the ACL associated with file shares
|
---|
189 | on the Samba server.
|
---|
190 | </p></dd><dt><span class="term">SeMachineAccountPrivilege</span></dt><dd><p>
|
---|
191 | <a class="indexterm" name="id377279"></a>
|
---|
192 | <a class="indexterm" name="id377286"></a>
|
---|
193 | <a class="indexterm" name="id377293"></a>
|
---|
194 | This right controls whether or not the user can join client
|
---|
195 | machines to a Samba-controlled domain.
|
---|
196 | </p></dd><dt><span class="term">SePrintOperatorPrivilege</span></dt><dd><p>
|
---|
197 | <a class="indexterm" name="id377311"></a>
|
---|
198 | <a class="indexterm" name="id377318"></a>
|
---|
199 | <a class="indexterm" name="id377325"></a>
|
---|
200 | <a class="indexterm" name="id377332"></a>
|
---|
201 | <a class="indexterm" name="id377338"></a>
|
---|
202 | This privilege operates identically to the <a class="link" href="smb.conf.5.html#PRINTERADMIN" target="_top">printer admin</a>
|
---|
203 | option in the <code class="filename">smb.conf</code> file (see section 5 man page for <code class="filename">smb.conf</code>)
|
---|
204 | except that it is a global right (not on a per-printer basis).
|
---|
205 | Eventually the smb.conf option will be deprecated and administrative
|
---|
206 | rights to printers will be controlled exclusively by this right and
|
---|
207 | the security descriptor associated with the printer object in the
|
---|
208 | <code class="filename">ntprinters.tdb</code> file.
|
---|
209 | </p></dd><dt><span class="term">SeRemoteShutdownPrivilege</span></dt><dd><p>
|
---|
210 | <a class="indexterm" name="id377388"></a>
|
---|
211 | <a class="indexterm" name="id377395"></a>
|
---|
212 | <a class="indexterm" name="id377402"></a>
|
---|
213 | Samba provides two hooks for shutting down or rebooting
|
---|
214 | the server and for aborting a previously issued shutdown
|
---|
215 | command. Since this is an operation normally limited by
|
---|
216 | the operating system to the root user, an account must possess this
|
---|
217 | right to be able to execute either of these hooks.
|
---|
218 | </p></dd><dt><span class="term">SeTakeOwnershipPrivilege</span></dt><dd><p>
|
---|
219 | <a class="indexterm" name="id377421"></a>
|
---|
220 | <a class="indexterm" name="id377428"></a>
|
---|
221 | This right permits users to take ownership of files and directories.
|
---|
222 | </p></dd></dl></div></div><div class="sect2" title="Privileges Supported by Windows 2000 Domain Controllers"><div class="titlepage"><div><div><h3 class="title"><a name="id377439"></a>Privileges Supported by Windows 2000 Domain Controllers</h3></div></div></div><p>
|
---|
223 | For reference purposes, a Windows NT4 Primary Domain Controller reports support for the following
|
---|
224 | privileges:
|
---|
225 | <a class="indexterm" name="id377448"></a>
|
---|
226 | <a class="indexterm" name="id377455"></a>
|
---|
227 | <a class="indexterm" name="id377462"></a>
|
---|
228 | <a class="indexterm" name="id377469"></a>
|
---|
229 | <a class="indexterm" name="id377476"></a>
|
---|
230 | <a class="indexterm" name="id377482"></a>
|
---|
231 | <a class="indexterm" name="id377489"></a>
|
---|
232 | <a class="indexterm" name="id377496"></a>
|
---|
233 | <a class="indexterm" name="id377503"></a>
|
---|
234 | <a class="indexterm" name="id377510"></a>
|
---|
235 | <a class="indexterm" name="id377517"></a>
|
---|
236 | <a class="indexterm" name="id377524"></a>
|
---|
237 | <a class="indexterm" name="id377530"></a>
|
---|
238 | <a class="indexterm" name="id377537"></a>
|
---|
239 | <a class="indexterm" name="id377544"></a>
|
---|
240 | <a class="indexterm" name="id377551"></a>
|
---|
241 | <a class="indexterm" name="id377558"></a>
|
---|
242 | <a class="indexterm" name="id377565"></a>
|
---|
243 | <a class="indexterm" name="id377572"></a>
|
---|
244 | <a class="indexterm" name="id377578"></a>
|
---|
245 | <a class="indexterm" name="id377585"></a>
|
---|
246 | <a class="indexterm" name="id377592"></a>
|
---|
247 | <a class="indexterm" name="id377599"></a>
|
---|
248 | </p><pre class="screen">
|
---|
249 | SeCreateTokenPrivilege Create a token object
|
---|
250 | SeAssignPrimaryTokenPrivilege Replace a process level token
|
---|
251 | SeLockMemoryPrivilege Lock pages in memory
|
---|
252 | SeIncreaseQuotaPrivilege Increase quotas
|
---|
253 | SeMachineAccountPrivilege Add workstations to domain
|
---|
254 | SeTcbPrivilege Act as part of the operating system
|
---|
255 | SeSecurityPrivilege Manage auditing and security log
|
---|
256 | SeTakeOwnershipPrivilege Take ownership of files or other objects
|
---|
257 | SeLoadDriverPrivilege Load and unload device drivers
|
---|
258 | SeSystemProfilePrivilege Profile system performance
|
---|
259 | SeSystemtimePrivilege Change the system time
|
---|
260 | SeProfileSingleProcessPrivilege Profile single process
|
---|
261 | SeIncreaseBasePriorityPrivilege Increase scheduling priority
|
---|
262 | SeCreatePagefilePrivilege Create a pagefile
|
---|
263 | SeCreatePermanentPrivilege Create permanent shared objects
|
---|
264 | SeBackupPrivilege Back up files and directories
|
---|
265 | SeRestorePrivilege Restore files and directories
|
---|
266 | SeShutdownPrivilege Shut down the system
|
---|
267 | SeDebugPrivilege Debug programs
|
---|
268 | SeAuditPrivilege Generate security audits
|
---|
269 | SeSystemEnvironmentPrivilege Modify firmware environment values
|
---|
270 | SeChangeNotifyPrivilege Bypass traverse checking
|
---|
271 | SeRemoteShutdownPrivilege Force shutdown from a remote system
|
---|
272 | </pre><p>
|
---|
273 | And Windows 200x/XP Domain Controllers and workstations reports to support the following privileges:
|
---|
274 | <a class="indexterm" name="id377636"></a>
|
---|
275 | <a class="indexterm" name="id377642"></a>
|
---|
276 | <a class="indexterm" name="id377649"></a>
|
---|
277 | <a class="indexterm" name="id377656"></a>
|
---|
278 | <a class="indexterm" name="id377663"></a>
|
---|
279 | <a class="indexterm" name="id377670"></a>
|
---|
280 | <a class="indexterm" name="id377677"></a>
|
---|
281 | <a class="indexterm" name="id377684"></a>
|
---|
282 | <a class="indexterm" name="id377690"></a>
|
---|
283 | <a class="indexterm" name="id377697"></a>
|
---|
284 | <a class="indexterm" name="id377704"></a>
|
---|
285 | <a class="indexterm" name="id377711"></a>
|
---|
286 | <a class="indexterm" name="id377718"></a>
|
---|
287 | <a class="indexterm" name="id377725"></a>
|
---|
288 | <a class="indexterm" name="id377732"></a>
|
---|
289 | <a class="indexterm" name="id377739"></a>
|
---|
290 | <a class="indexterm" name="id377746"></a>
|
---|
291 | <a class="indexterm" name="id377752"></a>
|
---|
292 | <a class="indexterm" name="id377759"></a>
|
---|
293 | <a class="indexterm" name="id377766"></a>
|
---|
294 | <a class="indexterm" name="id377773"></a>
|
---|
295 | <a class="indexterm" name="id377780"></a>
|
---|
296 | <a class="indexterm" name="id377786"></a>
|
---|
297 | <a class="indexterm" name="id377793"></a>
|
---|
298 | <a class="indexterm" name="id377800"></a>
|
---|
299 | <a class="indexterm" name="id377807"></a>
|
---|
300 | <a class="indexterm" name="id377814"></a>
|
---|
301 | <a class="indexterm" name="id377821"></a>
|
---|
302 | <a class="indexterm" name="id377828"></a>
|
---|
303 | </p><pre class="screen">
|
---|
304 | SeCreateTokenPrivilege Create a token object
|
---|
305 | SeAssignPrimaryTokenPrivilege Replace a process level token
|
---|
306 | SeLockMemoryPrivilege Lock pages in memory
|
---|
307 | SeIncreaseQuotaPrivilege Increase quotas
|
---|
308 | SeMachineAccountPrivilege Add workstations to domain
|
---|
309 | SeTcbPrivilege Act as part of the operating system
|
---|
310 | SeSecurityPrivilege Manage auditing and security log
|
---|
311 | SeTakeOwnershipPrivilege Take ownership of files or other objects
|
---|
312 | SeLoadDriverPrivilege Load and unload device drivers
|
---|
313 | SeSystemProfilePrivilege Profile system performance
|
---|
314 | SeSystemtimePrivilege Change the system time
|
---|
315 | SeProfileSingleProcessPrivilege Profile single process
|
---|
316 | SeIncreaseBasePriorityPrivilege Increase scheduling priority
|
---|
317 | SeCreatePagefilePrivilege Create a pagefile
|
---|
318 | SeCreatePermanentPrivilege Create permanent shared objects
|
---|
319 | SeBackupPrivilege Back up files and directories
|
---|
320 | SeRestorePrivilege Restore files and directories
|
---|
321 | SeShutdownPrivilege Shut down the system
|
---|
322 | SeDebugPrivilege Debug programs
|
---|
323 | SeAuditPrivilege Generate security audits
|
---|
324 | SeSystemEnvironmentPrivilege Modify firmware environment values
|
---|
325 | SeChangeNotifyPrivilege Bypass traverse checking
|
---|
326 | SeRemoteShutdownPrivilege Force shutdown from a remote system
|
---|
327 | SeUndockPrivilege Remove computer from docking station
|
---|
328 | SeSyncAgentPrivilege Synchronize directory service data
|
---|
329 | SeEnableDelegationPrivilege Enable computer and user accounts to
|
---|
330 | be trusted for delegation
|
---|
331 | SeManageVolumePrivilege Perform volume maintenance tasks
|
---|
332 | SeImpersonatePrivilege Impersonate a client after authentication
|
---|
333 | SeCreateGlobalPrivilege Create global objects
|
---|
334 | </pre><p>
|
---|
335 | <a class="indexterm" name="id377871"></a>
|
---|
336 | The Samba Team is implementing only those privileges that are logical and useful in the UNIX/Linux
|
---|
337 | environment. Many of the Windows 200X/XP privileges have no direct equivalence in UNIX.
|
---|
338 | </p></div></div><div class="sect1" title="The Administrator Domain SID"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id377883"></a>The Administrator Domain SID</h2></div></div></div><p>
|
---|
339 | <a class="indexterm" name="id377890"></a>
|
---|
340 | <a class="indexterm" name="id377897"></a>
|
---|
341 | <a class="indexterm" name="id377904"></a>
|
---|
342 | <a class="indexterm" name="id377911"></a>
|
---|
343 | <a class="indexterm" name="id377918"></a>
|
---|
344 | Please note that every Windows NT4 and later server requires a domain Administrator account. Samba versions
|
---|
345 | commencing with 3.0.11 permit Administrative duties to be performed via assigned rights and privileges
|
---|
346 | (see <a class="link" href="rights.html" title="Chapter 15. User Rights and Privileges">User Rights and Privileges</a>). An account in the server's passdb backend can
|
---|
347 | be set to the well-known RID of the default administrator account. To obtain the domain SID on a Samba domain
|
---|
348 | controller, run the following command:
|
---|
349 | </p><pre class="screen">
|
---|
350 | <code class="prompt">root# </code> net getlocalsid
|
---|
351 | SID for domain FOO is: S-1-5-21-4294955119-3368514841-2087710299
|
---|
352 | </pre><p>
|
---|
353 | <a class="indexterm" name="id377947"></a>
|
---|
354 | You may assign the domain administrator RID to an account using the <code class="literal">pdbedit</code>
|
---|
355 | command as shown here:
|
---|
356 | <a class="indexterm" name="id377960"></a>
|
---|
357 | </p><pre class="screen">
|
---|
358 | <code class="prompt">root# </code> pdbedit -U S-1-5-21-4294955119-3368514841-2087710299-500 -u root -r
|
---|
359 | </pre><p>
|
---|
360 | </p><div class="note" title="Note" style="margin-left: 0.5in; margin-right: 0.5in;"><h3 class="title">Note</h3><p>
|
---|
361 | <a class="indexterm" name="id377983"></a>
|
---|
362 | <a class="indexterm" name="id377990"></a>
|
---|
363 | <a class="indexterm" name="id377997"></a>
|
---|
364 | <a class="indexterm" name="id378004"></a>
|
---|
365 | The RID 500 is the well known standard value of the default Administrator account. It is the RID
|
---|
366 | that confers the rights and privileges that the Administrator account has on a Windows machine
|
---|
367 | or domain. Under UNIX/Linux the equivalent is UID=0 (the root account).
|
---|
368 | </p></div><p>
|
---|
369 | <a class="indexterm" name="id378016"></a>
|
---|
370 | <a class="indexterm" name="id378023"></a>
|
---|
371 | <a class="indexterm" name="id378030"></a>
|
---|
372 | <a class="indexterm" name="id378037"></a>
|
---|
373 | Releases of Samba version 3.0.11 and later make it possible to operate without an Administrator account
|
---|
374 | provided equivalent rights and privileges have been established for a Windows user or a Windows
|
---|
375 | group account.
|
---|
376 | </p></div><div class="sect1" title="Common Errors"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id378048"></a>Common Errors</h2></div></div></div><div class="sect2" title="What Rights and Privileges Will Permit Windows Client Administration?"><div class="titlepage"><div><div><h3 class="title"><a name="id378053"></a>What Rights and Privileges Will Permit Windows Client Administration?</h3></div></div></div><p>
|
---|
377 | <a class="indexterm" name="id378061"></a>
|
---|
378 | <a class="indexterm" name="id378068"></a>
|
---|
379 | <a class="indexterm" name="id378075"></a>
|
---|
380 | <a class="indexterm" name="id378082"></a>
|
---|
381 | When a Windows NT4 (or later) client joins a domain, the domain global <code class="literal">Domain Admins</code> group
|
---|
382 | is added to the membership of the local <code class="literal">Administrators</code> group on the client. Any user who is
|
---|
383 | a member of the domain global <code class="literal">Domain Admins</code> group will have administrative rights on the
|
---|
384 | Windows client.
|
---|
385 | </p><p>
|
---|
386 | <a class="indexterm" name="id378112"></a>
|
---|
387 | <a class="indexterm" name="id378118"></a>
|
---|
388 | <a class="indexterm" name="id378125"></a>
|
---|
389 | <a class="indexterm" name="id378132"></a>
|
---|
390 | <a class="indexterm" name="id378139"></a>
|
---|
391 | This is often not the most desirable solution because it means that the user will have administrative
|
---|
392 | rights and privileges on domain servers also. The <code class="literal">Power Users</code> group on Windows client
|
---|
393 | workstations permits local administration of the workstation alone. Any domain global user or domain global
|
---|
394 | group can be added to the membership of the local workstation group <code class="literal">Power Users</code>.
|
---|
395 | </p><p>
|
---|
396 | <a class="indexterm" name="id378164"></a>
|
---|
397 | <a class="indexterm" name="id378171"></a>
|
---|
398 | <a class="indexterm" name="id378178"></a>
|
---|
399 | <a class="indexterm" name="id378184"></a>
|
---|
400 | See <a class="link" href="NetCommand.html#nestedgrpmgmgt" title="Nested Group Support">Nested Group Support</a> for an example of how to add domain users
|
---|
401 | and groups to a local group that is on a Windows workstation. The use of the <code class="literal">net</code>
|
---|
402 | command permits this to be done from the Samba server.
|
---|
403 | </p><p>
|
---|
404 | <a class="indexterm" name="id378210"></a>
|
---|
405 | <a class="indexterm" name="id378216"></a>
|
---|
406 | <a class="indexterm" name="id378223"></a>
|
---|
407 | Another way this can be done is to log onto the Windows workstation as the user
|
---|
408 | <code class="literal">Administrator</code>, then open a <code class="literal">cmd</code> shell, then execute:
|
---|
409 | </p><pre class="screen">
|
---|
410 | <code class="prompt">C:\> </code> net localgroup administrators /add <strong class="userinput"><code>domain_name\entity</code></strong>
|
---|
411 | </pre><p>
|
---|
412 | where <code class="literal">entity</code> is either a domain user or a domain group account name.
|
---|
413 | </p></div></div></div><div class="navfooter"><hr><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="idmapper.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="optional.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="AccessControls.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">Chapter 14. Identity Mapping (IDMAP) </td><td width="20%" align="center"><a accesskey="h" href="index.html">Home</a></td><td width="40%" align="right" valign="top"> Chapter 16. File, Directory, and Share Access Controls</td></tr></table></div></body></html>
|
---|