Changeset 134 for branches/samba-3.0/docs/manpages/smbcacls.1
- Timestamp:
- May 23, 2008, 6:56:41 AM (17 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
branches/samba-3.0/docs/manpages/smbcacls.1
r44 r134 1 .\"Generated by db2man.xsl. Don't modify this, modify the source. 2 .de Sh \" Subsection 3 .br 4 .if t .Sp 5 .ne 5 6 .PP 7 \fB\\$1\fR 8 .PP 9 .. 10 .de Sp \" Vertical space (when we can't use .PP) 11 .if t .sp .5v 12 .if n .sp 13 .. 14 .de Ip \" List item 15 .br 16 .ie \\n(.$>=3 .ne \\$3 17 .el .ne 3 18 .IP "\\$1" \\$2 19 .. 20 .TH "SMBCACLS" 1 "" "" "" 1 .\" Title: smbcacls 2 .\" Author: 3 .\" Generator: DocBook XSL Stylesheets v1.73.2 <http://docbook.sf.net/> 4 .\" Date: 05/21/2008 5 .\" Manual: User Commands 6 .\" Source: Samba 3.0 7 .\" 8 .TH "SMBCACLS" "1" "05/21/2008" "Samba 3\.0" "User Commands" 9 .\" disable hyphenation 10 .nh 11 .\" disable justification (adjust text to left margin only) 12 .ad l 21 13 .SH "NAME" 22 14 smbcacls - Set or get ACLs on an NT file or directory names 23 15 .SH "SYNOPSIS" 24 16 .HP 1 25 smbcacls {//server/share} {filename} [ -D acls] [-M acls] [-a acls] [-S acls] [-C name] [-G name] [--numeric] [-t] [-U username] [-h] [-d]17 smbcacls {//server/share} {filename} [\-D\ acls] [\-M\ acls] [\-a\ acls] [\-S\ acls] [\-C\ name] [\-G\ name] [\-\-numeric] [\-t] [\-U\ username] [\-h] [\-d] 26 18 .SH "DESCRIPTION" 27 19 .PP 28 20 This tool is part of the 29 21 \fBsamba\fR(7) 30 suite .22 suite\. 31 23 .PP 32 24 The 33 25 smbcacls 34 program manipulates NT Access Control Lists (ACLs) on SMB file shares .26 program manipulates NT Access Control Lists (ACLs) on SMB file shares\. 35 27 .SH "OPTIONS" 36 28 .PP 37 29 The following options are available to the 38 30 smbcacls 39 program . The format of ACLs is described in the section ACL FORMAT40 .PP 41 -a acls42 .RS 3n43 Add the ACLs specified to the ACL list . Existing access control entries are unchanged.44 .RE 45 .PP 46 -M acls47 .RS 3n48 Modify the mask value (permissions) for the ACLs specified on the command line . An error will be printed for each ACL specified that was not already present in the ACL list49 .RE 50 .PP 51 -D acls52 .RS 3n53 Delete any ACLs specified on the command line . An error will be printed for each ACL specified that was not already present in the ACL list.54 .RE 55 .PP 56 -S acls57 .RS 3n58 This command sets the ACLs on the file with only the ones specified on the command line . All other ACLs are erased. Note that the ACL specified must contain at least a revision, type, owner and group for the call to succeed.59 .RE 60 .PP 61 -U username62 .RS 3n63 Specifies a username used to connect to the specified service . The username may be of the form "username" in which case the user is prompted to enter in a password and the workgroup specified in the31 program\. The format of ACLs is described in the section ACL FORMAT 32 .PP 33 \-a acls 34 .RS 4 35 Add the ACLs specified to the ACL list\. Existing access control entries are unchanged\. 36 .RE 37 .PP 38 \-M acls 39 .RS 4 40 Modify the mask value (permissions) for the ACLs specified on the command line\. An error will be printed for each ACL specified that was not already present in the ACL list 41 .RE 42 .PP 43 \-D acls 44 .RS 4 45 Delete any ACLs specified on the command line\. An error will be printed for each ACL specified that was not already present in the ACL list\. 46 .RE 47 .PP 48 \-S acls 49 .RS 4 50 This command sets the ACLs on the file with only the ones specified on the command line\. All other ACLs are erased\. Note that the ACL specified must contain at least a revision, type, owner and group for the call to succeed\. 51 .RE 52 .PP 53 \-U username 54 .RS 4 55 Specifies a username used to connect to the specified service\. The username may be of the form "username" in which case the user is prompted to enter in a password and the workgroup specified in the 64 56 \fBsmb.conf\fR(5) 65 file is used, or "username%password" or "DOMAIN\ username%password" and the password and workgroup names are used as provided.66 .RE 67 .PP 68 -C name69 .RS 3n57 file is used, or "username%password" or "DOMAIN\eusername%password" and the password and workgroup names are used as provided\. 58 .RE 59 .PP 60 \-C name 61 .RS 4 70 62 The owner of a file or directory can be changed to the name given using the 71 \fI -C\fR72 option . The name can be a sid in the form S-1-x-y-z or a name resolved against the server specified in the first argument.73 .sp 74 This command is a shortcut for -M OWNER:name.75 .RE 76 .PP 77 -G name78 .RS 3n63 \fI\-C\fR 64 option\. The name can be a sid in the form S\-1\-x\-y\-z or a name resolved against the server specified in the first argument\. 65 .sp 66 This command is a shortcut for \-M OWNER:name\. 67 .RE 68 .PP 69 \-G name 70 .RS 4 79 71 The group owner of a file or directory can be changed to the name given using the 80 \fI-G\fR 81 option. The name can be a sid in the form S-1-x-y-z or a name resolved against the server specified n the first argument. 82 .sp 83 This command is a shortcut for -M GROUP:name. 84 .RE 85 .PP 86 --numeric 87 .RS 3n 88 This option displays all ACL information in numeric format. The default is to convert SIDs to names and ACE types and masks to a readable string format. 89 .RE 90 .PP 91 -t 92 .RS 3n 93 Don't actually do anything, only validate the correctness of the arguments. 94 .RE 95 .PP 96 -h|--help 97 .RS 3n 98 Print a summary of command line options. 99 .RE 100 .PP 101 -V 102 .RS 3n 103 Prints the program version number. 104 .RE 105 .PP 106 -s <configuration file> 107 .RS 3n 108 The file specified contains the configuration details required by the server. The information in this file includes server-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide. See 109 \fIsmb.conf\fR 110 for more information. The default configuration file name is determined at compile time. 111 .RE 112 .PP 113 -d|--debuglevel=level 114 .RS 3n 72 \fI\-G\fR 73 option\. The name can be a sid in the form S\-1\-x\-y\-z or a name resolved against the server specified n the first argument\. 74 .sp 75 This command is a shortcut for \-M GROUP:name\. 76 .RE 77 .PP 78 \-\-numeric 79 .RS 4 80 This option displays all ACL information in numeric format\. The default is to convert SIDs to names and ACE types and masks to a readable string format\. 81 .RE 82 .PP 83 \-t 84 .RS 4 85 Don\'t actually do anything, only validate the correctness of the arguments\. 86 .RE 87 .PP 88 \-h|\-\-help 89 .RS 4 90 Print a summary of command line options\. 91 .RE 92 .PP 93 \-d|\-\-debuglevel=level 94 .RS 4 115 95 \fIlevel\fR 116 is an integer from 0 to 10 . The default value if this parameter is not specified is zero.117 .sp 118 The higher this value, the more detail will be logged to the log files about the activities of the server . At level 0, only critical errors and serious warnings will be logged. Level 1 is a reasonable level for day-to-day running - it generates a small amount of information about operations carried out.119 .sp 120 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem . Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic.96 is an integer from 0 to 10\. The default value if this parameter is not specified is 0\. 97 .sp 98 The higher this value, the more detail will be logged to the log files about the activities of the server\. At level 0, only critical errors and serious warnings will be logged\. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\. 99 .sp 100 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\. 121 101 .sp 122 102 Note that specifying this parameter here will override the 123 103 \fIlog level\fR 124 104 parameter in the 125 \fIsmb.conf\fR 126 file. 127 .RE 128 .PP 129 -l|--logfile=logdirectory 130 .RS 3n 131 Base directory name for log/debug files. The extension 132 \fB".progname"\fR 133 will be appended (e.g. log.smbclient, log.smbd, etc...). The log file is never removed by the client. 105 \fIsmb\.conf\fR 106 file\. 107 .RE 108 .PP 109 \-V 110 .RS 4 111 Prints the program version number\. 112 .RE 113 .PP 114 \-s <configuration file> 115 .RS 4 116 The file specified contains the configuration details required by the server\. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\. See 117 \fIsmb\.conf\fR 118 for more information\. The default configuration file name is determined at compile time\. 119 .RE 120 .PP 121 \-l|\-\-log\-basename=logdirectory 122 .RS 4 123 Base directory name for log/debug files\. The extension 124 \fB"\.progname"\fR 125 will be appended (e\.g\. log\.smbclient, log\.smbd, etc\.\.\.)\. The log file is never removed by the client\. 134 126 .RE 135 127 .SH "ACL FORMAT" 136 128 .PP 137 The format of an ACL is one or more ACL entries separated by either commas or newlines. An ACL entry is one of the following: 138 .PP 139 140 .sp 141 129 The format of an ACL is one or more ACL entries separated by either commas or newlines\. An ACL entry is one of the following: 130 .PP 131 .RS 4 142 132 .nf 143 133 … … 146 136 GROUP:<sid or name> 147 137 ACL:<sid or name>:<type>/<flags>/<mask> 148 149 138 .fi 150 151 .PP 152 The revision of the ACL specifies the internal Windows NT ACL revision for the security descriptor. If not specified it defaults to 1. Using values other than 1 may cause strange behaviour. 153 .PP 154 The owner and group specify the owner and group sids for the object. If a SID in the format S-1-x-y-z is specified this is used, otherwise the name specified is resolved using the server on which the file or directory resides. 155 .PP 156 ACLs specify permissions granted to the SID. This SID again can be specified in S-1-x-y-z format or as a name in which case it is resolved against the server on which the file or directory resides. The type, flags and mask values determine the type of access granted to the SID. 157 .PP 158 The type can be either 0 or 1 corresponding to ALLOWED or DENIED access to the SID. The flags values are generally zero for file ACLs and either 9 or 2 for directory ACLs. Some common flags are: 159 .TP 3n 160 \(bu 139 .RE 140 .PP 141 The revision of the ACL specifies the internal Windows NT ACL revision for the security descriptor\. If not specified it defaults to 1\. Using values other than 1 may cause strange behaviour\. 142 .PP 143 The owner and group specify the owner and group sids for the object\. If a SID in the format S\-1\-x\-y\-z is specified this is used, otherwise the name specified is resolved using the server on which the file or directory resides\. 144 .PP 145 ACLs specify permissions granted to the SID\. This SID again can be specified in S\-1\-x\-y\-z format or as a name in which case it is resolved against the server on which the file or directory resides\. The type, flags and mask values determine the type of access granted to the SID\. 146 .PP 147 The type can be either 0 or 1 corresponding to ALLOWED or DENIED access to the SID\. The flags values are generally zero for file ACLs and either 9 or 2 for directory ACLs\. Some common flags are: 148 .sp 149 .RS 4 150 .ie n \{\ 151 \h'-04'\(bu\h'+03'\c 152 .\} 153 .el \{\ 154 .sp -1 155 .IP \(bu 2.3 156 .\} 161 157 \fB#define SEC_ACE_FLAG_OBJECT_INHERIT 0x1\fR 162 .TP 3n 163 \(bu 158 .RE 159 .sp 160 .RS 4 161 .ie n \{\ 162 \h'-04'\(bu\h'+03'\c 163 .\} 164 .el \{\ 165 .sp -1 166 .IP \(bu 2.3 167 .\} 164 168 \fB#define SEC_ACE_FLAG_CONTAINER_INHERIT 0x2\fR 165 .TP 3n 166 \(bu 169 .RE 170 .sp 171 .RS 4 172 .ie n \{\ 173 \h'-04'\(bu\h'+03'\c 174 .\} 175 .el \{\ 176 .sp -1 177 .IP \(bu 2.3 178 .\} 167 179 \fB#define SEC_ACE_FLAG_NO_PROPAGATE_INHERIT 0x4\fR 168 .TP 3n 169 \(bu 180 .RE 181 .sp 182 .RS 4 183 .ie n \{\ 184 \h'-04'\(bu\h'+03'\c 185 .\} 186 .el \{\ 187 .sp -1 188 .IP \(bu 2.3 189 .\} 170 190 \fB#define SEC_ACE_FLAG_INHERIT_ONLY 0x8\fR 171 .PP 172 At present flags can only be specified as decimal or hexadecimal values. 173 .PP 174 The mask is a value which expresses the access right granted to the SID. It can be given as a decimal or hexadecimal value, or by using one of the following text strings which map to the NT file permissions of the same name. 175 .TP 3n 176 \(bu 177 \fBR\fR 178 - Allow read access 179 .TP 3n 180 \(bu 181 \fBW\fR 182 - Allow write access 183 .TP 3n 184 \(bu 185 \fBX\fR 186 - Execute permission on the object 187 .TP 3n 188 \(bu 189 \fBD\fR 190 - Delete the object 191 .TP 3n 192 \(bu 193 \fBP\fR 194 - Change permissions 195 .TP 3n 196 \(bu 197 \fBO\fR 198 - Take ownership 191 .sp 192 .RE 193 .PP 194 At present flags can only be specified as decimal or hexadecimal values\. 195 .PP 196 The mask is a value which expresses the access right granted to the SID\. It can be given as a decimal or hexadecimal value, or by using one of the following text strings which map to the NT file permissions of the same name\. 197 .sp 198 .RS 4 199 .ie n \{\ 200 \h'-04'\(bu\h'+03'\c 201 .\} 202 .el \{\ 203 .sp -1 204 .IP \(bu 2.3 205 .\} 206 \fIR\fR 207 \- Allow read access 208 .RE 209 .sp 210 .RS 4 211 .ie n \{\ 212 \h'-04'\(bu\h'+03'\c 213 .\} 214 .el \{\ 215 .sp -1 216 .IP \(bu 2.3 217 .\} 218 \fIW\fR 219 \- Allow write access 220 .RE 221 .sp 222 .RS 4 223 .ie n \{\ 224 \h'-04'\(bu\h'+03'\c 225 .\} 226 .el \{\ 227 .sp -1 228 .IP \(bu 2.3 229 .\} 230 \fIX\fR 231 \- Execute permission on the object 232 .RE 233 .sp 234 .RS 4 235 .ie n \{\ 236 \h'-04'\(bu\h'+03'\c 237 .\} 238 .el \{\ 239 .sp -1 240 .IP \(bu 2.3 241 .\} 242 \fID\fR 243 \- Delete the object 244 .RE 245 .sp 246 .RS 4 247 .ie n \{\ 248 \h'-04'\(bu\h'+03'\c 249 .\} 250 .el \{\ 251 .sp -1 252 .IP \(bu 2.3 253 .\} 254 \fIP\fR 255 \- Change permissions 256 .RE 257 .sp 258 .RS 4 259 .ie n \{\ 260 \h'-04'\(bu\h'+03'\c 261 .\} 262 .el \{\ 263 .sp -1 264 .IP \(bu 2.3 265 .\} 266 \fIO\fR 267 \- Take ownership 268 .sp 269 .RE 199 270 .PP 200 271 The following combined permissions can be specified: 201 .TP 3n 202 \(bu 203 \fBREAD\fR 204 - Equivalent to 'RX' permissions 205 .TP 3n 206 \(bu 207 \fBCHANGE\fR 208 - Equivalent to 'RXWD' permissions 209 .TP 3n 210 \(bu 211 \fBFULL\fR 212 - Equivalent to 'RWXDPO' permissions 272 .sp 273 .RS 4 274 .ie n \{\ 275 \h'-04'\(bu\h'+03'\c 276 .\} 277 .el \{\ 278 .sp -1 279 .IP \(bu 2.3 280 .\} 281 \fIREAD\fR 282 \- Equivalent to \'RX\' permissions 283 .RE 284 .sp 285 .RS 4 286 .ie n \{\ 287 \h'-04'\(bu\h'+03'\c 288 .\} 289 .el \{\ 290 .sp -1 291 .IP \(bu 2.3 292 .\} 293 \fICHANGE\fR 294 \- Equivalent to \'RXWD\' permissions 295 .RE 296 .sp 297 .RS 4 298 .ie n \{\ 299 \h'-04'\(bu\h'+03'\c 300 .\} 301 .el \{\ 302 .sp -1 303 .IP \(bu 2.3 304 .\} 305 \fIFULL\fR 306 \- Equivalent to \'RWXDPO\' permissions 213 307 .SH "EXIT STATUS" 214 308 .PP 215 309 The 216 310 smbcacls 217 program sets the exit status depending on the success or otherwise of the operations performed . The exit status may be one of the following values.218 .PP 219 If the operation succeeded, smbcacls returns and exit status of 0 . If220 smbcacls 221 couldn 't connect to the specified server, or there was an error getting or setting the ACLs, an exit status of 1 is returned. If there was an error parsing any command line arguments, an exit status of 2 is returned.311 program sets the exit status depending on the success or otherwise of the operations performed\. The exit status may be one of the following values\. 312 .PP 313 If the operation succeeded, smbcacls returns and exit status of 0\. If 314 smbcacls 315 couldn\'t connect to the specified server, or there was an error getting or setting the ACLs, an exit status of 1 is returned\. If there was an error parsing any command line arguments, an exit status of 2 is returned\. 222 316 .SH "VERSION" 223 317 .PP 224 This man page is correct for version 3 .0 of the Samba suite.318 This man page is correct for version 3\.0 of the Samba suite\. 225 319 .SH "AUTHOR" 226 320 .PP 227 The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed. 228 .PP 229 smbcacls 230 was written by Andrew Tridgell and Tim Potter. 231 .PP 232 The conversion to DocBook for Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 was done by Alexander Bokovoy. 233 321 The original Samba software and related utilities were created by Andrew Tridgell\. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed\. 322 .PP 323 smbcacls 324 was written by Andrew Tridgell and Tim Potter\. 325 .PP 326 The conversion to DocBook for Samba 2\.2 was done by Gerald Carter\. The conversion to DocBook XML 4\.2 for Samba 3\.0 was done by Alexander Bokovoy\.
Note:
See TracChangeset
for help on using the changeset viewer.