Ignore:
Timestamp:
Aug 7, 2008, 11:49:04 AM (17 years ago)
Author:
Paul Smedley
Message:

Update trunk to 3.2.1

File:
1 edited

Legend:

Unmodified
Added
Removed
  • trunk/samba/docs/manpages/smb.conf.5

    r138 r141  
    22.\"    Author:
    33.\" Generator: DocBook XSL Stylesheets v1.73.1 <http://docbook.sf.net/>
    4 .\"      Date: 06/26/2008
     4.\"      Date: 08/01/2008
    55.\"    Manual: File Formats and Conventions
    66.\"    Source: Samba 3.2
    77.\"
    8 .TH "SMB\.CONF" "5" "06/26/2008" "Samba 3\.2" "File Formats and Conventions"
     8.TH "SMB\.CONF" "5" "08/01/2008" "Samba 3\.2" "File Formats and Conventions"
    99.\" disable hyphenation
    1010.nh
     
    702702set on them, which causes new files and directories created within it to inherit the group ownership from the containing directory\.
    703703.sp
    704 This is parameter has been marked deprecated in Samba 3\.0\.23\. The same behavior is now implemented by the
     704This is parameter has been was deprecated in Samba 3\.0\.23, but re\-activated in Samba 3\.0\.31 and above, as it now only controls permission changes if the user is in the owning primary group\. It is now no longer equivalent to the
    705705\fIdos filemode\fR
    706706option\.
     
    25642564.PP
    25652565.RS 4
    2566 The default behavior in Samba is to provide UNIX\-like behavior where only the owner of a file/directory is able to change the permissions on it\. However, this behavior is often confusing to DOS/Windows users\. Enabling this parameter allows a user who has write access to the file (by whatever means) to modify the permissions (including ACL) on it\. Note that a user belonging to the group owning the file will not be allowed to change permissions if the group is only granted read access\. Ownership of the file/directory may also be changed\.
     2566The default behavior in Samba is to provide UNIX\-like behavior where only the owner of a file/directory is able to change the permissions on it\. However, this behavior is often confusing to DOS/Windows users\. Enabling this parameter allows a user who has write access to the file (by whatever means, including an ACL permission) to modify the permissions (including ACL) on it\. Note that a user belonging to the group owning the file will not be allowed to change permissions if the group is only granted read access\. Ownership of the file/directory may also be changed\.
    25672567.sp
    25682568Default:
     
    34743474The idmap backend provides a plugin interface for Winbind to use varying backends to store SID/uid/gid mapping tables\. This option is mutually exclusive with the newer and more flexible
    34753475\fIidmap domains\fR
    3476 parameter\. The main difference between the "idmap backend" and the "idmap domains" is that the former only allows on backend for all domains while the latter supports configuring backends on a per domain basis\.
     3476parameter\. The main difference between the "idmap backend" and the "idmap domains" is that the former only allows one backend for all domains while the latter supports configuring backends on a per domain basis\.
    34773477.sp
    34783478Examples of SID/uid/gid backends include tdb (\fBidmap_tdb\fR(8)), ldap (\fBidmap_ldap\fR(8)), rid (\fBidmap_rid\fR(8)), and ad (\fBidmap_tdb\fR(8))\.
     
    34963496The idmap config prefix provides a means of managing each domain defined by the
    34973497\fIidmap domains\fR
    3498 option using Samba\'s parameteric option support\. The idmap config prefix should be followed by the name of the domain, a colon, and a setting specific to the chosen backend\. There are three options available for all domains:
     3498option using Samba\'s parametric option support\. The idmap config prefix should be followed by the name of the domain, a colon, and a setting specific to the chosen backend\. There are three options available for all domains:
    34993499.PP
    35003500backend = backend_name
     
    35183518for the CORP domain and the
    35193519\fBidmap_tdb\fR(8)
    3520 backend for all other domains\. The TRUSTEDDOMAINS string is simply a key used to reference the "idmap config" settings and does not represent the actual name of a domain\.
     3520backend for all other domains\. The TRUSTEDDOMAINS string is simply an arbitrary key used to reference the "idmap config" settings and does not represent the actual name of a domain\. It is a catchall domain backend for any domain not explicitly listed\.
    35213521.sp
    35223522.RS 4
     
    65416541.RE
    65426542Default:
    6543 \fI\fIpassword server\fR\fR\fI = \fR\fI\fR\fI \fR
     6543\fI\fIpassword server\fR\fR\fI = \fR\fI*\fR\fI \fR
    65446544.sp
    65456545Example:
     
    65486548Example:
    65496549\fI\fIpassword server\fR\fR\fI = \fR\fIwindc\.mydomain\.com:389 192\.168\.1\.101 *\fR\fI \fR
    6550 .sp
    6551 Example:
    6552 \fI\fIpassword server\fR\fR\fI = \fR\fI*\fR\fI \fR
    65536550.RE
    65546551
     
    67846781.RE
    67856782
    6786 printcap name (S)
     6783printcap name (G)
    67876784.PP
    67886785.RS 4
     
    85028499\fByes\fR
    85038500the program specified in the
    8504 \fIpasswd program\fRparameter is called
     8501\fIpasswd program\fR
     8502parameter is called
    85058503\fIAS ROOT\fR
    85068504\- to allow the new UNIX password to be set without access to the old UNIX password (as the SMB password change code has no access to the old password cleartext, only the new)\.
Note: See TracChangeset for help on using the changeset viewer.