Changeset 274 for branches/samba-3.3.x/docs-xml
- Timestamp:
- Jun 17, 2009, 2:19:52 PM (16 years ago)
- Location:
- branches/samba-3.3.x/docs-xml
- Files:
-
- 13 edited
Legend:
- Unmodified
- Added
- Removed
-
branches/samba-3.3.x/docs-xml/Samba3-ByExample/SBE-KerberosFastStart.xml
r217 r274 1369 1369 <orderedlist> 1370 1370 <listitem><para> 1371 A user opens a Wor kdocument from a network drive. The file was owned by user <constant>janetp</constant>1371 A user opens a Word document from a network drive. The file was owned by user <constant>janetp</constant> 1372 1372 and <group>users</group>, and was set read/write-enabled for everyone. 1373 A user opens a Word document from a network drive. The file was owned by user <constant>janetp</constant> 1374 and <constant>users</constant>, and was set read/write-enabled for everyone. 1373 1375 </para></listitem> 1374 1376 -
branches/samba-3.3.x/docs-xml/Samba3-HOWTO/TOSHARG-FastStart.xml
r217 r274 1215 1215 <smbconfoption name="ldap group suffix">ou=People</smbconfoption> 1216 1216 <smbconfoption name="ldap idmap suffix">ou=People</smbconfoption> 1217 <smbconfoption name="ldap admin dn">cn=Manager </smbconfoption>1217 <smbconfoption name="ldap admin dn">cn=Manager,dc=quenya,dc=org</smbconfoption> 1218 1218 <smbconfoption name="ldap ssl">no</smbconfoption> 1219 1219 <smbconfoption name="ldap passwd sync">Yes</smbconfoption> … … 1282 1282 <smbconfoption name="ldap group suffix">ou=People</smbconfoption> 1283 1283 <smbconfoption name="ldap idmap suffix">ou=People</smbconfoption> 1284 <smbconfoption name="ldap admin dn">cn=Manager </smbconfoption>1284 <smbconfoption name="ldap admin dn">cn=Manager,dc=quenya,dc=org</smbconfoption> 1285 1285 <smbconfoption name="ldap ssl">no</smbconfoption> 1286 1286 <smbconfoption name="ldap passwd sync">Yes</smbconfoption> -
branches/samba-3.3.x/docs-xml/Samba3-HOWTO/TOSHARG-Install.xml
r217 r274 335 335 <varlistentry><term>nmbd</term> 336 336 <listitem><para> 337 <indexterm><primary> smbd</primary></indexterm>338 <indexterm><primary>starting samba</primary><secondary> smbd</secondary></indexterm>337 <indexterm><primary>nmbd</primary></indexterm> 338 <indexterm><primary>starting samba</primary><secondary>nmbd</secondary></indexterm> 339 339 This daemon handles all name registration and resolution requests. It is the primary vehicle involved 340 340 in network browsing. It handles all UDP-based protocols. The <command>nmbd</command> daemon should … … 345 345 <varlistentry><term>smbd</term> 346 346 <listitem><para> 347 <indexterm><primary> nmbd</primary></indexterm>348 <indexterm><primary>starting samba</primary><secondary> nmbd</secondary></indexterm>347 <indexterm><primary>smbd</primary></indexterm> 348 <indexterm><primary>starting samba</primary><secondary>smbd</secondary></indexterm> 349 349 This daemon handles all TCP/IP-based connection services for file- and print-based operations. It also 350 350 manages local authentication. It should be started immediately following the startup of <command>nmbd</command>. … … 468 468 be adopted is to do all documentation and configuration in a file that has another name, such as 469 469 <filename>smb.conf.master</filename>. The <command>testparm</command> utility can be used to generate a 470 fully optimized &smb.conf; file from this master configuration and docum tenation file as shown here:470 fully optimized &smb.conf; file from this master configuration and documentation file as shown here: 471 471 <screen> 472 472 &rootprompt; testparm -s smb.conf.master > smb.conf … … 485 485 <indexterm><primary>swat</primary></indexterm> 486 486 SWAT is a Web-based interface that can be used to facilitate the configuration of Samba. SWAT might not 487 be available in the Samba package that shipped with your platform, but in a separate package. If it is 488 necesaary to built SWAT please read the SWAT man page regarding compilation, installation, and 487 be available in the Samba package that shipped with your platform, but in a separate package. If you need to build SWAT please read the SWAT man page regarding compilation, installation, and 489 488 configuration of SWAT from the source code. 490 489 </para> … … 499 498 <para> 500 499 SWAT can be used from a browser on any IP-connected machine, but be aware that connecting from a remote 501 machine leaves your connection open to password sniffing because passwords will be sent over the wire in the clear. 502 </para> 503 504 <para> 500 machine leaves your connection open to password sniffing because passwords will be sent over the wire in the clear. 501 </para> 502 503 <para> 504 Please note that re-writing the configuration file using SWAT will 505 remove all comments! 505 506 More information about SWAT can be found in <link linkend="SWAT">The Samba Web Administration Tool</link>. 506 507 </para> -
branches/samba-3.3.x/docs-xml/Samba3-HOWTO/TOSHARG-PDC.xml
r217 r274 307 307 SSO implementations utilize centralization of all user account information. Depending on environmental 308 308 complexity and the age of the systems over which a SSO solution is implemented, it may not be possible to 309 change the solution architecture so as to accom odate a new identity management and user authentication system.309 change the solution architecture so as to accommodate a new identity management and user authentication system. 310 310 Many SSO solutions involving legacy systems consist of a new super-structure that handles authentication on 311 311 behalf of the user. The software that gets layered over the old system may simply implement a proxy … … 376 376 alternative specification called WS-Security. Some believe that the competing technologies and methods may 377 377 converge when the SAML 2.0 standard is introduced. A few Web access-management products support SAML today, 378 but implement ion of the technology mostly requires customization to integrate applications and develop user379 interfaces. In a nu st-shell, that is why FIM is a big and growing industry.378 but implementation of the technology mostly requires customization to integrate applications and develop user 379 interfaces. In a nutshell, that is why FIM is a big and growing industry. 380 380 </para> 381 381 -
branches/samba-3.3.x/docs-xml/Samba3-HOWTO/TOSHARG-Passdb.xml
r217 r274 758 758 The POSIX and sambaSamAccount components of computer (machine) accounts are both used by Samba. 759 759 Thus, machine accounts are treated inside Samba in the same way that Windows NT4/200X treats 760 them. A user account and a machine account are indistin quishable from each other, except that760 them. A user account and a machine account are indistinguishable from each other, except that 761 761 the machine account ends in a $ character, as do trust accounts. 762 762 </para> … … 1051 1051 </row> 1052 1052 <row> 1053 <entry><para>Mi mimum Password Length</para></entry>1053 <entry><para>Minimum Password Length</para></entry> 1054 1054 <entry><para>min password length</para></entry> 1055 1055 <entry><para>1 - 14 (Chars)</para></entry> … … 1616 1616 account policy value for maximum password age was 4294967295 1617 1617 account policy value for maximum password age is now 7776000 1618 &rootprompt; pdbedit -P "minimum password age" -C 71618 &rootprompt; pdbedit -P "minimum password age" -C 604800 1619 1619 account policy value for minimum password age was 0 1620 1620 account policy value for minimum password age is now 7 … … 1736 1736 <indexterm><primary>lookups</primary></indexterm> 1737 1737 The first problem is that all lookups must be performed sequentially. Given that 1738 there are approximately two lookups per domain logon (one during in tial logon validation1738 there are approximately two lookups per domain logon (one during initial logon validation 1739 1739 and one for a session connection setup, such as when mapping a network drive or printer), this 1740 1740 is a performance bottleneck for large sites. What is needed is an indexed approach … … 2627 2627 2628 2628 <sect3> 2629 <title>Using OpenLDAP Overlay for Password Sync ronization</title>2629 <title>Using OpenLDAP Overlay for Password Synchronization</title> 2630 2630 2631 2631 <para> -
branches/samba-3.3.x/docs-xml/Samba3-HOWTO/TOSHARG-VFS.xml
r217 r274 277 277 <para> 278 278 <indexterm><primary>logging</primary></indexterm> 279 This auditing tool is more f elxible than most people readily willrecognize. There are a number of ways279 This auditing tool is more flexible than most people will readily recognize. There are a number of ways 280 280 by which useful logging information can be recorded. 281 281 </para> -
branches/samba-3.3.x/docs-xml/Samba3-HOWTO/TOSHARG-foreword-cargill.xml
r217 r274 39 39 <para> 40 40 A <emphasis>good standard</emphasis> survives because people know how to use it. People know how to use a 41 standard when it is so transparent, so obvious, and so easy that it become invisible. And a standard becomes41 standard when it is so transparent, so obvious, and so easy that it becomes invisible. And a standard becomes 42 42 invisible only when the documentation describing how to deploy it is clear, unambiguous, and correct. These 43 43 three elements must be present for a standard to be useful, allowing communication and interaction between two -
branches/samba-3.3.x/docs-xml/Samba3-HOWTO/index.xml
r217 r274 4 4 <book id="Samba-HOWTO-Collection" 5 5 xmlns:xi="http://www.w3.org/2003/XInclude"> 6 <title>The Official Samba 3. 2.x HOWTO and Reference Guide</title>6 <title>The Official Samba 3.3.x HOWTO and Reference Guide</title> 7 7 8 8 <bookinfo> -
branches/samba-3.3.x/docs-xml/Samba3-HOWTO/manpages.xml
r217 r274 23 23 <xi:include href="../manpages-3/nmblookup.1.xml"/> 24 24 <xi:include href="../manpages-3/ntlm_auth.1.xml"/> 25 <xi:include href="../manpages-3/pam_winbind. 7.xml"/>25 <xi:include href="../manpages-3/pam_winbind.8.xml"/> 26 26 <xi:include href="../manpages-3/pdbedit.8.xml"/> 27 27 <xi:include href="../manpages-3/profiles.1.xml"/> -
branches/samba-3.3.x/docs-xml/manpages-3/net.8.xml
r224 r274 1583 1583 1584 1584 <refsect2> 1585 <title>DOM</title> 1586 1587 <para>Starting with version 3.2.0 Samba has support for remote join and unjoin APIs, both client and server-side. Windows supports remote join capabilities since Windows 2000. 1588 </para> 1589 <para>In order for Samba to be joined or unjoined remotely an account must be used that is either member of the Domain Admins group, a member of the local Administrators group or a user that is granted the SeMachineAccountPrivilege privilege. 1590 </para> 1591 1592 <para>The client side support for remote join is implemented in the net dom commands which are: 1593 <simplelist> 1594 <member>net dom join - Join a remote computer into a domain.</member> 1595 <member>net dom unjoin - Unjoin a remote computer from a domain.</member> 1596 </simplelist> 1597 </para> 1598 1599 <refsect3> 1600 <title>DOM JOIN <replaceable>domain=DOMAIN</replaceable> <replaceable>ou=OU</replaceable> <replaceable>account=ACCOUNT</replaceable> <replaceable>password=PASSWORD</replaceable> <replaceable>reboot</replaceable></title> 1601 1602 <para> 1603 Joins a computer into a domain. This command supports the following additional parameters: 1604 </para> 1605 1606 <itemizedlist> 1607 1608 <listitem><para><replaceable>DOMAIN</replaceable> can be a NetBIOS domain name (also known as short domain name) or a DNS domain name for Active Directory Domains. As in Windows, it is also possible to control which Domain Controller to use. This can be achieved by appending the DC name using the \ separator character. Example: MYDOM\MYDC. The <replaceable>DOMAIN</replaceable> parameter cannot be NULL.</para></listitem> 1609 1610 <listitem><para><replaceable>OU</replaceable> can be set to a RFC 1779 LDAP DN, like <emphasis>ou=mymachines,cn=Users,dc=example,dc=com</emphasis> in order to create the machine account in a non-default LDAP containter. This optional parameter is only supported when joining Active Directory Domains.</para></listitem> 1611 1612 <listitem><para><replaceable>ACCOUNT</replaceable> defines a domain account that will be used to join the machine to the domain. This domain account needs to have sufficient privileges to join machines.</para></listitem> 1613 1614 <listitem><para><replaceable>PASSWORD</replaceable> defines the password for the domain account defined with <replaceable>ACCOUNT</replaceable>.</para></listitem> 1615 1616 <listitem><para><replaceable>REBOOT</replaceable> is an optional parameter that can be set to reboot the remote machine after successful join to the domain.</para></listitem> 1617 1618 </itemizedlist> 1619 1620 <para> 1621 Note that you also need to use standard net paramters to connect and authenticate to the remote machine that you want to join. These additional parameters include: -S computer and -U user. 1622 </para> 1623 <para> 1624 Example: 1625 net dom join -S xp -U XP\\administrator%secret domain=MYDOM account=MYDOM\\administrator password=topsecret reboot. 1626 </para> 1627 <para> 1628 This example would connect to a computer named XP as the local administrator using password secret, and join the computer into a domain called MYDOM using the MYDOM domain administrator account and password topsecret. After successful join, the computer would reboot. 1629 </para> 1630 1631 </refsect3> 1632 1633 <refsect3> 1634 <title>DOM UNJOIN <replaceable>account=ACCOUNT</replaceable> <replaceable>password=PASSWORD</replaceable> <replaceable>reboot</replaceable></title> 1635 1636 <para> 1637 Unjoins a computer from a domain. This command supports the following additional parameters: 1638 </para> 1639 1640 <itemizedlist> 1641 1642 <listitem><para><replaceable>ACCOUNT</replaceable> defines a domain account that will be used to unjoin the machine from the domain. This domain account needs to have sufficient privileges to unjoin machines.</para></listitem> 1643 1644 <listitem><para><replaceable>PASSWORD</replaceable> defines the password for the domain account defined with <replaceable>ACCOUNT</replaceable>.</para></listitem> 1645 1646 <listitem><para><replaceable>REBOOT</replaceable> is an optional parameter that can be set to reboot the remote machine after successful unjoin from the domain.</para></listitem> 1647 1648 </itemizedlist> 1649 1650 <para> 1651 Note that you also need to use standard net paramters to connect and authenticate to the remote machine that you want to unjoin. These additional parameters include: -S computer and -U user. 1652 </para> 1653 <para> 1654 Example: 1655 net dom unjoin -S xp -U XP\\administrator%secret account=MYDOM\\administrator password=topsecret reboot. 1656 </para> 1657 <para> 1658 This example would connect to a computer named XP as the local administrator using password secret, and unjoin the computer from the domain using the MYDOM domain administrator account and password topsecret. After successful unjoin, the computer would reboot. 1659 </para> 1660 1661 </refsect3> 1662 1663 </refsect2> 1664 1665 <refsect2> 1666 1585 1667 <title>HELP [COMMAND]</title> 1586 1668 -
branches/samba-3.3.x/docs-xml/smbdotconf/logon/abortshutdownscript.xml
r217 r274 10 10 11 11 <para>If the connected user posseses the <constant>SeRemoteShutdownPrivilege</constant>, 12 right, this command will be run as user.</para>12 right, this command will be run as root.</para> 13 13 </description> 14 14 <value type="default">""</value> -
branches/samba-3.3.x/docs-xml/smbdotconf/logon/shutdownscript.xml
r217 r274 11 11 12 12 <para>If the connected user posseses the <constant>SeRemoteShutdownPrivilege</constant>, 13 right, this command will be run as user.</para>13 right, this command will be run as root.</para> 14 14 15 15 <para>The %z %t %r %f variables are expanded as follows:</para> … … 43 43 <programlisting format="linespecific"> 44 44 #!/bin/bash 45 46 $time=0 47 let "time/60"48 let "time++"45 46 time=$2 47 let time="${time} / 60" 48 let time="${time} + 1" 49 49 50 50 /sbin/shutdown $3 $4 +$time $1 & 51 51 52 </programlisting> 52 53 Shutdown does not return so we need to launch it in background. -
branches/samba-3.3.x/docs-xml/smbdotconf/protocol/unixextensions.xml
r217 r274 5 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 6 <description> 7 <para>This boolean parameter controls whether Samba 8 impl ments the CIFS UNIX extensions, as defined by HP.7 <para>This boolean parameter controls whether Samba 8 implements the CIFS UNIX extensions, as defined by HP. 9 9 These extensions enable Samba to better serve UNIX CIFS clients 10 10 by supporting features such as symbolic links, hard links, etc...
Note:
See TracChangeset
for help on using the changeset viewer.