Ignore:
Timestamp:
Mar 1, 2010, 3:05:48 PM (15 years ago)
Author:
Herwig Bauernfeind
Message:

Update Samba 3.3.x to 3.3.11

File:
1 edited

Legend:

Unmodified
Added
Removed
  • branches/samba-3.3.x/docs/htmldocs/Samba3-HOWTO/NetCommand.html

    r368 r411  
    1 <html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Chapter 13. Remote and Local Management: The Net Command</title><link rel="stylesheet" href="../samba.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.75.2"><link rel="home" href="index.html" title="The Official Samba 3.3.x HOWTO and Reference Guide"><link rel="up" href="optional.html" title="Part III. Advanced Configuration"><link rel="prev" href="groupmapping.html" title="Chapter 12. Group Mapping: MS Windows and UNIX"><link rel="next" href="idmapper.html" title="Chapter 14. Identity Mapping (IDMAP)"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Chapter 13. Remote and Local Management: The Net Command</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="groupmapping.html">Prev</a> </td><th width="60%" align="center">Part III. Advanced Configuration</th><td width="20%" align="right"> <a accesskey="n" href="idmapper.html">Next</a></td></tr></table><hr></div><div class="chapter" title="Chapter 13. Remote and Local Management: The Net Command"><div class="titlepage"><div><div><h2 class="title"><a name="NetCommand"></a>Chapter 13. Remote and Local Management: The Net Command</h2></div><div><div class="author"><h3 class="author"><span class="firstname">John</span> <span class="othername">H.</span> <span class="surname">Terpstra</span></h3><div class="affiliation"><span class="orgname">Samba Team<br></span><div class="address"><p><code class="email">&lt;<a class="email" href="mailto:jht@samba.org">jht@samba.org</a>&gt;</code></p></div></div></div></div><div><div class="author"><h3 class="author"><span class="firstname">Volker</span> <span class="surname">Lendecke</span></h3><div class="affiliation"><span class="orgname">Samba Team<br></span><div class="address"><p><code class="email">&lt;<a class="email" href="mailto:Volker.Lendecke@SerNet.DE">Volker.Lendecke@SerNet.DE</a>&gt;</code></p></div></div></div></div><div><div class="author"><h3 class="author"><span class="firstname">Guenther</span> <span class="surname">Deschner</span></h3><div class="affiliation"><span class="orgname">Samba Team<br></span><div class="address"><p><code class="email">&lt;<a class="email" href="mailto:gd@samba.org">gd@samba.org</a>&gt;</code></p></div></div></div></div><div><p class="pubdate">May 9, 2005</p></div></div></div><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="sect1"><a href="NetCommand.html#id2605091">Overview</a></span></dt><dt><span class="sect1"><a href="NetCommand.html#id2605385">Administrative Tasks and Methods</a></span></dt><dt><span class="sect1"><a href="NetCommand.html#id2605466">UNIX and Windows Group Management</a></span></dt><dd><dl><dt><span class="sect2"><a href="NetCommand.html#id2605625">Adding, Renaming, or Deletion of Group Accounts</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#grpmemshipchg">Manipulating Group Memberships</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#nestedgrpmgmgt">Nested Group Support</a></span></dt></dl></dd><dt><span class="sect1"><a href="NetCommand.html#id2606994">UNIX and Windows User Management</a></span></dt><dd><dl><dt><span class="sect2"><a href="NetCommand.html#sbeuseraddn">Adding User Accounts</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#id2607206">Deletion of User Accounts</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#id2607254">Managing User Accounts</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#id2607322">User Mapping</a></span></dt></dl></dd><dt><span class="sect1"><a href="NetCommand.html#id2607406">Administering User Rights and Privileges</a></span></dt><dt><span class="sect1"><a href="NetCommand.html#id2607751">Managing Trust Relationships</a></span></dt><dd><dl><dt><span class="sect2"><a href="NetCommand.html#id2607766">Machine Trust Accounts</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#id2608135">Interdomain Trusts</a></span></dt></dl></dd><dt><span class="sect1"><a href="NetCommand.html#id2608369">Managing Security Identifiers (SIDS)</a></span></dt><dt><span class="sect1"><a href="NetCommand.html#id2608591">Share Management</a></span></dt><dd><dl><dt><span class="sect2"><a href="NetCommand.html#id2608636">Creating, Editing, and Removing Shares</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#id2608824">Creating and Changing Share ACLs</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#id2608854">Share, Directory, and File Migration</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#id2609477">Printer Migration</a></span></dt></dl></dd><dt><span class="sect1"><a href="NetCommand.html#id2609728">Controlling Open Files</a></span></dt><dt><span class="sect1"><a href="NetCommand.html#id2609747">Session and Connection Management</a></span></dt><dt><span class="sect1"><a href="NetCommand.html#id2609812">Printers and ADS</a></span></dt><dt><span class="sect1"><a href="NetCommand.html#id2609928">Manipulating the Samba Cache</a></span></dt><dt><span class="sect1"><a href="NetCommand.html#id2609946">Managing IDMAP UID/SID Mappings</a></span></dt><dd><dl><dt><span class="sect2"><a href="NetCommand.html#id2609990">Creating an IDMAP Database Dump File</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#id2610025">Restoring the IDMAP Database Dump File</a></span></dt></dl></dd><dt><span class="sect1"><a href="NetCommand.html#netmisc1">Other Miscellaneous Operations</a></span></dt></dl></div><p>
    2 <a class="indexterm" name="id2604952"></a>
    3 <a class="indexterm" name="id2604959"></a>
    4 <a class="indexterm" name="id2604966"></a>
    5 <a class="indexterm" name="id2604973"></a>
     1<html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Chapter 13. Remote and Local Management: The Net Command</title><link rel="stylesheet" href="../samba.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.74.0"><link rel="home" href="index.html" title="The Official Samba 3.3.x HOWTO and Reference Guide"><link rel="up" href="optional.html" title="Part III. Advanced Configuration"><link rel="prev" href="groupmapping.html" title="Chapter 12. Group Mapping: MS Windows and UNIX"><link rel="next" href="idmapper.html" title="Chapter 14. Identity Mapping (IDMAP)"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Chapter 13. Remote and Local Management: The Net Command</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="groupmapping.html">Prev</a> </td><th width="60%" align="center">Part III. Advanced Configuration</th><td width="20%" align="right"> <a accesskey="n" href="idmapper.html">Next</a></td></tr></table><hr></div><div class="chapter" lang="en"><div class="titlepage"><div><div><h2 class="title"><a name="NetCommand"></a>Chapter 13. Remote and Local Management: The Net Command</h2></div><div><div class="author"><h3 class="author"><span class="firstname">John</span> <span class="othername">H.</span> <span class="orgname">Samba Team</span> <span class="surname">Terpstra</span></h3><div class="affiliation"><span class="orgname">Samba Team<br></span><div class="address"><p><code class="email">&lt;<a class="email" href="mailto:jht@samba.org">jht@samba.org</a>&gt;</code></p></div></div></div></div><div><div class="author"><h3 class="author"><span class="firstname">Volker</span> <span class="orgname">Samba Team</span> <span class="surname">Lendecke</span></h3><div class="affiliation"><span class="orgname">Samba Team<br></span><div class="address"><p><code class="email">&lt;<a class="email" href="mailto:Volker.Lendecke@SerNet.DE">Volker.Lendecke@SerNet.DE</a>&gt;</code></p></div></div></div></div><div><div class="author"><h3 class="author"><span class="firstname">Guenther</span> <span class="orgname">Samba Team</span> <span class="surname">Deschner</span></h3><div class="affiliation"><span class="orgname">Samba Team<br></span><div class="address"><p><code class="email">&lt;<a class="email" href="mailto:gd@samba.org">gd@samba.org</a>&gt;</code></p></div></div></div></div><div><p class="pubdate">May 9, 2005</p></div></div></div><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="sect1"><a href="NetCommand.html#id2599005">Overview</a></span></dt><dt><span class="sect1"><a href="NetCommand.html#id2599300">Administrative Tasks and Methods</a></span></dt><dt><span class="sect1"><a href="NetCommand.html#id2599381">UNIX and Windows Group Management</a></span></dt><dd><dl><dt><span class="sect2"><a href="NetCommand.html#id2599539">Adding, Renaming, or Deletion of Group Accounts</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#grpmemshipchg">Manipulating Group Memberships</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#nestedgrpmgmgt">Nested Group Support</a></span></dt></dl></dd><dt><span class="sect1"><a href="NetCommand.html#id2600908">UNIX and Windows User Management</a></span></dt><dd><dl><dt><span class="sect2"><a href="NetCommand.html#sbeuseraddn">Adding User Accounts</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#id2601120">Deletion of User Accounts</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#id2601168">Managing User Accounts</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#id2601237">User Mapping</a></span></dt></dl></dd><dt><span class="sect1"><a href="NetCommand.html#id2601320">Administering User Rights and Privileges</a></span></dt><dt><span class="sect1"><a href="NetCommand.html#id2601665">Managing Trust Relationships</a></span></dt><dd><dl><dt><span class="sect2"><a href="NetCommand.html#id2601680">Machine Trust Accounts</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#id2602049">Interdomain Trusts</a></span></dt></dl></dd><dt><span class="sect1"><a href="NetCommand.html#id2602283">Managing Security Identifiers (SIDS)</a></span></dt><dt><span class="sect1"><a href="NetCommand.html#id2602505">Share Management</a></span></dt><dd><dl><dt><span class="sect2"><a href="NetCommand.html#id2602550">Creating, Editing, and Removing Shares</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#id2602738">Creating and Changing Share ACLs</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#id2602768">Share, Directory, and File Migration</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#id2603391">Printer Migration</a></span></dt></dl></dd><dt><span class="sect1"><a href="NetCommand.html#id2603642">Controlling Open Files</a></span></dt><dt><span class="sect1"><a href="NetCommand.html#id2603661">Session and Connection Management</a></span></dt><dt><span class="sect1"><a href="NetCommand.html#id2603727">Printers and ADS</a></span></dt><dt><span class="sect1"><a href="NetCommand.html#id2603842">Manipulating the Samba Cache</a></span></dt><dt><span class="sect1"><a href="NetCommand.html#id2603860">Managing IDMAP UID/SID Mappings</a></span></dt><dd><dl><dt><span class="sect2"><a href="NetCommand.html#id2603904">Creating an IDMAP Database Dump File</a></span></dt><dt><span class="sect2"><a href="NetCommand.html#id2603939">Restoring the IDMAP Database Dump File</a></span></dt></dl></dd><dt><span class="sect1"><a href="NetCommand.html#netmisc1">Other Miscellaneous Operations</a></span></dt></dl></div><p>
     2<a class="indexterm" name="id2598866"></a>
     3<a class="indexterm" name="id2598873"></a>
     4<a class="indexterm" name="id2598880"></a>
     5<a class="indexterm" name="id2598887"></a>
    66The <code class="literal">net</code> command is one of the new features of Samba-3 and is an attempt to provide a useful
    77tool for the majority of remote management operations necessary for common tasks. The <code class="literal">net</code>
    88tool is flexible by design and is intended for command-line use as well as for scripted control application.
    99</p><p>
    10 <a class="indexterm" name="id2604999"></a>
    11 <a class="indexterm" name="id2605006"></a>
    12 <a class="indexterm" name="id2605013"></a>
    13 <a class="indexterm" name="id2605020"></a>
     10<a class="indexterm" name="id2598913"></a>
     11<a class="indexterm" name="id2598920"></a>
     12<a class="indexterm" name="id2598927"></a>
     13<a class="indexterm" name="id2598934"></a>
    1414Originally introduced with the intent to mimic the Microsoft Windows command that has the same name, the
    1515<code class="literal">net</code> command has morphed into a very powerful instrument that has become an essential part
     
    2323A Samba-3 administrator cannot afford to gloss over this chapter because to do so will almost certainly cause
    2424the infliction of self-induced pain, agony, and desperation. Be warned: this is an important chapter.
    25 </p><div class="sect1" title="Overview"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2605091"></a>Overview</h2></div></div></div><p>
    26 <a class="indexterm" name="id2605099"></a>
    27 <a class="indexterm" name="id2605106"></a>
    28 <a class="indexterm" name="id2605113"></a>
    29 <a class="indexterm" name="id2605119"></a>
    30 <a class="indexterm" name="id2605126"></a>
    31 <a class="indexterm" name="id2605132"></a>
     25</p><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2599005"></a>Overview</h2></div></div></div><p>
     26<a class="indexterm" name="id2599013"></a>
     27<a class="indexterm" name="id2599020"></a>
     28<a class="indexterm" name="id2599027"></a>
     29<a class="indexterm" name="id2599033"></a>
     30<a class="indexterm" name="id2599040"></a>
     31<a class="indexterm" name="id2599046"></a>
    3232        The tasks that follow the installation of a Samba-3 server, whether standalone or domain member, of a
    3333        domain controller (PDC or BDC) begins with the need to create administrative rights. Of course, the
     
    3636        the central domain authentication backend.
    3737        </p><p>
    38 <a class="indexterm" name="id2605150"></a>
    39 <a class="indexterm" name="id2605157"></a>
    40 <a class="indexterm" name="id2605164"></a>
    41 <a class="indexterm" name="id2605170"></a>
    42 <a class="indexterm" name="id2605177"></a>
    43 <a class="indexterm" name="id2605184"></a>
    44 <a class="indexterm" name="id2605190"></a>
    45 <a class="indexterm" name="id2605197"></a>
     38<a class="indexterm" name="id2599064"></a>
     39<a class="indexterm" name="id2599071"></a>
     40<a class="indexterm" name="id2599078"></a>
     41<a class="indexterm" name="id2599085"></a>
     42<a class="indexterm" name="id2599092"></a>
     43<a class="indexterm" name="id2599098"></a>
     44<a class="indexterm" name="id2599105"></a>
     45<a class="indexterm" name="id2599112"></a>
    4646        Regardless of the type of server being installed, local UNIX groups must be mapped to the Windows
    4747        networking domain global group accounts. Do you ask why? Because Samba always limits its access to
     
    5151        Samba. Such mappings are implemented using the <code class="literal">net</code> command.
    5252        </p><p>
    53 <a class="indexterm" name="id2605222"></a>
    54 <a class="indexterm" name="id2605229"></a>
    55 <a class="indexterm" name="id2605235"></a>
    56 <a class="indexterm" name="id2605242"></a>
    57 <a class="indexterm" name="id2605249"></a>
    58 <a class="indexterm" name="id2605256"></a>
    59 <a class="indexterm" name="id2605263"></a>
     53<a class="indexterm" name="id2599136"></a>
     54<a class="indexterm" name="id2599143"></a>
     55<a class="indexterm" name="id2599149"></a>
     56<a class="indexterm" name="id2599156"></a>
     57<a class="indexterm" name="id2599163"></a>
     58<a class="indexterm" name="id2599170"></a>
     59<a class="indexterm" name="id2599177"></a>
    6060        UNIX systems that are hosting a Samba-3 server that is running as a member (PDC, BDC, or DMS) must have
    6161        a machine security account in the domain authentication database (or directory). The creation of such
    6262        security (or trust) accounts is also handled using the <code class="literal">net</code> command.
    6363        </p><p>
    64 <a class="indexterm" name="id2605283"></a>
    65 <a class="indexterm" name="id2605290"></a>
    66 <a class="indexterm" name="id2605296"></a>
    67 <a class="indexterm" name="id2605303"></a>
    68 <a class="indexterm" name="id2605310"></a>
    69 <a class="indexterm" name="id2605317"></a>
    70 <a class="indexterm" name="id2605324"></a>
    71 <a class="indexterm" name="id2605331"></a>
    72 <a class="indexterm" name="id2605338"></a>
     64<a class="indexterm" name="id2599197"></a>
     65<a class="indexterm" name="id2599204"></a>
     66<a class="indexterm" name="id2599210"></a>
     67<a class="indexterm" name="id2599217"></a>
     68<a class="indexterm" name="id2599224"></a>
     69<a class="indexterm" name="id2599231"></a>
     70<a class="indexterm" name="id2599238"></a>
     71<a class="indexterm" name="id2599245"></a>
     72<a class="indexterm" name="id2599252"></a>
    7373        The establishment of interdomain trusts is achieved using the <code class="literal">net</code> command also, as
    7474        may a plethora of typical administrative duties such as user management, group management, share and
    7575        printer management, file and printer migration, security identifier management, and so on.
    7676        </p><p>
    77 <a class="indexterm" name="id2605358"></a>
    78 <a class="indexterm" name="id2605365"></a>
     77<a class="indexterm" name="id2599273"></a>
     78<a class="indexterm" name="id2599279"></a>
    7979        The overall picture should be clear now: the <code class="literal">net</code> command plays a central role
    8080        on the Samba-3 stage. This role will continue to be developed. The inclusion of this chapter is
    8181        evidence of its importance, one that has grown in complexity to the point that it is no longer considered
    8282        prudent to cover its use fully in the online UNIX man pages.
    83         </p></div><div class="sect1" title="Administrative Tasks and Methods"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2605385"></a>Administrative Tasks and Methods</h2></div></div></div><p>
    84 <a class="indexterm" name="id2605394"></a>
    85 <a class="indexterm" name="id2605400"></a>
    86 <a class="indexterm" name="id2605407"></a>
    87 <a class="indexterm" name="id2605416"></a>
     83        </p></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2599300"></a>Administrative Tasks and Methods</h2></div></div></div><p>
     84<a class="indexterm" name="id2599308"></a>
     85<a class="indexterm" name="id2599314"></a>
     86<a class="indexterm" name="id2599321"></a>
     87<a class="indexterm" name="id2599330"></a>
    8888        The basic operations of the <code class="literal">net</code> command are documented here. This documentation is not
    8989        exhaustive, and thus it is incomplete. Since the primary focus is on migration from Windows servers to a Samba
     
    9595        <code class="constant">rap</code> modes.  Please refer to the man page for a more comprehensive overview of the
    9696        capabilities of this utility.
    97         </p></div><div class="sect1" title="UNIX and Windows Group Management"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2605466"></a>UNIX and Windows Group Management</h2></div></div></div><p>
    98 <a class="indexterm" name="id2605475"></a>
    99 <a class="indexterm" name="id2605482"></a>
    100 <a class="indexterm" name="id2605490"></a>
    101 <a class="indexterm" name="id2605499"></a>
    102 <a class="indexterm" name="id2605508"></a>
     97        </p></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2599381"></a>UNIX and Windows Group Management</h2></div></div></div><p>
     98<a class="indexterm" name="id2599389"></a>
     99<a class="indexterm" name="id2599396"></a>
     100<a class="indexterm" name="id2599404"></a>
     101<a class="indexterm" name="id2599413"></a>
     102<a class="indexterm" name="id2599422"></a>
    103103        As stated, the focus in most of this chapter is on use of the <code class="literal">net rpc</code> family of
    104104        operations that are supported by Samba. Most of them are supported by the <code class="literal">net ads</code>
     
    107107        earlier SMB servers.
    108108        </p><p>
    109 <a class="indexterm" name="id2605541"></a>
    110 <a class="indexterm" name="id2605547"></a>
    111 <a class="indexterm" name="id2605554"></a>
     109<a class="indexterm" name="id2599455"></a>
     110<a class="indexterm" name="id2599461"></a>
     111<a class="indexterm" name="id2599468"></a>
    112112        Samba's <code class="literal">net</code> tool implements sufficient capability to permit all common administrative
    113113        tasks to be completed from the command line. In this section each of the essential user and group management
    114114        facilities are explored.
    115115        </p><p>
    116 <a class="indexterm" name="id2605574"></a>
    117 <a class="indexterm" name="id2605581"></a>
    118 <a class="indexterm" name="id2605590"></a>
    119 <a class="indexterm" name="id2605599"></a>
     116<a class="indexterm" name="id2599488"></a>
     117<a class="indexterm" name="id2599495"></a>
     118<a class="indexterm" name="id2599504"></a>
     119<a class="indexterm" name="id2599513"></a>
    120120        Samba-3 recognizes two types of groups: <span class="emphasis"><em>domain groups</em></span> and <span class="emphasis"><em>local
    121121        groups</em></span>. Domain groups can contain (have as members) only domain user accounts. Local groups
     
    124124        The purpose of a local group is to permit file permission to be set for a group account that, like the
    125125        usual UNIX/Linux group, is persistent across redeployment of a Windows file server.
    126         </p><div class="sect2" title="Adding, Renaming, or Deletion of Group Accounts"><div class="titlepage"><div><div><h3 class="title"><a name="id2605625"></a>Adding, Renaming, or Deletion of Group Accounts</h3></div></div></div><p>
     126        </p><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2599539"></a>Adding, Renaming, or Deletion of Group Accounts</h3></div></div></div><p>
    127127        Samba provides file and print services to Windows clients. The file system resources it makes available
    128128        to the Windows environment must, of necessity, be provided in a manner that is compatible with the
     
    144144        show how UNIX group members automatically pass-through to Windows group membership as soon as a logical
    145145        mapping has been created.
    146         </p><div class="sect3" title="Adding or Creating a New Group"><div class="titlepage"><div><div><h4 class="title"><a name="id2605667"></a>Adding or Creating a New Group</h4></div></div></div><p>
     146        </p><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2599581"></a>Adding or Creating a New Group</h4></div></div></div><p>
    147147        Before attempting to add a Windows group account, the currently available groups can be listed as shown
    148148        here:
    149 <a class="indexterm" name="id2605677"></a>
    150 <a class="indexterm" name="id2605688"></a>
     149<a class="indexterm" name="id2599591"></a>
     150<a class="indexterm" name="id2599602"></a>
    151151</p><pre class="screen">
    152152<code class="prompt">root# </code> net rpc group list -Uroot%not24get
     
    162162</pre><p>
    163163        </p><p>
    164         A Windows group account called <span class="quote">&#8220;<span class="quote">SupportEngrs</span>&#8221;</span> can be added by executing the following
     164        A Windows group account called &#8220;<span class="quote">SupportEngrs</span>&#8221; can be added by executing the following
    165165command:
    166 <a class="indexterm" name="id2605724"></a>
     166<a class="indexterm" name="id2599638"></a>
    167167</p><pre class="screen">
    168168<code class="prompt">root# </code> net rpc group add "SupportEngrs" -Uroot%not24get
     
    184184</pre><p>
    185185        </p><p>
    186 <a class="indexterm" name="id2605767"></a>
    187 <a class="indexterm" name="id2605774"></a>
    188 <a class="indexterm" name="id2605781"></a>
     186<a class="indexterm" name="id2599681"></a>
     187<a class="indexterm" name="id2599688"></a>
     188<a class="indexterm" name="id2599695"></a>
    189189        The following demonstrates that the POSIX (UNIX/Linux system account) group has been created by calling
    190190        the <a class="link" href="smb.conf.5.html#ADDGROUPSCRIPT" target="_top">add group script = /opt/IDEALX/sbin/smbldap-groupadd -p "%g"</a> interface
     
    206206results in immediate mapping of the POSIX group that has been created to the Windows group account as shown
    207207here:
    208 <a class="indexterm" name="id2605827"></a>
     208<a class="indexterm" name="id2599741"></a>
    209209</p><pre class="screen">
    210210<code class="prompt">root# </code> net groupmap list
     
    219219SupportEngrs (S-1-5-21-72630-4128915-11681869-3007) -&gt; SupportEngrs
    220220</pre><p>
    221         </p></div><div class="sect3" title="Mapping Windows Groups to UNIX Groups"><div class="titlepage"><div><div><h4 class="title"><a name="id2605869"></a>Mapping Windows Groups to UNIX Groups</h4></div></div></div><p>
    222 <a class="indexterm" name="id2605876"></a>
    223 <a class="indexterm" name="id2605883"></a>
    224 <a class="indexterm" name="id2605890"></a>
    225 <a class="indexterm" name="id2605897"></a>
     221        </p></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2599783"></a>Mapping Windows Groups to UNIX Groups</h4></div></div></div><p>
     222<a class="indexterm" name="id2599790"></a>
     223<a class="indexterm" name="id2599797"></a>
     224<a class="indexterm" name="id2599804"></a>
     225<a class="indexterm" name="id2599811"></a>
    226226        Windows groups must be mapped to UNIX system (POSIX) groups so that file system access controls
    227227        can be asserted in a manner that is consistent with the methods appropriate to the operating
    228228        system that is hosting the Samba server.
    229229        </p><p>
    230 <a class="indexterm" name="id2605911"></a>
    231 <a class="indexterm" name="id2605918"></a>
    232 <a class="indexterm" name="id2605924"></a>
    233 <a class="indexterm" name="id2605931"></a>
     230<a class="indexterm" name="id2599825"></a>
     231<a class="indexterm" name="id2599832"></a>
     232<a class="indexterm" name="id2599838"></a>
     233<a class="indexterm" name="id2599845"></a>
    234234        All file system (file and directory) access controls, within the file system of a UNIX/Linux server that is
    235235        hosting a Samba server, are implemented using a UID/GID identity tuple. Samba does not in any way override
     
    239239        command does not call any RPC-functions here but directly accesses the passdb.
    240240        </p><p>
    241 <a class="indexterm" name="id2605956"></a>
    242 <a class="indexterm" name="id2605963"></a>
    243 <a class="indexterm" name="id2605970"></a>
    244 <a class="indexterm" name="id2605977"></a>
    245 <a class="indexterm" name="id2605984"></a>
    246 <a class="indexterm" name="id2605991"></a>
    247 <a class="indexterm" name="id2605998"></a>
     241<a class="indexterm" name="id2599871"></a>
     242<a class="indexterm" name="id2599878"></a>
     243<a class="indexterm" name="id2599884"></a>
     244<a class="indexterm" name="id2599891"></a>
     245<a class="indexterm" name="id2599898"></a>
     246<a class="indexterm" name="id2599905"></a>
     247<a class="indexterm" name="id2599912"></a>
    248248        Samba depends on default mappings for the <code class="constant">Domain Admins, Domain Users</code>, and
    249249        <code class="constant">Domain Guests</code> global groups. Additional groups may be added as shown in the
     
    252252        of creation of the mapping.
    253253        </p><p>
    254 <a class="indexterm" name="id2606021"></a>
    255 <a class="indexterm" name="id2606033"></a>
    256 <a class="indexterm" name="id2606044"></a>
     254<a class="indexterm" name="id2599936"></a>
     255<a class="indexterm" name="id2599947"></a>
     256<a class="indexterm" name="id2599958"></a>
    257257        The operations that are permitted include: <code class="constant">add</code>, <code class="constant">modify</code>,
    258258        and <code class="constant">delete</code>. An example of each operation is shown here.
    259         </p><div class="note" title="Note" style="margin-left: 0.5in; margin-right: 0.5in;"><h3 class="title">Note</h3><p>
     259        </p><div class="note" style="margin-left: 0.5in; margin-right: 0.5in;"><h3 class="title">Note</h3><p>
    260260        Commencing with Samba-3.0.23 Windows Domain Groups must be explicitly created. By default, all
    261261        UNIX groups are exposed to Windows networking as Windows local groups.
     
    291291        treated as local to the individual Samba server. Local groups can be used with Samba to enable multiple
    292292        nested group support.
    293         </p></div><div class="sect3" title="Deleting a Group Account"><div class="titlepage"><div><div><h4 class="title"><a name="id2606176"></a>Deleting a Group Account</h4></div></div></div><p>
    294 <a class="indexterm" name="id2606184"></a>
     293        </p></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2600090"></a>Deleting a Group Account</h4></div></div></div><p>
     294<a class="indexterm" name="id2600098"></a>
    295295        A group account may be deleted by executing the following command:
    296296</p><pre class="screen">
     
    299299        </p><p>
    300300        Validation of the deletion is advisable. The same commands may be executed as shown above.
    301         </p></div><div class="sect3" title="Rename Group Accounts"><div class="titlepage"><div><div><h4 class="title"><a name="id2606216"></a>Rename Group Accounts</h4></div></div></div><div class="note" title="Note" style="margin-left: 0.5in; margin-right: 0.5in;"><h3 class="title">Note</h3><p>
     301        </p></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2600130"></a>Rename Group Accounts</h4></div></div></div><div class="note" style="margin-left: 0.5in; margin-right: 0.5in;"><h3 class="title">Note</h3><p>
    302302        This command is not documented in the man pages; it is implemented in the source code, but it does not
    303303        work at this time. The example given documents, from the source code, how it should work. Watch the
     
    306306        Sometimes it is necessary to rename a group account. Good administrators know how painful some managers'
    307307        demands can be if this simple request is ignored. The following command demonstrates how the Windows group
    308         <span class="quote">&#8220;<span class="quote">SupportEngrs</span>&#8221;</span> can be renamed to <span class="quote">&#8220;<span class="quote">CustomerSupport</span>&#8221;</span>:
    309 <a class="indexterm" name="id2606245"></a>
     308        &#8220;<span class="quote">SupportEngrs</span>&#8221; can be renamed to &#8220;<span class="quote">CustomerSupport</span>&#8221;:
     309<a class="indexterm" name="id2600159"></a>
    310310</p><pre class="screen">
    311311<code class="prompt">root# </code> net rpc group rename SupportEngrs \
    312312    CustomerSupport -Uroot%not24get
    313313</pre><p>
    314         </p></div></div><div class="sect2" title="Manipulating Group Memberships"><div class="titlepage"><div><div><h3 class="title"><a name="grpmemshipchg"></a>Manipulating Group Memberships</h3></div></div></div><p>
     314        </p></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="grpmemshipchg"></a>Manipulating Group Memberships</h3></div></div></div><p>
    315315        Three operations can be performed regarding group membership. It is possible to (1) add Windows users
    316316        to a Windows group, to (2) delete Windows users from Windows groups, and to (3) list the Windows users that are
     
    350350        group mapping, a member of the Windows group, an attempt to add this account again should fail. This is
    351351        demonstrated here:
    352 <a class="indexterm" name="id2606376"></a>
     352<a class="indexterm" name="id2600290"></a>
    353353</p><pre class="screen">
    354354<code class="prompt">root# </code> net rpc group addmem "MIDEARTH\Engineers" ajt -Uroot%not24get
     
    360360        To permit the user <code class="constant">ajt</code> to be added using the <code class="literal">net rpc group</code> utility,
    361361        this account must first be removed. The removal and confirmation of its effect is shown here:
    362 <a class="indexterm" name="id2606418"></a>
     362<a class="indexterm" name="id2600332"></a>
    363363</p><pre class="screen">
    364364<code class="prompt">root# </code> net rpc group delmem "MIDEARTH\Engineers" ajt -Uroot%not24get
     
    384384        the <code class="literal">net rpc group</code> utility. Note the this contents of the UNIX/Linux group was shown
    385385        four paragraphs earlier. The Windows (domain) group membership is shown here:
    386 <a class="indexterm" name="id2606515"></a>
     386<a class="indexterm" name="id2600429"></a>
    387387</p><pre class="screen">
    388388<code class="prompt">root# </code> net rpc group members "Domain Users" -Uroot%not24get
     
    403403MIDEARTH\vlendecke
    404404</pre><p>
    405         </p><div class="note" title="Note" style="margin-left: 0.5in; margin-right: 0.5in;"><h3 class="title">Note</h3><p>
     405        </p><div class="note" style="margin-left: 0.5in; margin-right: 0.5in;"><h3 class="title">Note</h3><p>
    406406        An attempt to specify the group name as <code class="constant">MIDEARTH\Domain Users</code> in place of
    407407        just simply <code class="constant">Domain Users</code> will fail. The default behavior of the net rpc group
     
    409409        If it is necessary to query another machine, its name can be specified using the <code class="constant">-S
    410410        servername</code> parameter to the <code class="literal">net</code> command.
    411         </p></div></div><div class="sect2" title="Nested Group Support"><div class="titlepage"><div><div><h3 class="title"><a name="nestedgrpmgmgt"></a>Nested Group Support</h3></div></div></div><p>
     411        </p></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="nestedgrpmgmgt"></a>Nested Group Support</h3></div></div></div><p>
    412412        It is possible in Windows (and now in Samba also) to create a local group that has members (contains),
    413413        domain users, and domain global groups.  Creation of the local group <code class="constant">demo</code> is
     
    422422        Addition and removal of group members can be achieved using the <code class="constant">addmem</code> and
    423423        <code class="constant">delmem</code> subcommands of <code class="literal">net rpc group</code> command. For example,
    424         addition of <span class="quote">&#8220;<span class="quote">DOM\Domain Users</span>&#8221;</span> to the local group <code class="constant">demo</code> would be
     424        addition of &#8220;<span class="quote">DOM\Domain Users</span>&#8221; to the local group <code class="constant">demo</code> would be
    425425        done by executing:
    426426</p><pre class="screen">
     
    441441<code class="prompt">root# </code> net rpc group delmem demo "DOM\jht" -Uroot%not24get
    442442</pre><p>
    443         </p><div class="sect3" title="Managing Nest Groups on Workstations from the Samba Server"><div class="titlepage"><div><div><h4 class="title"><a name="id2606695"></a>Managing Nest Groups on Workstations from the Samba Server</h4></div></div></div><p>
     443        </p><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2600610"></a>Managing Nest Groups on Workstations from the Samba Server</h4></div></div></div><p>
    444444        Windows network administrators often ask on the Samba mailing list how it is possible to grant everyone
    445445        administrative rights on their own workstation. This is of course a very bad practice, but commonly done
    446446        to avoid user complaints. Here is how it can be done remotely from a Samba PDC or BDC:
    447 <a class="indexterm" name="id2606709"></a>
     447<a class="indexterm" name="id2600623"></a>
    448448</p><pre class="screen">
    449449<code class="prompt">root# </code> net rpc group addmem "Administrators" "Domain Users" \
     
    453453        This can be scripted, and can therefore be performed as a user logs onto the domain from a Windows
    454454        workstation. Here is a simple example that shows how this can be done.
    455         </p><div class="procedure" title="Procedure 13.1. Automating User Addition to the Workstation Power Users Group"><a name="id2606741"></a><p class="title"><b>Procedure 13.1. Automating User Addition to the Workstation Power Users Group</b></p><div class="example"><a name="autopoweruserscript"></a><p class="title"><b>Example 13.1. Script to Auto-add Domain Users to Workstation Power Users Group</b></p><div class="example-contents"><pre class="screen">
     455        </p><div class="procedure"><a name="id2600655"></a><p class="title"><b>Procedure 13.1. Automating User Addition to the Workstation Power Users Group</b></p><div class="example"><a name="autopoweruserscript"></a><p class="title"><b>Example 13.1. Script to Auto-add Domain Users to Workstation Power Users Group</b></p><div class="example-contents"><pre class="screen">
    456456#!/bin/bash
    457457
     
    460460
    461461exit 0
    462 </pre></div></div><br class="example-break"><div class="example"><a name="magicnetlogon"></a><p class="title"><b>Example 13.2. A Magic Netlogon Share</b></p><div class="example-contents"><table border="0" summary="Simple list" class="simplelist"><tr><td> </td></tr><tr><td><em class="parameter"><code>[netlogon]</code></em></td></tr><tr><td><a class="indexterm" name="id2606896"></a><em class="parameter"><code>comment = Netlogon Share</code></em></td></tr><tr><td><a class="indexterm" name="id2606908"></a><em class="parameter"><code>path = /var/lib/samba/netlogon</code></em></td></tr><tr><td><a class="indexterm" name="id2606920"></a><em class="parameter"><code>root preexec = /etc/samba/scripts/autopoweruser.sh %U %m</code></em></td></tr><tr><td><a class="indexterm" name="id2606932"></a><em class="parameter"><code>read only = Yes</code></em></td></tr><tr><td><a class="indexterm" name="id2606944"></a><em class="parameter"><code>guest ok = Yes</code></em></td></tr></table></div></div><br class="example-break"><ol class="procedure" type="1"><li class="step" title="Step 1"><p>
     462</pre></div></div><br class="example-break"><div class="example"><a name="magicnetlogon"></a><p class="title"><b>Example 13.2. A Magic Netlogon Share</b></p><div class="example-contents"><table class="simplelist" border="0" summary="Simple list"><tr><td> </td></tr><tr><td><em class="parameter"><code>[netlogon]</code></em></td></tr><tr><td><a class="indexterm" name="id2600811"></a><em class="parameter"><code>comment = Netlogon Share</code></em></td></tr><tr><td><a class="indexterm" name="id2600822"></a><em class="parameter"><code>path = /var/lib/samba/netlogon</code></em></td></tr><tr><td><a class="indexterm" name="id2600834"></a><em class="parameter"><code>root preexec = /etc/samba/scripts/autopoweruser.sh %U %m</code></em></td></tr><tr><td><a class="indexterm" name="id2600846"></a><em class="parameter"><code>read only = Yes</code></em></td></tr><tr><td><a class="indexterm" name="id2600858"></a><em class="parameter"><code>guest ok = Yes</code></em></td></tr></table></div></div><br class="example-break"><ol type="1"><li><p>
    463463                Create the script shown in <a class="link" href="NetCommand.html#autopoweruserscript" title="Example 13.1. Script to Auto-add Domain Users to Workstation Power Users Group">&#8220;Script to Auto-add Domain Users to Workstation Power Users Group&#8221;</a> and locate it in
    464464                the directory <code class="filename">/etc/samba/scripts</code>, named as <code class="filename">autopoweruser.sh</code>.
    465 <a class="indexterm" name="id2606773"></a>
    466 <a class="indexterm" name="id2606784"></a>
    467 <a class="indexterm" name="id2606791"></a>
    468                 </p></li><li class="step" title="Step 2"><p>
     465<a class="indexterm" name="id2600687"></a>
     466<a class="indexterm" name="id2600698"></a>
     467<a class="indexterm" name="id2600705"></a>
     468                </p></li><li><p>
    469469                Set the permissions on this script to permit it to be executed as part of the logon process:
    470470</p><pre class="screen">
     
    472472<code class="prompt">root# </code> chmod 755 /etc/samba/autopoweruser.sh
    473473</pre><p>
    474                 </p></li><li class="step" title="Step 3"><p>
     474                </p></li><li><p>
    475475                Modify the <code class="filename">smb.conf</code> file so the <code class="literal">NETLOGON</code> stanza contains the parameters
    476476                shown in <a class="link" href="NetCommand.html#magicnetlogon" title="Example 13.2. A Magic Netlogon Share">the Netlogon Example smb.conf file</a>.
    477                 </p></li><li class="step" title="Step 4"><p>
     477                </p></li><li><p>
    478478                Ensure that every Windows workstation Administrator account has the same password that you
    479479                have used in the script shown in <a class="link" href="NetCommand.html#magicnetlogon" title="Example 13.2. A Magic Netlogon Share">the Netlogon Example smb.conf
     
    485485        for the use of this method is that it will guarantee that all users have appropriate rights on
    486486        the workstation.
    487         </p></div></div></div><div class="sect1" title="UNIX and Windows User Management"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2606994"></a>UNIX and Windows User Management</h2></div></div></div><p>
    488 <a class="indexterm" name="id2607002"></a>
    489 <a class="indexterm" name="id2607009"></a>
    490 <a class="indexterm" name="id2607016"></a>
    491 <a class="indexterm" name="id2607023"></a>
    492 <a class="indexterm" name="id2607030"></a>
    493 <a class="indexterm" name="id2607036"></a>
    494 <a class="indexterm" name="id2607043"></a>
    495 <a class="indexterm" name="id2607050"></a>
     487        </p></div></div></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2600908"></a>UNIX and Windows User Management</h2></div></div></div><p>
     488<a class="indexterm" name="id2600917"></a>
     489<a class="indexterm" name="id2600923"></a>
     490<a class="indexterm" name="id2600930"></a>
     491<a class="indexterm" name="id2600937"></a>
     492<a class="indexterm" name="id2600944"></a>
     493<a class="indexterm" name="id2600950"></a>
     494<a class="indexterm" name="id2600958"></a>
     495<a class="indexterm" name="id2600964"></a>
    496496        Every Windows network user account must be translated to a UNIX/Linux user account. In actual fact,
    497497        the only account information the UNIX/Linux Samba server needs is a UID.  The UID is available either
     
    504504        different name. Refer to the man page for the <code class="filename">smb.conf</code> file for more information regarding this
    505505        facility. User name mappings cannot be managed using the <code class="literal">net</code> utility.
    506         </p><div class="sect2" title="Adding User Accounts"><div class="titlepage"><div><div><h3 class="title"><a name="sbeuseraddn"></a>Adding User Accounts</h3></div></div></div><p>
     506        </p><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="sbeuseraddn"></a>Adding User Accounts</h3></div></div></div><p>
    507507        The syntax for adding a user account via the <code class="literal">net</code> (according to the man page) is shown
    508508        here:
     
    517517        </p><p>
    518518        The following demonstrates the addition of an account to the server <code class="constant">FRODO</code>:
    519 <a class="indexterm" name="id2607148"></a>
    520 <a class="indexterm" name="id2607159"></a>
     519<a class="indexterm" name="id2601062"></a>
     520<a class="indexterm" name="id2601073"></a>
    521521</p><pre class="screen">
    522522<code class="prompt">root# </code> net rpc user add jacko -S FRODO -Uroot%not24get
     
    529529    -S FRODO -Uroot%not24get
    530530</pre><p>
    531         </p></div><div class="sect2" title="Deletion of User Accounts"><div class="titlepage"><div><div><h3 class="title"><a name="id2607206"></a>Deletion of User Accounts</h3></div></div></div><p>
     531        </p></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2601120"></a>Deletion of User Accounts</h3></div></div></div><p>
    532532        Deletion of a user account can be done using the following syntax:
    533533</p><pre class="screen">
     
    535535</pre><p>
    536536        The following command will delete the user account <code class="constant">jacko</code>:
    537 <a class="indexterm" name="id2607228"></a>
     537<a class="indexterm" name="id2601142"></a>
    538538</p><pre class="screen">
    539539<code class="prompt">root# </code> net rpc user delete jacko -Uroot%not24get
    540540Deleted user account
    541541</pre><p>
    542         </p></div><div class="sect2" title="Managing User Accounts"><div class="titlepage"><div><div><h3 class="title"><a name="id2607254"></a>Managing User Accounts</h3></div></div></div><p>
     542        </p></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2601168"></a>Managing User Accounts</h3></div></div></div><p>
    543543        Two basic user account operations are routinely used: change of password and querying which groups a user
    544544        is a member of. The change of password operation is shown in <a class="link" href="NetCommand.html#sbeuseraddn" title="Adding User Accounts">&#8220;Adding User Accounts&#8221;</a>.
     
    546546        The ability to query Windows group membership can be essential. Here is how a remote server may be
    547547        interrogated to find which groups a user is a member of:
    548 <a class="indexterm" name="id2607277"></a>
     548<a class="indexterm" name="id2601191"></a>
    549549</p><pre class="screen">
    550550<code class="prompt">root# </code> net rpc user info jacko -S SAURON -Uroot%not24get
     
    559559        </p><p>
    560560        It is also possible to rename user accounts:
    561 <a class="indexterm" name="id2607306"></a>oldusername newusername
     561<a class="indexterm" name="id2601221"></a>oldusername newusername
    562562        Note that this operation does not yet work against Samba Servers. It is, however, possible to rename useraccounts on
    563563        Windows Servers.
    564564
    565         </p></div><div class="sect2" title="User Mapping"><div class="titlepage"><div><div><h3 class="title"><a name="id2607322"></a>User Mapping</h3></div></div></div><p>
    566 <a class="indexterm" name="id2607330"></a>
    567 <a class="indexterm" name="id2607337"></a>
    568 <a class="indexterm" name="id2607344"></a>
     565        </p></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2601237"></a>User Mapping</h3></div></div></div><p>
     566<a class="indexterm" name="id2601244"></a>
     567<a class="indexterm" name="id2601251"></a>
     568<a class="indexterm" name="id2601258"></a>
    569569        In some situations it is unavoidable that a user's Windows logon name will differ from the login ID
    570570        that user has on the Samba server. It is possible to create a special file on the Samba server that
     
    579579marygee: geeringm
    580580</pre><p>
    581         In this example the Windows user account <span class="quote">&#8220;<span class="quote">William Parsons</span>&#8221;</span> will be mapped to the UNIX user
    582         <code class="constant">parsonsw</code>, and the Windows user account <span class="quote">&#8220;<span class="quote">geeringm</span>&#8221;</span> will be mapped to the
     581        In this example the Windows user account &#8220;<span class="quote">William Parsons</span>&#8221; will be mapped to the UNIX user
     582        <code class="constant">parsonsw</code>, and the Windows user account &#8220;<span class="quote">geeringm</span>&#8221; will be mapped to the
    583583        UNIX user <code class="constant">marygee</code>.
    584         </p></div></div><div class="sect1" title="Administering User Rights and Privileges"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2607406"></a>Administering User Rights and Privileges</h2></div></div></div><p>
    585 <a class="indexterm" name="id2607414"></a>
    586 <a class="indexterm" name="id2607421"></a>
    587 <a class="indexterm" name="id2607428"></a>
    588 <a class="indexterm" name="id2607435"></a>
    589 <a class="indexterm" name="id2607442"></a>
     584        </p></div></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2601320"></a>Administering User Rights and Privileges</h2></div></div></div><p>
     585<a class="indexterm" name="id2601328"></a>
     586<a class="indexterm" name="id2601335"></a>
     587<a class="indexterm" name="id2601342"></a>
     588<a class="indexterm" name="id2601349"></a>
     589<a class="indexterm" name="id2601356"></a>
    590590        With all versions of Samba earlier than 3.0.11 the only account on a Samba server that could
    591591        manage users, groups, shares, printers, and such was the <code class="constant">root</code> account. This caused
     
    593593        credentials for the most security-sensitive account on a UNIX/Linux system.
    594594        </p><p>
    595 <a class="indexterm" name="id2607461"></a>
    596 <a class="indexterm" name="id2607468"></a>
    597 <a class="indexterm" name="id2607475"></a>
    598 <a class="indexterm" name="id2607482"></a>
    599 <a class="indexterm" name="id2607489"></a>
     595<a class="indexterm" name="id2601375"></a>
     596<a class="indexterm" name="id2601383"></a>
     597<a class="indexterm" name="id2601389"></a>
     598<a class="indexterm" name="id2601396"></a>
     599<a class="indexterm" name="id2601404"></a>
    600600        New to Samba version 3.0.11 is the ability to delegate administrative privileges as necessary to either
    601601        a normal user or to groups of users. The significance of the administrative privileges is documented
    602602        in <a class="link" href="rights.html" title="Chapter 15. User Rights and Privileges">&#8220;User Rights and Privileges&#8221;</a>. Examples of use of the <code class="literal">net</code> for user rights and privilege
    603603        management is appropriate to this chapter.
    604         </p><div class="note" title="Note" style="margin-left: 0.5in; margin-right: 0.5in;"><h3 class="title">Note</h3><p>
     604        </p><div class="note" style="margin-left: 0.5in; margin-right: 0.5in;"><h3 class="title">Note</h3><p>
    605605        When user rights and privileges are correctly set, there is no longer a need for a Windows
    606606        network account for the <code class="constant">root</code> user (nor for any synonym of it) with a UNIX UID=0.
     
    633633        The <code class="literal">net</code> command can be used to obtain the currently supported capabilities for rights
    634634        and privileges using this method:
    635 <a class="indexterm" name="id2607563"></a>
    636 <a class="indexterm" name="id2607570"></a>
    637 <a class="indexterm" name="id2607577"></a>
    638 <a class="indexterm" name="id2607584"></a>
    639 <a class="indexterm" name="id2607591"></a>
    640 <a class="indexterm" name="id2607598"></a>
    641 <a class="indexterm" name="id2607605"></a>
    642 <a class="indexterm" name="id2607612"></a>
    643 <a class="indexterm" name="id2607619"></a>
     635<a class="indexterm" name="id2601477"></a>
     636<a class="indexterm" name="id2601484"></a>
     637<a class="indexterm" name="id2601491"></a>
     638<a class="indexterm" name="id2601498"></a>
     639<a class="indexterm" name="id2601505"></a>
     640<a class="indexterm" name="id2601512"></a>
     641<a class="indexterm" name="id2601519"></a>
     642<a class="indexterm" name="id2601526"></a>
     643<a class="indexterm" name="id2601533"></a>
    644644</p><pre class="screen">
    645645<code class="prompt">root# </code> net rpc rights list -U root%not24get
     
    660660        idea since members of this group are generally expected to be all-powerful. This assignment makes that
    661661        the reality:
    662 <a class="indexterm" name="id2607665"></a>
     662<a class="indexterm" name="id2601579"></a>
    663663</p><pre class="screen">
    664664<code class="prompt">root# </code> net rpc rights grant "MIDEARTH\Domain Admins" \
     
    679679        </p><p>
    680680        The following step permits validation of the changes just made:
    681 <a class="indexterm" name="id2607716"></a>
     681<a class="indexterm" name="id2601630"></a>
    682682</p><pre class="screen">
    683683<code class="prompt">root# </code> net rpc rights list accounts -U root%not24get
     
    713713SeDiskOperatorPrivilege
    714714</pre><p>
    715         </p></div><div class="sect1" title="Managing Trust Relationships"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2607751"></a>Managing Trust Relationships</h2></div></div></div><p>
     715        </p></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2601665"></a>Managing Trust Relationships</h2></div></div></div><p>
    716716        There are essentially two types of trust relationships: the first is between domain controllers and domain
    717717        member machines (network clients), the second is between domains (called interdomain trusts). All
    718718        Samba servers that participate in domain security require a domain membership trust account, as do like
    719719        Windows NT/200x/XP workstations.
    720         </p><div class="sect2" title="Machine Trust Accounts"><div class="titlepage"><div><div><h3 class="title"><a name="id2607766"></a>Machine Trust Accounts</h3></div></div></div><p>
     720        </p><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2601680"></a>Machine Trust Accounts</h3></div></div></div><p>
    721721        The net command looks in the <code class="filename">smb.conf</code> file to obtain its own configuration settings. Thus, the following
    722722        command 'knows' which domain to join from the <code class="filename">smb.conf</code> file.
    723723        </p><p>
    724724        A Samba server domain trust account can be validated as shown in this example:
    725 <a class="indexterm" name="id2607793"></a>
     725<a class="indexterm" name="id2601707"></a>
    726726</p><pre class="screen">
    727727<code class="prompt">root# </code> net rpc testjoin
     
    736736        </p><p>
    737737        The equivalent command for joining a Samba server to a Windows ADS domain is shown here:
    738 <a class="indexterm" name="id2607830"></a>
     738<a class="indexterm" name="id2601745"></a>
    739739</p><pre class="screen">
    740740<code class="prompt">root# </code> net ads testjoin
     
    751751        The following demonstrates the process of creating a machine trust account in the target domain for the
    752752        Samba server from which the command is executed:
    753 <a class="indexterm" name="id2607876"></a>
     753<a class="indexterm" name="id2601790"></a>
    754754</p><pre class="screen">
    755755<code class="prompt">root# </code> net rpc join -S FRODO -Uroot%not24get
     
    766766        purely as a workstation, in which case the S is replaced with a W (indicating a workstation account). The
    767767        following command can be used to affect this:
    768 <a class="indexterm" name="id2607920"></a>
     768<a class="indexterm" name="id2601834"></a>
    769769</p><pre class="screen">
    770770<code class="prompt">root# </code> net rpc join member -S FRODO -Uroot%not24get
     
    774774        the type is deduced from the <code class="filename">smb.conf</code> file configuration. To specifically join as a PDC or BDC, the
    775775        command-line parameter will be <code class="constant">[PDC | BDC]</code>. For example:
    776 <a class="indexterm" name="id2607960"></a>
     776<a class="indexterm" name="id2601875"></a>
    777777</p><pre class="screen">
    778778<code class="prompt">root# </code> net rpc join bdc -S FRODO -Uroot%not24get
     
    782782        </p><p>
    783783        The command to join a Samba server to a Windows ADS domain is shown here:
    784 <a class="indexterm" name="id2607996"></a>
     784<a class="indexterm" name="id2601910"></a>
    785785</p><pre class="screen">
    786786<code class="prompt">root# </code> net ads join -UAdministrator%not24get
     
    793793        either. Inactive domain member accounts can be removed using any convenient tool. If necessary, the
    794794        machine account can be removed using the following <code class="literal">net</code> command:
    795 <a class="indexterm" name="id2608036"></a>
     795<a class="indexterm" name="id2601950"></a>
    796796</p><pre class="screen">
    797797<code class="prompt">root# </code> net rpc user delete HERRING\$ -Uroot%not24get
     
    803803        A Samba-3 server that is a Windows ADS domain member can execute the following command to detach from the
    804804        domain:
    805 <a class="indexterm" name="id2608068"></a>
     805<a class="indexterm" name="id2601983"></a>
    806806</p><pre class="screen">
    807807<code class="prompt">root# </code> net ads leave
     
    810810        Detailed information regarding an ADS domain can be obtained by a Samba DMS machine by executing the
    811811        following:
    812 <a class="indexterm" name="id2608096"></a>
     812<a class="indexterm" name="id2602011"></a>
    813813</p><pre class="screen">
    814814<code class="prompt">root# </code> net ads status
    815815</pre><p>
    816         The volume of information is extensive. Please refer to the book <span class="quote">&#8220;<span class="quote">Samba-3 by Example</span>&#8221;</span>,
     816        The volume of information is extensive. Please refer to the book &#8220;<span class="quote">Samba-3 by Example</span>&#8221;,
    817817        Chapter 7 for more information regarding its use. This book may be obtained either in print or online from
    818818        the <a class="ulink" href="http://www.samba.org/samba/docs/Samba3-ByExample.pdf" target="_top">Samba-3 by Example</a>.
    819         </p></div><div class="sect2" title="Interdomain Trusts"><div class="titlepage"><div><div><h3 class="title"><a name="id2608135"></a>Interdomain Trusts</h3></div></div></div><p>
     819        </p></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2602049"></a>Interdomain Trusts</h3></div></div></div><p>
    820820        Interdomain trust relationships form the primary mechanism by which users from one domain can be granted
    821821        access rights and privileges in another domain.
    822822        </p><p>
    823823        To discover what trust relationships are in effect, execute this command:
    824 <a class="indexterm" name="id2608150"></a>
     824<a class="indexterm" name="id2602064"></a>
    825825</p><pre class="screen">
    826826<code class="prompt">root# </code> net rpc trustdom list -Uroot%not24get
     
    838838        create a trusted connection with this account. That means that the foreign domain is being trusted
    839839        to access resources in the local domain. This command creates the local trust account:
    840 <a class="indexterm" name="id2608184"></a>
     840<a class="indexterm" name="id2602098"></a>
    841841</p><pre class="screen">
    842842<code class="prompt">root# </code> net rpc trustdom add DAMNATION f00db4r -Uroot%not24get
     
    851851        </p><p>
    852852        If the trusting domain is not capable of being reached, the following command will fail:
    853 <a class="indexterm" name="id2608235"></a>
     853<a class="indexterm" name="id2602149"></a>
    854854</p><pre class="screen">
    855855<code class="prompt">root# </code> net rpc trustdom list -Uroot%not24get
     
    877877        the foreign account. In the process it creates a one-way trust to the resources on the remote domain. This
    878878        command achieves the objective of joining the trust relationship:
    879 <a class="indexterm" name="id2608279"></a>
     879<a class="indexterm" name="id2602193"></a>
    880880</p><pre class="screen">
    881881<code class="prompt">root# </code> net rpc trustdom establish DAMNATION
     
    898898        Sometimes it is necessary to remove the ability for local users to access a foreign domain. The trusting
    899899        connection can be revoked as shown here:
    900 <a class="indexterm" name="id2608327"></a>
     900<a class="indexterm" name="id2602241"></a>
    901901</p><pre class="screen">
    902902<code class="prompt">root# </code> net rpc trustdom revoke DAMNATION -Uroot%not24get
     
    908908</pre><p>
    909909
    910         </p></div></div><div class="sect1" title="Managing Security Identifiers (SIDS)"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2608369"></a>Managing Security Identifiers (SIDS)</h2></div></div></div><p>
    911 <a class="indexterm" name="id2608377"></a>
    912 <a class="indexterm" name="id2608384"></a>
    913 <a class="indexterm" name="id2608390"></a>
    914 <a class="indexterm" name="id2608397"></a>
    915 <a class="indexterm" name="id2608404"></a>
     910        </p></div></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2602283"></a>Managing Security Identifiers (SIDS)</h2></div></div></div><p>
     911<a class="indexterm" name="id2602291"></a>
     912<a class="indexterm" name="id2602298"></a>
     913<a class="indexterm" name="id2602305"></a>
     914<a class="indexterm" name="id2602312"></a>
     915<a class="indexterm" name="id2602318"></a>
    916916        The basic security identifier that is used by all Windows networking operations is the Windows security
    917917        identifier (SID). All Windows network machines (servers and workstations), users, and groups are
     
    919919        are specific to the SID of the domain to which the user belongs.
    920920        </p><p>
    921 <a class="indexterm" name="id2608421"></a>
    922 <a class="indexterm" name="id2608428"></a>
    923 <a class="indexterm" name="id2608434"></a>
    924 <a class="indexterm" name="id2608441"></a>
     921<a class="indexterm" name="id2602335"></a>
     922<a class="indexterm" name="id2602342"></a>
     923<a class="indexterm" name="id2602348"></a>
     924<a class="indexterm" name="id2602355"></a>
    925925        It is truly prudent to store the machine and/or domain SID in a file for safekeeping. Why? Because
    926926        a change in hostname or in the domain (workgroup) name may result in a change in the SID. When you
     
    930930        First, do not forget to store the local SID in a file. It is a good idea to put this in the directory
    931931        in which the <code class="filename">smb.conf</code> file is also stored. Here is a simple action to achieve this:
    932 <a class="indexterm" name="id2608467"></a>
     932<a class="indexterm" name="id2602381"></a>
    933933</p><pre class="screen">
    934934<code class="prompt">root# </code> net getlocalsid &gt; /etc/samba/my-sid
     
    946946        file, simply copy the SID (the string of characters that begins with <code class="constant">S-1-5-21</code>) to
    947947        the command line shown here:
    948 <a class="indexterm" name="id2608529"></a>
     948<a class="indexterm" name="id2602443"></a>
    949949</p><pre class="screen">
    950950<code class="prompt">root# </code> net setlocalsid S-1-5-21-1385457007-882775198-1210191635
     
    957957        any potential namespace collision. Here is the way that the BDC SID can be synchronized to that
    958958        of the PDC (this is the default NT4 domain practice also):
    959 <a class="indexterm" name="id2608561"></a>
     959<a class="indexterm" name="id2602475"></a>
    960960</p><pre class="screen">
    961961<code class="prompt">root# </code> net rpc getsid -S FRODO -Uroot%not24get
     
    965965        Usually it is not necessary to specify the target server (-S FRODO) or the administrator account
    966966        credentials (-Uroot%not24get).
    967         </p></div><div class="sect1" title="Share Management"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2608591"></a>Share Management</h2></div></div></div><p>
     967        </p></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2602505"></a>Share Management</h2></div></div></div><p>
    968968        Share management is central to all file serving operations. Typical share operations include:
    969         </p><div class="itemizedlist"><ul class="itemizedlist" type="disc"><li class="listitem"><p>Creation/change/deletion of shares</p></li><li class="listitem"><p>Setting/changing ACLs on shares</p></li><li class="listitem"><p>Moving shares from one server to another</p></li><li class="listitem"><p>Change of permissions of share contents</p></li></ul></div><p>
     969        </p><div class="itemizedlist"><ul type="disc"><li><p>Creation/change/deletion of shares</p></li><li><p>Setting/changing ACLs on shares</p></li><li><p>Moving shares from one server to another</p></li><li><p>Change of permissions of share contents</p></li></ul></div><p>
    970970        Each of these are dealt with here insofar as they involve the use of the <code class="literal">net</code>
    971971        command. Operations outside of this command are covered elsewhere in this document.
    972         </p><div class="sect2" title="Creating, Editing, and Removing Shares"><div class="titlepage"><div><div><h3 class="title"><a name="id2608636"></a>Creating, Editing, and Removing Shares</h3></div></div></div><p>
     972        </p><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2602550"></a>Creating, Editing, and Removing Shares</h3></div></div></div><p>
    973973        A share can be added using the <code class="literal">net rpc share</code> command capabilities.
    974974        The target machine may be local or remote and is specified by the -S option. It must be noted
     
    983983        file system is the directory <code class="filename">/data</code>. The command that can be executed to perform the
    984984        addition of this share is shown here:
    985 <a class="indexterm" name="id2608732"></a>
     985<a class="indexterm" name="id2602646"></a>
    986986</p><pre class="screen">
    987987<code class="prompt">root# </code> net rpc share add Bulge=/data -S MERLIN -Uroot%not24get
     
    10041004        Often it is desirable also to permit a share to be removed using a command-line tool.
    10051005        The following step permits the share that was previously added to be removed:
    1006 <a class="indexterm" name="id2608783"></a>
     1006<a class="indexterm" name="id2602698"></a>
    10071007</p><pre class="screen">
    10081008<code class="prompt">root# </code> net rpc share delete Bulge -S MERLIN -Uroot%not24get
     
    10201020kyocera
    10211021</pre><p>
    1022         </p></div><div class="sect2" title="Creating and Changing Share ACLs"><div class="titlepage"><div><div><h3 class="title"><a name="id2608824"></a>Creating and Changing Share ACLs</h3></div></div></div><p>
     1022        </p></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2602738"></a>Creating and Changing Share ACLs</h3></div></div></div><p>
    10231023        At this time the <code class="literal">net</code> tool cannot be used to manage ACLs on Samba shares. In MS Windows
    10241024        language this is called Share Permissions.
     
    10271027        or using the Computer Management MMC snap-in. Neither is covered here,
    10281028        but see <a class="link" href="AccessControls.html" title="Chapter 16. File, Directory, and Share Access Controls">&#8220;File, Directory, and Share Access Controls&#8221;</a>.
    1029         </p></div><div class="sect2" title="Share, Directory, and File Migration"><div class="titlepage"><div><div><h3 class="title"><a name="id2608854"></a>Share, Directory, and File Migration</h3></div></div></div><p>
    1030 <a class="indexterm" name="id2608862"></a>
     1029        </p></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2602768"></a>Share, Directory, and File Migration</h3></div></div></div><p>
     1030<a class="indexterm" name="id2602776"></a>
    10311031        Shares and files can be migrated in the same manner as user, machine, and group accounts.
    10321032        It is possible to preserve access control settings (ACLs) as well as security settings
     
    10591059        </p><p>
    10601060        There are two known limitations to the migration process:
    1061         </p><div class="orderedlist"><ol class="orderedlist" type="1"><li class="listitem"><p>
     1061        </p><div class="orderedlist"><ol type="1"><li><p>
    10621062                The <code class="literal">net</code> command requires that the user credentials provided exist on both
    10631063                the migration source and the migration target.
    1064                 </p></li><li class="listitem"><p>
     1064                </p></li><li><p>
    10651065                Printer settings may not be fully or may be incorrectly migrated. This might in particular happen
    10661066                when migrating a Windows 2003 print server to Samba.
    1067                 </p></li></ol></div><div class="sect3" title="Share Migration"><div class="titlepage"><div><div><h4 class="title"><a name="id2608964"></a>Share Migration</h4></div></div></div><p>
     1067                </p></li></ol></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2602878"></a>Share Migration</h4></div></div></div><p>
    10681068        The <code class="literal">net rpc share migrate</code> command operation permits the migration of plain
    10691069        share stanzas. A stanza contains the parameters within which a file or print share are defined.
     
    10921092        large list of available shares on the system that is being migrated can be limited using the
    10931093        <em class="parameter"><code>--exclude</code></em> switch. For example:
    1094 <a class="indexterm" name="id2609077"></a>
     1094<a class="indexterm" name="id2602992"></a>
    10951095</p><pre class="screen">
    10961096<code class="prompt">root# </code> net rpc share migrate shares myshare\
     
    11051105        to validate that the migrated accounts (on the Samba server) have the needed rights and privileges.
    11061106        This can be done as shown here:
    1107 <a class="indexterm" name="id2609132"></a>
     1107<a class="indexterm" name="id2603046"></a>
    11081108</p><pre class="screen">
    11091109<code class="prompt">root# </code> net rpc right list accounts -Uroot%not24get
     
    11111111        The steps taken so far perform only the migration of shares. Directories and directory contents
    11121112        are not migrated by the steps covered up to this point.
    1113         </p></div><div class="sect3" title="File and Directory Migration"><div class="titlepage"><div><div><h4 class="title"><a name="id2609160"></a>File and Directory Migration</h4></div></div></div><p>
     1113        </p></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2603074"></a>File and Directory Migration</h4></div></div></div><p>
    11141114        Everything covered to this point has been done in preparation for the migration of file and directory
    11151115        data. For many people preparation is potentially boring and the real excitement only begins when file
     
    11481148        <em class="parameter"><code>--timestamps</code></em> switch, and the DOS file attributes (i.e., hidden, archive, etc.) can
    11491149        be preserved by specifying the <em class="parameter"><code>--attrs</code></em> switch.
    1150         </p><div class="note" title="Note" style="margin-left: 0.5in; margin-right: 0.5in;"><h3 class="title">Note</h3><p>
     1150        </p><div class="note" style="margin-left: 0.5in; margin-right: 0.5in;"><h3 class="title">Note</h3><p>
    11511151        The ability to preserve ACLs depends on appropriate support for ACLs as well as the general file system
    11521152        semantics of the host operating system on the target server. A migration from one Windows file server to
     
    11621162        An example for migration of files from a machine called <code class="constant">nt4box</code> to the Samba server
    11631163        from which the process will be handled is shown here:
    1164 <a class="indexterm" name="id2609336"></a>
     1164<a class="indexterm" name="id2603250"></a>
    11651165</p><pre class="screen">
    11661166<code class="prompt">root# </code> net rpc share migrate files -S nt4box --acls \
     
    11711171        <code class="constant">nt4box</code> to the Samba server from which migration is initiated. Files that are group-owned
    11721172        will be owned by the user account <code class="constant">administrator</code>.
    1173         </p></div><div class="sect3" title="Share-ACL Migration"><div class="titlepage"><div><div><h4 class="title"><a name="id2609375"></a>Share-ACL Migration</h4></div></div></div><p>
     1173        </p></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2603290"></a>Share-ACL Migration</h4></div></div></div><p>
    11741174        It is possible to have share-ACLs (security descriptors) that won't allow you, even as Administrator, to
    11751175        copy any files or directories into it. Therefor the migration of the share-ACLs has been put into a separate
    11761176        function:
    1177 <a class="indexterm" name="id2609387"></a>
     1177<a class="indexterm" name="id2603301"></a>
    11781178</p><pre class="screen">
    11791179<code class="prompt">root# </code> net rpc share migrate security -S nt4box -U administrator%secret
     
    11811181        </p><p>
    11821182        This command will only copy the share-ACL of each share on nt4box to your local samba-system.
    1183         </p></div><div class="sect3" title="Simultaneous Share and File Migration"><div class="titlepage"><div><div><h4 class="title"><a name="id2609418"></a>Simultaneous Share and File Migration</h4></div></div></div><p>
     1183        </p></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2603332"></a>Simultaneous Share and File Migration</h4></div></div></div><p>
    11841184        The operating mode shown here is just a combination of the previous three. It first migrates
    11851185        share definitions and then all shared files and directories and finally migrates the share-ACLs:
     
    11901190        </p><p>
    11911191        An example of simultaneous migration is shown here:
    1192 <a class="indexterm" name="id2609443"></a>
     1192<a class="indexterm" name="id2603357"></a>
    11931193</p><pre class="screen">
    11941194<code class="prompt">root# </code> net rpc share migrate all -S w2k3server -U administrator%secret
    11951195</pre><p>
    11961196        This will generate a complete server clone of the <em class="parameter"><code>w2k3server</code></em> server.
    1197         </p></div></div><div class="sect2" title="Printer Migration"><div class="titlepage"><div><div><h3 class="title"><a name="id2609477"></a>Printer Migration</h3></div></div></div><p>
     1197        </p></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2603391"></a>Printer Migration</h3></div></div></div><p>
    11981198        The installation of a new server, as with the migration to a new network environment, often is similar to
    11991199        building a house; progress is very rapid from the laying of foundations up to the stage at which
     
    12141214        </p><p>
    12151215        The migration of an existing printing architecture involves the following:
    1216         </p><div class="itemizedlist"><ul class="itemizedlist" type="disc"><li class="listitem"><p>Establishment of print queues.</p></li><li class="listitem"><p>Installation of printer drivers (both for the print server and for Windows clients.</p></li><li class="listitem"><p>Configuration of printing forms.</p></li><li class="listitem"><p>Implementation of security settings.</p></li><li class="listitem"><p>Configuration of printer settings.</p></li></ul></div><p>
     1216        </p><div class="itemizedlist"><ul type="disc"><li><p>Establishment of print queues.</p></li><li><p>Installation of printer drivers (both for the print server and for Windows clients.</p></li><li><p>Configuration of printing forms.</p></li><li><p>Implementation of security settings.</p></li><li><p>Configuration of printer settings.</p></li></ul></div><p>
    12171217        The Samba <code class="literal">net</code> utility permits printer migration from one Windows print server
    12181218        to another. When this tool is used to migrate printers to a Samba server <code class="literal">smbd</code>,
     
    12321232        Printer migration from a Windows print server (NT4 or 200x) is shown. This instruction causes the
    12331233        printer share to be created together with the underlying print queue:
    1234 <a class="indexterm" name="id2609612"></a>
     1234<a class="indexterm" name="id2603526"></a>
    12351235</p><pre class="screen">
    12361236net rpc printer MIGRATE PRINTERS [printer] [misc. options] [targets]
     
    12381238        Printer drivers can be migrated from the Windows print server to the Samba server using this
    12391239        command-line instruction:
    1240 <a class="indexterm" name="id2609632"></a>
     1240<a class="indexterm" name="id2603547"></a>
    12411241</p><pre class="screen">
    12421242net rpc printer MIGRATE DRIVERS [printer] [misc. options] [targets]
    12431243</pre><p>
    12441244        Printer forms can be migrated with the following operation:
    1245 <a class="indexterm" name="id2609652"></a>
     1245<a class="indexterm" name="id2603566"></a>
    12461246</p><pre class="screen">
    12471247net rpc printer MIGRATE FORMS [printer] [misc. options] [targets]
    12481248</pre><p>
    12491249        Printer security settings (ACLs) can be migrated from the Windows server to the Samba server using this command:
    1250 <a class="indexterm" name="id2609672"></a>
     1250<a class="indexterm" name="id2603586"></a>
    12511251</p><pre class="screen">
    12521252net rpc printer MIGRATE SECURITY [printer] [misc. options] [targets]
     
    12541254        Printer configuration settings include factors such as paper size and default paper orientation.
    12551255        These can be migrated from the Windows print server to the Samba server with this command:
    1256 <a class="indexterm" name="id2609694"></a>
     1256<a class="indexterm" name="id2603608"></a>
    12571257</p><pre class="screen">
    12581258net rpc printer MIGRATE SETTINGS [printer] [misc. options] [targets]
     
    12641264net rpc printer MIGRATE ALL [printer] [misc. options] [targets]
    12651265</pre><p>
    1266         </p></div></div><div class="sect1" title="Controlling Open Files"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2609728"></a>Controlling Open Files</h2></div></div></div><p>
     1266        </p></div></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2603642"></a>Controlling Open Files</h2></div></div></div><p>
    12671267        The man page documents the <code class="literal">net file</code> function suite, which provides the tools to
    12681268        close open files using either RAP or RPC function calls. Please refer to the man page for specific
    12691269        usage information.
    1270         </p></div><div class="sect1" title="Session and Connection Management"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2609747"></a>Session and Connection Management</h2></div></div></div><p>
     1270        </p></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2603661"></a>Session and Connection Management</h2></div></div></div><p>
    12711271        The session management interface of the <code class="literal">net session</code> command uses the old RAP
    12721272        method to obtain the list of connections to the Samba server, as shown here:
    1273 <a class="indexterm" name="id2609763"></a>
     1273<a class="indexterm" name="id2603677"></a>
    12741274</p><pre class="screen">
    12751275<code class="prompt">root# </code> net rap session -S MERLIN -Uroot%not24get
     
    12861286<code class="prompt">root# </code> net rap session close marvel -Uroot%not24get
    12871287</pre><p>
    1288         </p></div><div class="sect1" title="Printers and ADS"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2609812"></a>Printers and ADS</h2></div></div></div><p>
     1288        </p></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2603727"></a>Printers and ADS</h2></div></div></div><p>
    12891289        When Samba-3 is used within an MS Windows ADS environment, printers shared via Samba will not be browseable
    12901290        until they have been published to the ADS domain. Information regarding published printers may be obtained
    12911291        from the ADS server by executing the <code class="literal">net ads print info</code> command following this syntax:
    1292 <a class="indexterm" name="id2609831"></a>
     1292<a class="indexterm" name="id2603745"></a>
    12931293</p><pre class="screen">
    12941294net ads printer info &lt;printer_name&gt; &lt;server_name&gt; -Uadministrator%secret
     
    12981298        </p><p>
    12991299        To publish (make available) a printer to ADS, execute the following command:
    1300 <a class="indexterm" name="id2609857"></a>
     1300<a class="indexterm" name="id2603771"></a>
    13011301</p><pre class="screen">
    13021302net ads printer publish &lt;printer_name&gt; -Uadministrator%secret
     
    13051305        </p><p>
    13061306        Removal of a Samba printer from ADS is achieved by executing this command:
    1307 <a class="indexterm" name="id2609882"></a>
     1307<a class="indexterm" name="id2603796"></a>
    13081308</p><pre class="screen">
    13091309net ads printer remove &lt;printer_name&gt; -Uadministrator%secret
     
    13111311        </p><p>
    13121312        A generic search (query) can also be made to locate a printer across the entire ADS domain by executing:
    1313 <a class="indexterm" name="id2609907"></a>
     1313<a class="indexterm" name="id2603821"></a>
    13141314</p><pre class="screen">
    13151315net ads printer search &lt;printer_name&gt; -Uadministrator%secret
    13161316</pre><p>
    1317         </p></div><div class="sect1" title="Manipulating the Samba Cache"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2609928"></a>Manipulating the Samba Cache</h2></div></div></div><p>
     1317        </p></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2603842"></a>Manipulating the Samba Cache</h2></div></div></div><p>
    13181318        Please refer to the <code class="literal">net</code> command man page for information regarding cache management.
    1319         </p></div><div class="sect1" title="Managing IDMAP UID/SID Mappings"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2609946"></a>Managing IDMAP UID/SID Mappings</h2></div></div></div><p>
     1319        </p></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2603860"></a>Managing IDMAP UID/SID Mappings</h2></div></div></div><p>
    13201320        The IDMAP UID to SID, and SID to UID, mappings that are created by <code class="literal">winbindd</code> can be
    13211321        backed up to a text file. The text file can be manually edited, although it is highly recommended that
     
    13281328        Winbind must be shut down to dump the IDMAP file. Before restoring a dump file, shut down
    13291329        <code class="literal">winbindd</code> and delete the old <code class="filename">winbindd_idmap.tdb</code> file.
    1330         </p><div class="sect2" title="Creating an IDMAP Database Dump File"><div class="titlepage"><div><div><h3 class="title"><a name="id2609990"></a>Creating an IDMAP Database Dump File</h3></div></div></div><p>
     1330        </p><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2603904"></a>Creating an IDMAP Database Dump File</h3></div></div></div><p>
    13311331        The IDMAP database can be dumped to a text file as shown here:
    13321332</p><pre class="screen">
     
    13381338net idmap dump /var/lib/samba/winbindd_idmap.tdb &gt; idmap_dump.txt
    13391339</pre><p>
    1340         </p></div><div class="sect2" title="Restoring the IDMAP Database Dump File"><div class="titlepage"><div><div><h3 class="title"><a name="id2610025"></a>Restoring the IDMAP Database Dump File</h3></div></div></div><p>
     1340        </p></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2603939"></a>Restoring the IDMAP Database Dump File</h3></div></div></div><p>
    13411341        The IDMAP dump file can be restored using the following command:
    13421342</p><pre class="screen">
     
    13481348net idmap restore /var/lib/samba/winbindd_idmap.tdb &lt; idmap_dump.txt
    13491349</pre><p>
    1350         </p></div></div><div class="sect1" title="Other Miscellaneous Operations"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="netmisc1"></a>Other Miscellaneous Operations</h2></div></div></div><p>
     1350        </p></div></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="netmisc1"></a>Other Miscellaneous Operations</h2></div></div></div><p>
    13511351        The following command is useful for obtaining basic statistics regarding a Samba domain. This command does
    13521352        not work with current Windows XP Professional clients.
    1353 <a class="indexterm" name="id2610075"></a>
     1353<a class="indexterm" name="id2603989"></a>
    13541354</p><pre class="screen">
    13551355<code class="prompt">root# </code> net rpc info
     
    13641364        Another useful tool is the <code class="literal">net time</code> tool set. This tool may be used to query the
    13651365        current time on the target server as shown here:
    1366 <a class="indexterm" name="id2610111"></a>
     1366<a class="indexterm" name="id2604025"></a>
    13671367</p><pre class="screen">
    13681368<code class="prompt">root# </code> net time -S SAURON
     
    13721372        <code class="literal">/bin/time</code>, it is a good idea to obtain the time from the target server in a format
    13731373        that is ready to be passed through. This may be done by executing:
    1374 <a class="indexterm" name="id2610142"></a>
     1374<a class="indexterm" name="id2604056"></a>
    13751375</p><pre class="screen">
    13761376<code class="prompt">root# </code> net time system -S FRODO
     
    13781378</pre><p>
    13791379        The time can be set on a target server by executing:
    1380 <a class="indexterm" name="id2610167"></a>
     1380<a class="indexterm" name="id2604081"></a>
    13811381</p><pre class="screen">
    13821382<code class="prompt">root# </code> net time set -S MAGGOT -U Administrator%not24get
     
    13841384</pre><p>
    13851385        It is possible to obtain the time zone of a server by executing the following command against it:
    1386 <a class="indexterm" name="id2610192"></a>
     1386<a class="indexterm" name="id2604107"></a>
    13871387</p><pre class="screen">
    13881388<code class="prompt">root# </code> net time zone -S SAURON
Note: See TracChangeset for help on using the changeset viewer.