Ignore:
Timestamp:
Nov 14, 2012, 12:59:34 PM (13 years ago)
Author:
Silvan Scherrer
Message:

Samba Server: update vendor to 3.6.0

Location:
vendor/current/docs-xml/smbdotconf/winbind
Files:
2 added
2 deleted
5 edited

Legend:

Unmodified
Added
Removed
  • vendor/current/docs-xml/smbdotconf/winbind/idmapbackend.xml

    r414 r740  
    1212        <para>
    1313        This option specifies the default backend that is used when no special
    14         configuration set by <smbconfoption name="idmap config"/> matches the
    15         specific request.
    16         </para>
    17 
    18         <para>
    19         This default backend also specifies the place where winbind-generated
    20         idmap entries will be stored. So it is highly recommended that you
    21         specify a writable backend like <citerefentry>
    22         <refentrytitle>idmap_tdb</refentrytitle> <manvolnum>8</manvolnum>
    23         </citerefentry> or <citerefentry>
    24         <refentrytitle>idmap_ldap</refentrytitle> <manvolnum>8</manvolnum>
    25         </citerefentry> as the idmap backend. The <citerefentry>
    26         <refentrytitle>idmap_rid</refentrytitle> <manvolnum>8</manvolnum>
    27         </citerefentry> and <citerefentry>
    28         <refentrytitle>idmap_ad</refentrytitle> <manvolnum>8</manvolnum>
    29         </citerefentry> backends are not writable and thus will generate
    30         unexpected results if set as idmap backend.
    31         </para>
    32 
    33         <para>
    34         To use the rid and ad backends, please specify them via the
    35         <smbconfoption name="idmap config"/> parameter, possibly also for the
    36         domain your machine is member of, specified by <smbconfoption
    37         name="workgroup"/>.
    38         </para>
    39 
    40         <para>Examples of SID/uid/gid backends include tdb (<citerefentry>
    41         <refentrytitle>idmap_tdb</refentrytitle><manvolnum>8</manvolnum></citerefentry>),
    42         ldap (<citerefentry><refentrytitle>idmap_ldap</refentrytitle>
    43         <manvolnum>8</manvolnum></citerefentry>), rid (<citerefentry>
    44         <refentrytitle>idmap_rid</refentrytitle><manvolnum>8</manvolnum></citerefentry>),
    45         and ad (<citerefentry><refentrytitle>idmap_ad</refentrytitle>
    46         <manvolnum>8</manvolnum></citerefentry>).
     14        configuration set, but it is now deprecated in favour of the new
     15        spelling <smbconfoption name="idmap config * :  backend"/>.
    4716        </para>
    4817</description>
  • vendor/current/docs-xml/smbdotconf/winbind/idmapconfig.xml

    r414 r740  
    77
    88        <para>
    9         The idmap config prefix provides a means of managing each trusted
    10         domain separately. The idmap config prefix should be followed by the
    11         name of the domain, a colon, and a setting specific to the chosen
    12         backend. There are three options available for all domains:
     9        ID mapping in Samba is the mapping between Windows SIDs and Unix user
     10        and group IDs. This is performed by Winbindd with a configurable plugin
     11        interface. Samba's ID mapping is configured by options starting with the
     12        <smbconfoption name="idmap config"/> prefix.
     13        An idmap option consists of the <smbconfoption name="idmap config"/>
     14        prefix, followed by a domain name or the asterisk character (*),
     15        a colon, and the name of an idmap setting for the chosen domain.
    1316        </para>
    1417
    15         <variablelist> 
     18        <para>
     19        The idmap configuration is hence divided into groups, one group
     20        for each domain to be configured, and one group with the the
     21        asterisk instead of a proper domain name, which speifies the
     22        default configuration that is used to catch all domains that do
     23        not have an explicit idmap configuration of their own.
     24        </para>
     25
     26        <para>
     27        There are three general options available:
     28        </para>
     29
     30        <variablelist>
    1631                <varlistentry>
    1732                <term>backend = backend_name</term>
    1833                <listitem><para>
    19                         Specifies the name of the idmap plugin to use as the
    20                         SID/uid/gid backend for this domain.
     34                This specifies the name of the idmap plugin to use as the
     35                SID/uid/gid backend for this domain. The standard backends are
     36                tdb
     37                (<citerefentry><refentrytitle>idmap_tdb</refentrytitle> <manvolnum>8</manvolnum> </citerefentry>),
     38                tdb2
     39                (<citerefentry><refentrytitle>idmap_tdb2</refentrytitle> <manvolnum>8</manvolnum></citerefentry>),
     40                ldap
     41                (<citerefentry><refentrytitle>idmap_ldap</refentrytitle> <manvolnum>8</manvolnum></citerefentry>),
     42                ,
     43                rid
     44                (<citerefentry><refentrytitle>idmap_rid</refentrytitle> <manvolnum>8</manvolnum></citerefentry>),
     45                ,
     46                hash
     47                (<citerefentry><refentrytitle>idmap_hash</refentrytitle> <manvolnum>8</manvolnum></citerefentry>),
     48                ,
     49                autorid
     50                (<citerefentry><refentrytitle>idmap_autorid</refentrytitle> <manvolnum>8</manvolnum></citerefentry>),
     51                ,
     52                ad
     53                (<citerefentry><refentrytitle>idmap_ad</refentrytitle> <manvolnum>8</manvolnum></citerefentry>),
     54                ,
     55                adex
     56                (<citerefentry><refentrytitle>idmap_adex</refentrytitle> <manvolnum>8</manvolnum></citerefentry>),
     57                ,
     58                and nss.
     59                (<citerefentry><refentrytitle>idmap_nss</refentrytitle> <manvolnum>8</manvolnum></citerefentry>),
     60                The corresponding manual pages contain the details, but
     61                here is a summary.
     62                </para>
     63                <para>
     64                The first three of these create mappings of their own using
     65                internal unixid counters and store the mappings in a database.
     66                These are suitable for use in the default idmap configuration.
     67                The rid and hash backends use a pure algorithmic calculation
     68                to determine the unixid for a SID. The autorid module is a
     69                mixture of the tdb and rid backend. It creates ranges for
     70                each domain encountered and then uses the rid algorithm for each
     71                of these automatically configured domains individually.
     72                The ad and adex
     73                backends both use unix IDs stored in Active Directory via
     74                the standard schema extensions. The nss backend reverses
     75                the standard winbindd setup and gets the unixids via names
     76                from nsswitch which can be useful in an ldap setup.
    2177                </para></listitem>
    2278                </varlistentry>
     
    2480                <varlistentry>
    2581                <term>range = low - high</term>
    26                 <listitem><para>
     82                <listitem><para>
    2783                Defines the available matching uid and gid range for which the
    28                 backend is authoritative.  Note that the range commonly
    29                 matches the allocation range due to the fact that the same
    30                 backend will store and retrieve SID/uid/gid mapping entries.
    31                 </para>
     84                backend is authoritative. For allocating backends, this also
     85                defines the start and the end of the range for allocating
     86                new unid IDs.
     87                </para>
    3288                <para>
    3389                winbind uses this parameter to find the backend that is
    34                 authoritative for a unix ID to SID mapping, so it must be set
    35                 for each individually configured domain, and it must be
    36                 disjoint from the ranges set via <smbconfoption name="idmap
    37                 uid"/> and <smbconfoption name="idmap gid"/>.
     90                authoritative for a unix ID to SID mapping, so it must be set
     91                for each individually configured domain and for the default
     92                configuration. The configured ranges must be mutually disjoint.
    3893                </para></listitem>
     94                </varlistentry>
    3995
     96                <varlistentry>
     97                <term>read only = yes|no</term>
     98                <listitem><para>
     99                This option can be used to turn the writing backends
     100                tdb, tdb2, and ldap into read only mode. This can be useful
     101                e.g. in cases where a pre-filled database exists that should
     102                not be extended automatically.
     103                </para></listitem>
    40104                </varlistentry>
    41105        </variablelist>
     
    44108        The following example illustrates how to configure the <citerefentry>
    45109        <refentrytitle>idmap_ad</refentrytitle> <manvolnum>8</manvolnum>
    46         </citerefentry> for the CORP domain and the
     110        </citerefentry> backend for the CORP domain and the
    47111        <citerefentry><refentrytitle>idmap_tdb</refentrytitle>
    48112        <manvolnum>8</manvolnum></citerefentry> backend for all other
     
    54118
    55119        <programlisting>
    56         idmap backend = tdb
    57         idmap uid = 1000000-1999999
    58         idmap gid = 1000000-1999999
     120        idmap config * : backend = tdb
     121        idmap config * : range = 1000000-1999999
    59122
    60123        idmap config CORP : backend  = ad
  • vendor/current/docs-xml/smbdotconf/winbind/idmapgid.xml

    r414 r740  
    66                <synonym>winbind gid</synonym>
    77<description>
    8         <para>The idmap gid parameter specifies the range of group ids
    9         that are allocated for the purpose of mapping UNX groups to NT group
    10         SIDs. This range of group ids should have no
    11         existing local or NIS groups within it as strange conflicts can
    12         occur otherwise.</para>
    13 
    14         <para>See also the <smbconfoption name="idmap backend"/>, and
    15         <smbconfoption name="idmap config"/> options.
     8        <para>
     9        The idmap gid parameter specifies the range of group ids
     10        for the default idmap configuration. It is now deprecated
     11        in favour of <smbconfoption name="idmap config * : range"/>.
    1612        </para>
    1713
     14        <para>See the <smbconfoption name="idmap config"/> option.</para>
    1815</description>
    1916
  • vendor/current/docs-xml/smbdotconf/winbind/idmapuid.xml

    r414 r740  
    77<description>
    88        <para>
    9         The idmap uid parameter specifies the range of user ids that are
    10         allocated for use in mapping UNIX users to NT user SIDs. This
    11         range of ids should have no existing local
    12         or NIS users within it as strange conflicts can occur otherwise.</para>
     9        The idmap uid parameter specifies the range of user ids for
     10        the default idmap configuration. It is now deprecated in favour
     11        of <smbconfoption name="idmap config * : range"/>.
     12        </para>
    1313
    14         <para>See also the <smbconfoption name="idmap backend"/> and
    15         <smbconfoption name="idmap config"/> options.
    16         </para>
     14        <para>See the <smbconfoption name="idmap config"/> option.</para>
    1715</description>
    1816
  • vendor/current/docs-xml/smbdotconf/winbind/winbindusedefaultdomain.xml

    r414 r740  
    1010        without domain component in their username. Users without a domain
    1111        component are treated as is part of the winbindd server's own
    12         domain. While this does not benifit Windows users, it makes SSH, FTP and
     12        domain. While this does not benefit Windows users, it makes SSH, FTP and
    1313        e-mail function in a way much closer to the way they
    1414        would in a native unix system.</para>
     15        <para>This option should be avoided if possible. It can cause confusion
     16        about responsibilities for a user or group. In many situations it is
     17        not clear whether winbind or /etc/passwd should be seen as authoritative
     18        for a user, likewise for groups.</para>
    1519</description>
    1620
Note: See TracChangeset for help on using the changeset viewer.