Ignore:
Timestamp:
Nov 14, 2012, 12:59:34 PM (13 years ago)
Author:
Silvan Scherrer
Message:

Samba Server: update vendor to 3.6.0

File:
1 edited

Legend:

Unmodified
Added
Removed
  • vendor/current/docs/manpages/net.8

    r618 r740  
    33.\"    Author: [see the "AUTHOR" section]
    44.\" Generator: DocBook XSL Stylesheets v1.75.2 <http://docbook.sf.net/>
    5 .\"      Date: 08/02/2011
     5.\"      Date: 08/08/2011
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.5
     7.\"    Source: Samba 3.6
    88.\"  Language: English
    99.\"
    10 .TH "NET" "8" "08/02/2011" "Samba 3\&.5" "System Administration tools"
     10.TH "NET" "8" "08/08/2011" "Samba 3\&.6" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * set default formatting
     
    468468.\}
    469469comment \- Freeform text description of the group
     470.RE
    470471.sp
    471472.RE
     
    550551.PP
    551552List all interdomain trust relationships\&.
     553.SS "RPC TRUSTDOM LIST"
     554.PP
     555List all interdomain trust relationships\&.
     556.SS "RPC TRUST"
     557.SS "RPC TRUST CREATE"
     558.PP
     559Create a trust trust object by calling lsaCreateTrustedDomainEx2\&. The can be done on a single server or on two servers at once with the possibility to use a random trust password\&.
     560.PP
     561\fBOptions:\fR
     562.PP
     563otherserver
     564.RS 4
     565Domain controller of the second domain
     566.RE
     567.PP
     568otheruser
     569.RS 4
     570Admin user in the second domain
     571.RE
     572.PP
     573otherdomainsid
     574.RS 4
     575SID of the second domain
     576.RE
     577.PP
     578other_netbios_domain
     579.RS 4
     580NetBIOS (short) name of the second domain
     581.RE
     582.PP
     583otherdomain
     584.RS 4
     585DNS (full) name of the second domain
     586.RE
     587.PP
     588trustpw
     589.RS 4
     590Trust password
     591.RE
     592.PP
     593\fBExamples:\fR
     594.PP
     595Create a trust object on srv1\&.dom1\&.dom for the domain dom2
     596.RS 4
     597.sp
     598.if n \{\
     599.RS 4
     600.\}
     601.nf
     602net rpc trust create \e
     603    otherdomainsid=S\-x\-x\-xx\-xxxxxxxxxx\-xxxxxxxxxx\-xxxxxxxxx \e
     604    other_netbios_domain=dom2 \e
     605    otherdomain=dom2\&.dom \e
     606    trustpw=12345678 \e
     607    \-S srv1\&.dom1\&.dom
     608.fi
     609.if n \{\
     610.RE
     611.\}
     612.RE
     613.PP
     614Create a trust relationship between dom1 and dom2
     615.RS 4
     616.sp
     617.if n \{\
     618.RS 4
     619.\}
     620.nf
     621net rpc trust create \e
     622    otherserver=srv2\&.dom2\&.test \e
     623    otheruser=dom2adm \e
     624    \-S srv1\&.dom1\&.dom
     625.fi
     626.if n \{\
     627.RE
     628.\}
     629.RE
     630.SS "RPC TRUST DELETE"
     631.PP
     632Delete a trust trust object by calling lsaDeleteTrustedDomain\&. The can be done on a single server or on two servers at once\&.
     633.PP
     634\fBOptions:\fR
     635.PP
     636otherserver
     637.RS 4
     638Domain controller of the second domain
     639.RE
     640.PP
     641otheruser
     642.RS 4
     643Admin user in the second domain
     644.RE
     645.PP
     646otherdomainsid
     647.RS 4
     648SID of the second domain
     649.RE
     650.PP
     651\fBExamples:\fR
     652.PP
     653Delete a trust object on srv1\&.dom1\&.dom for the domain dom2
     654.RS 4
     655.sp
     656.if n \{\
     657.RS 4
     658.\}
     659.nf
     660net rpc trust delete \e
     661    otherdomainsid=S\-x\-x\-xx\-xxxxxxxxxx\-xxxxxxxxxx\-xxxxxxxxx \e
     662    \-S srv1\&.dom1\&.dom
     663.fi
     664.if n \{\
     665.RE
     666.\}
     667.RE
     668.PP
     669Delete a trust relationship between dom1 and dom2
     670.RS 4
     671.sp
     672.if n \{\
     673.RS 4
     674.\}
     675.nf
     676net rpc trust delete \e
     677    otherserver=srv2\&.dom2\&.test \e
     678    otheruser=dom2adm \e
     679    \-S srv1\&.dom1\&.dom
     680.fi
     681.if n \{\
     682.RE
     683.\}
     684.RE
     685.SS ""
    552686.SS "RPC RIGHTS"
    553687.PP
     
    726860.PP
    727861Restore the mappings from the specified file or stdin\&.
    728 .SS "IDMAP SECRET <DOMAIN>|ALLOC <secret>"
     862.SS "IDMAP SECRET <DOMAIN> <secret>"
    729863.PP
    730864Store a secret for the specified domain, used primarily for domains that use idmap_ldap as a backend\&. In this case the secret is used as the password for the user DN used to bind to the ldap server\&.
     865.SS "IDMAP DELETE [\-f] [\-\-db=<DB>] <ID>"
     866.PP
     867Delete a mapping sid <\-> gid or sid <\-> uid from the IDMAP database\&. The mapping is given by <ID> which may either be a sid: S\-x\-\&.\&.\&., a gid: "GID number" or a uid: "UID number"\&. Use \-f to delete an invalid partial mapping <ID> \-> xx
     868.PP
     869Use "smbcontrol all idmap \&.\&.\&." to notify running smbd instances\&. See the
     870\fBsmbcontrol\fR(1)
     871manpage for details\&.
     872.SS "IDMAP CHECK [\-v] [\-r] [\-a] [\-T] [\-f] [\-l] [\-\-db=<DB>]"
     873.PP
     874Check and repair the IDMAP database\&. If no option is given a read only check of the database is done\&. Among others an interactive or automatic repair mode may be chosen with one of the following options:
     875.PP
     876\-r|\-\-repair
     877.RS 4
     878Interactive repair mode, ask a lot of questions\&.
     879.RE
     880.PP
     881\-a|\-\-auto
     882.RS 4
     883Noninteractive repair mode, use default answers\&.
     884.RE
     885.PP
     886\-v|\-\-verbose
     887.RS 4
     888Produce more output\&.
     889.RE
     890.PP
     891\-f|\-\-force
     892.RS 4
     893Try to apply changes, even if they do not apply cleanly\&.
     894.RE
     895.PP
     896\-T|\-\-test
     897.RS 4
     898Dry run, show what changes would be made but don\'t touch anything\&.
     899.RE
     900.PP
     901\-l|\-\-lock
     902.RS 4
     903Lock the database while doing the check\&.
     904.RE
     905.PP
     906\-\-db <DB>
     907.RS 4
     908Check the specified database\&.
     909.RE
     910.PP
     911.RS 4
     912.RE
     913It reports about the finding of the following errors:
     914.PP
     915Missing reverse mapping:
     916.RS 4
     917A record with mapping A\->B where there is no B\->A\&. Default action in repair mode is to "fix" this by adding the reverse mapping\&.
     918.RE
     919.PP
     920Invalid mapping:
     921.RS 4
     922A record with mapping A\->B where B\->C\&. Default action is to "delete" this record\&.
     923.RE
     924.PP
     925Missing or invalid HWM:
     926.RS 4
     927A high water mark is not at least equal to the largest ID in the database\&. Default action is to "fix" this by setting it to the largest ID found +1\&.
     928.RE
     929.PP
     930Invalid record:
     931.RS 4
     932Something we failed to parse\&. Default action is to "edit" it in interactive and "delete" it in automatic mode\&.
     933.RE
    731934.SS "USERSHARE"
    732935.PP
     
    8901093.PP
    8911094Delete the list of includes from the provided section (global or share)\&.
     1095.SS "REGISTRY"
     1096.PP
     1097Manipulate Samba\'s registry\&.
     1098.PP
     1099The registry commands are:
     1100.RS 4
     1101net registry enumerate   \- Enumerate registry keys and values\&.
     1102.RE
     1103.RS 4
     1104net registry enumerate_recursive \- Enumerate registry key and its subkeys\&.
     1105.RE
     1106.RS 4
     1107net registry createkey   \- Create a new registry key\&.
     1108.RE
     1109.RS 4
     1110net registry deletekey   \- Delete a registry key\&.
     1111.RE
     1112.RS 4
     1113net registry deletekey_recursive \- Delete a registry key with subkeys\&.
     1114.RE
     1115.RS 4
     1116net registry getvalue    \- Print a registry value\&.
     1117.RE
     1118.RS 4
     1119net registry getvalueraw \- Print a registry value (raw format)\&.
     1120.RE
     1121.RS 4
     1122net registry setvalue    \- Set a new registry value\&.
     1123.RE
     1124.RS 4
     1125net registry increment   \- Increment a DWORD registry value under a lock\&.
     1126.RE
     1127.RS 4
     1128net registry deletevalue \- Delete a registry value\&.
     1129.RE
     1130.RS 4
     1131net registry getsd       \- Get security descriptor\&.
     1132.RE
     1133.RS 4
     1134net registry getsd_sdd1  \- Get security descriptor in sddl format\&.
     1135.RE
     1136.RS 4
     1137net registry setsd_sdd1  \- Set security descriptor from sddl format
     1138string\&.
     1139.RE
     1140.RS 4
     1141net registry import      \- Import a registration entries (\&.reg) file\&.
     1142.RE
     1143.RS 4
     1144net registry export      \- Export a registration entries (\&.reg) file\&.
     1145.RE
     1146.RS 4
     1147net registry convert     \- Convert a registration entries (\&.reg) file\&.
     1148.RE
     1149.SS "REGISTRY ENUMERATE key "
     1150.PP
     1151Enumerate subkeys and values of
     1152\fIkey\fR\&.
     1153.SS "REGISTRY ENUMERATE_RECURSIVE key "
     1154.PP
     1155Enumerate values of
     1156\fIkey\fR
     1157and its subkeys\&.
     1158.SS "REGISTRY CREATEKEY key "
     1159.PP
     1160Create a new
     1161\fIkey\fR
     1162if not yet existing\&.
     1163.SS "REGISTRY DELETEKEY key "
     1164.PP
     1165Delete the given
     1166\fIkey\fR
     1167and its values from the registry, if it has no subkeys\&.
     1168.SS "REGISTRY DELETEKEY_RECURSIVE key "
     1169.PP
     1170Delete the given
     1171\fIkey\fR
     1172and all of its subkeys and values from the registry\&.
     1173.SS "REGISTRY GETVALUE key name"
     1174.PP
     1175Output type and actual value of the value
     1176\fIname\fR
     1177of the given
     1178\fIkey\fR\&.
     1179.SS "REGISTRY GETVALUERAW key name"
     1180.PP
     1181Output the actual value of the value
     1182\fIname\fR
     1183of the given
     1184\fIkey\fR\&.
     1185.SS "REGISTRY SETVALUE key name type value ..."
     1186.PP
     1187Set the value
     1188\fIname\fR
     1189of an existing
     1190\fIkey\fR\&.
     1191\fItype\fR
     1192may be one of
     1193\fIsz\fR,
     1194\fImulti_sz\fR
     1195or
     1196\fIdword\fR\&. In case of
     1197\fImulti_sz\fR
     1198\fIvalue\fR
     1199may be given multiple times\&.
     1200.SS "REGISTRY INCREMENT key name [inc]"
     1201.PP
     1202Increment the DWORD value
     1203\fIname\fR
     1204of
     1205\fIkey\fR
     1206by
     1207\fIinc\fR
     1208while holding a g_lock\&.
     1209\fIinc\fR
     1210defaults to 1\&.
     1211.SS "REGISTRY DELETEVALUE key name"
     1212.PP
     1213Delete the value
     1214\fIname\fR
     1215of the given
     1216\fIkey\fR\&.
     1217.SS "REGISTRY GETSD key"
     1218.PP
     1219Get the security descriptor of the given
     1220\fIkey\fR\&.
     1221.SS "REGISTRY GETSD_SDDL key"
     1222.PP
     1223Get the security descriptor of the given
     1224\fIkey\fR
     1225as a Security Descriptor Definition Language (SDDL) string\&.
     1226.SS "REGISTRY SETSD_SDDL keysd"
     1227.PP
     1228Set the security descriptor of the given
     1229\fIkey\fR
     1230from a Security Descriptor Definition Language (SDDL) string
     1231\fIsd\fR\&.
     1232.SS "REGISTRY IMPORT file[opt]"
     1233.PP
     1234Import a registration entries (\&.reg)
     1235\fIfile\fR\&.
     1236.SS "REGISTRY EXPORT keyfile[opt]"
     1237.PP
     1238Export a
     1239\fIkey\fR
     1240to a registration entries (\&.reg)
     1241\fIfile\fR\&.
     1242.SS "REGISTRY CONVERT in out [[inopt] outopt]"
     1243.PP
     1244Convert a registration entries (\&.reg) file
     1245\fIin\fR\&.
    8921246.SS "EVENTLOG"
    8931247.PP
     
    10241378\fIREBOOT\fR
    10251379is an optional parameter that can be set to reboot the remote machine after successful join to the domain\&.
     1380.RE
    10261381.sp
    10271382.RE
     
    10711426\fIREBOOT\fR
    10721427is an optional parameter that can be set to reboot the remote machine after successful unjoin from the domain\&.
     1428.RE
    10731429.sp
    10741430.RE
     
    11301486\fIREBOOT\fR
    11311487is an optional parameter that can be set to reboot the remote machine after successful rename in the domain\&.
     1488.RE
    11321489.sp
    11331490.RE
     
    11801537\fICOMMAND\fR
    11811538defines the shell command to execute\&.
     1539.RE
    11821540.SS "G_LOCK LOCKS"
    11831541.PP
Note: See TracChangeset for help on using the changeset viewer.