Ignore:
Timestamp:
Nov 24, 2016, 1:14:11 PM (9 years ago)
Author:
Silvan Scherrer
Message:

Samba Server: update vendor to version 4.4.3

Location:
vendor/current/docs-xml/Samba3-ByExample
Files:
1 deleted
17 edited

Legend:

Unmodified
Added
Removed
  • vendor/current/docs-xml/Samba3-ByExample/SBE-2000UserNetwork.xml

    r414 r988  
    573573        <indexterm><primary>LDAP</primary><secondary>backend</secondary></indexterm>
    574574        <indexterm><primary>SID</primary></indexterm>
    575         When Samba-3 is configured to use an LDAP backend, it stores the domain
     575        When Samba is configured to use an LDAP backend, it stores the domain
    576576        account information in a directory entry. This account entry contains the
    577577        domain SID. An unintended but exploitable side effect is that this makes it
     
    659659        <indexterm><primary>UID</primary></indexterm>
    660660        <indexterm><primary>GID</primary></indexterm>
    661         Samba-3 has the ability to use multiple password (authentication and
     661        Samba has the ability to use multiple password (authentication and
    662662        identity resolution) backends. The diagram in <link linkend="chap7idres"/>
    663663        demonstrates how Samba uses winbind, LDAP, and NIS, the traditional system
     
    680680        <indexterm><primary>LDAP</primary></indexterm>
    681681        <indexterm><primary>distributed</primary></indexterm>
    682         Samba is capable of using the <constant>smbpasswd</constant>,
    683         <constant>tdbsam</constant>, <constant>xmlsam</constant>,
    684         and <constant>mysqlsam</constant> authentication databases. The SMB
     682        Samba is capable of using the <constant>smbpasswd</constant> and
     683        <constant>tdbsam</constant>. The SMB
    685684        passwords can, of course, also be stored in an LDAP ldapsam
    686685        backend. LDAP is the preferred passdb backend for distributed network
     
    690689        <para>
    691690        <indexterm><primary>passdb backend</primary></indexterm>
    692         Additionally, it is possible to use multiple passdb backends
    693         concurrently as well as have multiple LDAP backends. As a result, you
    694         can specify a failover LDAP backend. The syntax for specifying a
     691        You can specify a failover LDAP backend. The syntax for specifying a
    695692        single LDAP backend in &smb.conf; is:
    696693<screen>
     
    722719        </figure>
    723720        </para>
    724 
    725         <para>
    726         Some folks have tried to implement this without the use of double quotes. This is the type of entry they
    727         created:
    728 <screen>
    729 ...
    730 passdb backend = ldapsam:ldap://master.abmas.biz \
    731                  ldapsam:ldap://slave.abmas.biz
    732 ...
    733 </screen>
    734         <indexterm><primary>contiguous directory</primary></indexterm>
    735         The effect of this style of entry is that Samba lists the users
    736         that are in both LDAP databases. If both contain the same information,
    737         it results in each record being shown twice. This is, of course, not the
    738         solution desired for a failover implementation. The net effect of this
    739         configuration is shown in <link linkend="ch7dualadd"/>
    740         </para>
    741 
    742         <figure id="ch7dualadd">
    743                 <title>Samba Configuration to Use Dual LDAP Databases - Broken - Do Not Use!</title>
    744                 <imagefile scale="55">ch7-dual-additive-LDAP</imagefile>
    745         </figure>
    746 
    747         <para>
    748         If, however, each LDAP database contains unique information, this may
    749         well be an advantageous way to effectively integrate multiple LDAP databases
    750         into one seemingly contiguous directory. Only the first database will be updated.
    751         An example of this configuration is shown in <link linkend="ch7dualok"/>.
    752         </para>
    753 
    754         <figure id="ch7dualok">
    755                 <title>Samba Configuration to Use Two LDAP Databases - The result is additive.</title>
    756                 <imagefile scale="55">ch7-dual-additive-LDAP-Ok</imagefile>
    757         </figure>
    758 
    759         <note><para>
    760         When the use of ldapsam is specified twice, as shown here, it is imperative
    761         that the two LDAP directories must be disjoint. If the entries are for a
    762         master LDAP server as well as its own slave server, updates to the LDAP
    763         database may end up being lost or corrupted. You may safely use multiple
    764         LDAP backends only if both are entirely separate from each other.
    765         </para></note>
    766721
    767722    <para>
     
    10941049<smbconfoption name="idmap uid">10000-20000</smbconfoption>
    10951050<smbconfoption name="idmap gid">10000-20000</smbconfoption>
    1096 <smbconfoption name="printer admin">root</smbconfoption>
    10971051<smbconfoption name="printing">cups</smbconfoption>
    10981052</smbconfblock>
     
    12731227                        <listitem><para>
    12741228                        <indexterm><primary>LDAP</primary></indexterm><indexterm><primary>BDC</primary></indexterm>
    1275                         Where Samba-3 is used as a domain controller, the use of LDAP is an
     1229                        Where Samba is used as a domain controller, the use of LDAP is an
    12761230                        essential component to permit the use of BDCs.
    12771231                        </para></listitem>
  • vendor/current/docs-xml/Samba3-ByExample/SBE-500UserNetwork.xml

    r414 r988  
    55
    66        <para>
    7         The Samba-3 networking you explored in <link linkend="secure"/> covers the finer points of
     7        The Samba networking you explored in <link linkend="secure"/> covers the finer points of
    88        configuration of peripheral services such as DHCP and DNS, and WINS. You experienced
    99        implementation of a simple configuration of the services that are important adjuncts
     
    17671767
    17681768                        <listitem><para>
    1769                         Joining a Samba-3 domain member server to a Samba-3 domain
     1769                        Joining a Samba domain member server to a Samba-3 domain
    17701770                        </para></listitem>
    17711771
     
    19371937
    19381938                <para>
    1939                 Unless configured to do otherwise, the default behavior with Samba-3 and Windows XP Professional
     1939                Unless configured to do otherwise, the default behavior with Samba and Windows XP Professional
    19401940                clients is to use roaming profiles.
    19411941                </para>
  • vendor/current/docs-xml/Samba3-ByExample/SBE-AddingUNIXClients.xml

    r414 r988  
    307307        <indexterm><primary>Domain Controller</primary></indexterm>
    308308        The domain member server and the domain member client are at the center of focus in this chapter.
    309         Configuration of Samba-3 domain controller is covered in earlier chapters, so if your
     309        Configuration of Samba domain controller is covered in earlier chapters, so if your
    310310        interest is in domain controller configuration, you will not find that here. You will find good
    311311        oil that helps you to add domain member servers and clients.
     
    675675<smbconfoption name="idmap gid">10000-20000</smbconfoption>
    676676<smbconfoption name="winbind trusted domains only">Yes</smbconfoption>
    677 <smbconfoption name="printer admin">root</smbconfoption>
    678677<smbconfoption name="printing">cups</smbconfoption>
    679678
     
    949948<smbconfoption name="template shell">/bin/bash</smbconfoption>
    950949<smbconfoption name="winbind separator">+</smbconfoption>
    951 <smbconfoption name="printer admin">root</smbconfoption>
    952950<smbconfoption name="hosts allow">192.168.2., 192.168.3., 127.</smbconfoption>
    953951<smbconfoption name="printing">cups</smbconfoption>
     
    10421040<smbconfoption name="printcap name">CUPS</smbconfoption>
    10431041<smbconfoption name="wins server">192.168.2.1</smbconfoption>
    1044 <smbconfoption name="printer admin">root</smbconfoption>
    10451042<smbconfoption name="hosts allow">192.168.2., 192.168.3., 127.</smbconfoption>
    10461043<smbconfoption name="printing">cups</smbconfoption>
     
    10751072        <indexterm><primary>Kerberos</primary></indexterm>
    10761073        <indexterm><primary>Domain Member</primary><secondary>server</secondary></indexterm>
    1077         One of the much-sought-after features new to Samba-3 is the ability to join an Active Directory
     1074        One of the much-sought-after features new to Samba is the ability to join an Active Directory
    10781075        domain using Kerberos protocols. This makes it possible to operate an entire Windows network
    10791076        without the need to run NetBIOS over TCP/IP and permits more secure networking in general. An
    10801077        exhaustively complete discussion of the protocols is not possible in this book; perhaps a
    1081         later book may explore the intricacies of the NetBIOS-less operation that Samba-3 can participate
    1082         in. For now, we simply focus on how a Samba-3 server can be made a domain member server.
     1078        later book may explore the intricacies of the NetBIOS-less operation that Samba can participate
     1079        in. For now, we simply focus on how a Samba server can be made a domain member server.
    10831080        </para>
    10841081
     
    10881085        <indexterm><primary>Identity resolution</primary></indexterm>
    10891086        <indexterm><primary>Kerberos</primary></indexterm>
    1090         The diagram in <link linkend="ch9-adsdc"/> demonstrates how Samba-3 interfaces with
     1087        The diagram in <link linkend="ch9-adsdc"/> demonstrates how Samba interfaces with
    10911088        Microsoft Active Directory components. It should be noted that if Microsoft Windows Services
    10921089        for UNIX (SFU) has been installed and correctly configured, it is possible to use client LDAP
    1093         for identity resolution just as can be done with Samba-3 when using an LDAP passdb backend.
     1090        for identity resolution just as can be done with Samba when using an LDAP passdb backend.
    10941091        The UNIX tool that you need for this, as in the case of LDAP on UNIX/Linux, is the PADL
    10951092        Software nss_ldap tool-set. Compared with use of winbind and Kerberos, the use of
    10961093        LDAP-based identity resolution is a little less secure. In view of the fact that this solution
    10971094        requires additional software to be installed on the Windows 200x ADS domain controllers,
    1098         and that means more management overhead, it is likely that most Samba-3 ADS client sites
     1095        and that means more management overhead, it is likely that most Samba ADS client sites
    10991096        may elect to use winbind.
    11001097        </para>
    11011098
    11021099        <para>
    1103         Do not attempt to use this procedure if you are not 100 percent certain that the build of Samba-3
     1100        Do not attempt to use this procedure if you are not 100 percent certain that the build of Samba
    11041101        you are using has been compiled and linked with all the tools necessary for this to work.
    1105         Given the importance of this step, you must first validate that the Samba-3 message block
     1102        Given the importance of this step, you must first validate that the Samba message block
    11061103        daemon (<command>smbd</command>) has the necessary features.
    11071104        </para>
     
    11271124                <step><para>
    11281125                <indexterm><primary>smbd</primary></indexterm>
    1129                 Before you try to use Samba-3, you want to know for certain that your executables have
     1126                Before you try to use Samba, you want to know for certain that your executables have
    11301127                support for Kerberos and for LDAP. Execute the following to identify whether or
    11311128                not this build is perhaps suitable for use:
     
    12051202                <indexterm><primary>validated</primary></indexterm>
    12061203                The next step is to identify which version of the Kerberos libraries have been used.
    1207                 In order to permit Samba-3 to interoperate with Windows 2003 Active Directory, it is
     1204                In order to permit Samba to interoperate with Windows 2003 Active Directory, it is
    12081205                essential that it has been linked with either MIT Kerberos version 1.3.1 or later,
    12091206                or that it has been linked with Heimdal Kerberos 0.6 plus specific patches. You may
     
    12241221
    12251222                <para>
    1226                 From this point on, you are certain that the Samba-3 build you are using has the
    1227                 necessary capabilities. You can now configure Samba-3 and the NSS.
     1223                From this point on, you are certain that the Samba build you are using has the
     1224                necessary capabilities. You can now configure Samba and the NSS.
    12281225                </para></step>
    12291226
     
    12751272Joined 'FRAN' to realm 'LONDON.ABMAS.BIZ'
    12761273</screen>
    1277                 You have successfully made your Samba-3 server a member of the ADS domain
     1274                You have successfully made your Samba server a member of the ADS domain
    12781275                using Kerberos protocols.
    12791276                </para>
     
    14241421                <indexterm><primary>Active Directory</primary><secondary>server</secondary></indexterm>
    14251422                <indexterm><primary>Kerberos</primary></indexterm>
    1426                 You may now perform final verification that communications between Samba-3 winbind and
     1423                You may now perform final verification that communications between Samba winbind and
    14271424                the Active Directory server is using Kerberos protocols. Execute the following:
    14281425<screen>
     
    15201517-------------- End Of Security Descriptor
    15211518</programlisting>
    1522                 And now you have conclusive proof that your Samba-3 ADS domain member server
     1519                And now you have conclusive proof that your Samba ADS domain member server
    15231520                called <constant>FRAN</constant> is able to communicate fully with the ADS
    15241521                domain controllers.
     
    15291526
    15301527        <para>
    1531         Your Samba-3 ADS domain member server is ready for use. During training sessions,
     1528        Your Samba ADS domain member server is ready for use. During training sessions,
    15321529        you may be asked what is inside the <filename>winbindd_cache.tdb and winbindd_idmap.tdb</filename>
    15331530        files. Since curiosity just took hold of you, execute the following:
     
    17241721<smbconfoption name="winbind enum groups">No</smbconfoption>
    17251722<smbconfoption name="winbind nested groups">Yes</smbconfoption>
    1726 <smbconfoption name="printer admin">"KPAK\Domain Admins"</smbconfoption>
    17271723</smbconfblock>
    17281724</example>
     
    18181814        <indexterm><primary>ADAM</primary></indexterm>
    18191815        <indexterm><primary>ADS</primary></indexterm>
    1820         The storage of IDMAP information in LDAP can be used with both NT4/Samba-3-style domains as well as
     1816        The storage of IDMAP information in LDAP can be used with both NT4/Samba-style domains as well as
    18211817        with ADS domains. OpenLDAP is a commonly used LDAP server for this purpose, although any standards-compliant
    18221818        LDAP server can be used. It is therefore possible to deploy this IDMAP configuration using
     
    18521848        <para>
    18531849        <indexterm><primary>realm</primary></indexterm>
    1854         In the case of an NT4 or Samba-3-style domain the <parameter>realm</parameter> is not used, and the
     1850        In the case of an NT4 or Samba-style domain the <parameter>realm</parameter> is not used, and the
    18551851        command used to join the domain is <command>net rpc join</command>. The above example also demonstrates
    18561852        advanced error reporting techniques that are documented in the chapter called "Reporting Bugs" in
    1857         <quote>The Official Samba-3 HOWTO and Reference Guide, Second Edition</quote> (TOSHARG2).
     1853        <quote>The Official Samba HOWTO and Reference Guide, Second Edition</quote> (TOSHARG2).
    18581854        </para>
    18591855
     
    21952191        systems logons (SSO), providing user and group accounts are stored in an LDAP directory. This
    21962192        provides logon services for UNIX/Linux users, while Windows users obtain their sign-on
    2197         support via Samba-3.
     2193        support via Samba.
    21982194        </para>
    21992195
     
    22232219                <para>
    22242220                The following steps provide a Linux system that users can log onto using
    2225                 Windows NT4 (or Samba-3) domain network credentials:
     2221                Windows NT4 (or Samba) domain network credentials:
    22262222                </para>
    22272223
     
    27562752
    27572753                <para>
    2758                 Is proper DNS operation necessary for Samba-3 plus LDAP? If so, what must I put into
     2754                Is proper DNS operation necessary for Samba plus LDAP? If so, what must I put into
    27592755                my DNS configuration?
    27602756                </para>
     
    28182814                <para>
    28192815                Our Windows 2003 Server Active Directory domain runs with NetBIOS disabled. Can we
    2820                 use Samba-3 with that configuration?
     2816                use Samba with that configuration?
    28212817                </para>
    28222818
     
    28562852                <primary>authentication</primary>
    28572853              </indexterm>
    2858                 No. This is not okay. It means that your Samba-3 client has joined the ADS domain as
    2859                 a Windows NT4 client, and Samba-3 will not be using Kerberos-based authentication.
     2854                No. This is not okay. It means that your Samba client has joined the ADS domain as
     2855                a Windows NT4 client, and Samba will not be using Kerberos-based authentication.
    28602856                </para>
    28612857
  • vendor/current/docs-xml/Samba3-ByExample/SBE-Appendix1.xml

    r414 r988  
    5151                <para>
    5252                Clicking the <guimenu>Network ID</guimenu> button launches the configuration wizard. Do not use this with
    53                 Samba-3. If you wish to change the computer name, or join or leave the domain, click the <guimenu>Change</guimenu> button.
     53                Samba. If you wish to change the computer name, or join or leave the domain, click the <guimenu>Change</guimenu> button.
    5454                See <link linkend="swxpp004"></link>.
    5555                <figure id="swxpp004"><title>The Computer Name Panel.</title><imagefile>wxpp004</imagefile></figure>
     
    7777
    7878                <para>
    79                 Enter the name <quote>root</quote> and the root password from your Samba-3 server. See <link linkend="swxpp008"></link>.
     79                Enter the name <quote>root</quote> and the root password from your Samba server. See <link linkend="swxpp008"></link>.
    8080                <figure id="swxpp008"><title>Computer Name Changes &smbmdash; User name and Password Panel</title><imagefile>wxpp008</imagefile></figure>
    8181                </para></step>
  • vendor/current/docs-xml/Samba3-ByExample/SBE-Appendix2.xml

    r414 r988  
    2424        as well as two Microsoft Windows XP Professional Workstations, each equipped with an Ethernet
    2525        card connected using a hub. Also required is one additional server (either Windows
    26         NT4 Server, Windows 2000 Server, or a Samba-3 on UNIX/Linux server) running a network
     26        NT4 Server, Windows 2000 Server, or a Samba on UNIX/Linux server) running a network
    2727        sniffer and analysis application (Wireshark is a good choice). All work should be undertaken
    2828        on a quiet network where there is no other traffic. It is best to use a dedicated hub
     
    119119
    120120        <para>
    121         Recommended preparatory reading: <emphasis>The Official Samba-3 HOWTO and Reference Guide, Second
     121        Recommended preparatory reading: <emphasis>The Official Samba HOWTO and Reference Guide, Second
    122122        Edition</emphasis> (TOSHARG2) Chapter 9, <quote>Network Browsing,</quote> and Chapter 3,
    123123        <quote>Server Types and Security Modes.</quote>
     
    752752
    753753        <sect2>
    754         <title>Windows 200x/XP Client Interaction with Samba-3</title>
     754        <title>Windows 200x/XP Client Interaction with Samba</title>
    755755
    756756        <para>
     
    947947                database and thus must be stored elsewhere on the UNIX system in a manner that Samba can
    948948                use. Samba-2.x permitted such encrypted passwords to be stored in the <constant>smbpasswd</constant>
    949                 file or in an LDAP database. Samba-3 permits use of multiple <parameter>passdb backend</parameter>
     949                file or in an LDAP database. Samba permits use of multiple <parameter>passdb backend</parameter>
    950950                databases in concurrent deployment. Refer to <emphasis>TOSHARG2</emphasis>, Chapter 10, <quote>Account Information Databases.</quote>
    951951                </para></listitem>
     
    11431143
    11441144                <para>
    1145                 Is it possible to reduce network broadcast activity with Samba-3?
     1145                Is it possible to reduce network broadcast activity with Samba?
    11461146                </para>
    11471147
     
    11701170                <note><para>
    11711171                Use of SMB without NetBIOS is possible only on Windows 200x/XP Professional clients and servers, as
    1172                 well as with Samba-3.
     1172                well as with Samba.
    11731173                </para></note>
    11741174
     
    12061206
    12071207                <para>
    1208                 Samba-3 supports Microsoft encrypted passwords. Be advised not to reintroduce plain-text password handling.
     1208                Samba supports Microsoft encrypted passwords. Be advised not to reintroduce plain-text password handling.
    12091209                Just create user accounts by running <command>smbpasswd -a 'username'</command>
    12101210                </para>
     
    12321232                <para>
    12331233                The parameter in the &smb.conf; file that controls this behavior is known as <parameter>encrypt
    1234                 passwords</parameter>. The default setting for this in Samba-3 is <constant>Yes (Enabled)</constant>.
     1234                passwords</parameter>. The default setting for this in Samba is <constant>Yes (Enabled)</constant>.
    12351235                </para>
    12361236
     
    12431243                <para>
    12441244                Is it necessary to specify <smbconfoption name="encrypt passwords">Yes</smbconfoption>
    1245                 when Samba-3 is configured as a domain member?
     1245                when Samba is configured as a domain member?
    12461246                </para>
    12471247
     
    12601260
    12611261                <para>
    1262                 Is it necessary to specify a <parameter>guest account</parameter> when Samba-3 is configured
     1262                Is it necessary to specify a <parameter>guest account</parameter> when Samba is configured
    12631263                as a domain member server?
    12641264                </para>
  • vendor/current/docs-xml/Samba3-ByExample/SBE-DomainAppsSupport.xml

    r414 r988  
    1111        <indexterm><primary>ldapsam</primary></indexterm>
    1212        <indexterm><primary>Active Directory</primary></indexterm>
    13         You've come a long way now. You have pretty much mastered Samba-3 for
    14         most uses it can be put to. Up until now, you have cast Samba-3 in the leading
     13        You've come a long way now. You have pretty much mastered Samba for
     14        most uses it can be put to. Up until now, you have cast Samba in the leading
    1515        role, and where authentication was required, you have used one or another of
    1616        Samba's many authentication backends (from flat text files with smbpasswd
     
    4343
    4444        <para>
    45         You have decided to set the ball rolling by introducing Samba-3 into the network
     45        You have decided to set the ball rolling by introducing Samba into the network
    4646        gradually, taking over key services and easing the way to a full migration and,
    4747        therefore, integration into Abmas's existing business later.
     
    136136                Functionally, the user's Internet Explorer requests a browsing session with the
    137137                Squid proxy, for which it offers its AD authentication token. Squid hands off
    138                 the authentication request to the Samba-3 authentication helper application
     138                the authentication request to the Samba authentication helper application
    139139                called <command>ntlm_auth</command>. This helper is a hook into winbind, the
    140                 Samba-3 NTLM authentication daemon. Winbind enables UNIX services to authenticate
     140                Samba NTLM authentication daemon. Winbind enables UNIX services to authenticate
    141141                against Microsoft Windows domains, including Active Directory domains. As Active
    142142                Directory authentication is a modified Kerberos authentication, winbind is assisted
     
    160160
    161161                        <listitem><para>
    162                         Configuring, compiling, and then installing the supporting Samba-3 components
     162                        Configuring, compiling, and then installing the supporting Samba components
    163163                        </para></listitem>
    164164
     
    193193        First, your system needs to be prepared and in a known good state to proceed. This consists
    194194        of making sure that everything the system depends on is present and that everything that could
    195         interfere or conflict with the system is removed. You will be configuring the Squid and Samba-3
     195        interfere or conflict with the system is removed. You will be configuring the Squid and Samba
    196196        packages and updating them if necessary. If conflicting packages of these programs are installed,
    197197        they must be removed.
     
    417417        <para>
    418418        <indexterm><primary>Active Directory</primary></indexterm>
    419         Samba must be configured to correctly use Active Directory. Samba-3 must be used, since it
     419        Samba must be configured to correctly use Active Directory. Samba must be used, since it
    420420        has the necessary components to interface with Active Directory.
    421421        </para>
    422422
    423423        <procedure>
    424         <title>Securing Samba-3 With ADS Support Steps</title>
     424        <title>Securing Samba With ADS Support Steps</title>
    425425
    426426                <step><para>
     
    430430                <indexterm><primary>MIT KRB5</primary></indexterm>
    431431                <indexterm><primary>ntlm_auth</primary></indexterm>
    432                 Download the latest stable Samba-3 for Red Hat Linux from the official Samba Team
     432                Download the latest stable Samba for Red Hat Linux from the official Samba Team
    433433                <ulink url="http://ftp.samba.org">FTP site.</ulink> The official Samba Team
    434434                RPMs for Red Hat Fedora Linux contain the <command>ntlm_auth</command> tool
     
    524524                <indexterm><primary>Squid</primary></indexterm>
    525525                <indexterm><primary>ntlm_auth</primary></indexterm>
    526                 Squid uses the <command>ntlm_auth</command> helper build with Samba-3.
     526                Squid uses the <command>ntlm_auth</command> helper build with Samba.
    527527                You may test <command>ntlm_auth</command> with the command:
    528528<screen>
     
    574574        <indexterm><primary>winbind</primary></indexterm>
    575575        <indexterm><primary>authentication</primary></indexterm>
    576         For Squid to benefit from Samba-3, NSS must be updated to allow winbind as a valid route to user authentication.
     576        For Squid to benefit from Samba, NSS must be updated to allow winbind as a valid route to user authentication.
    577577        </para>
    578578
     
    625625        <indexterm><primary>Squid</primary></indexterm>
    626626        <indexterm><primary>Active Directory</primary><secondary>authentication</secondary></indexterm>
    627         Squid must be configured correctly to interact with the Samba-3
     627        Squid must be configured correctly to interact with the Samba
    628628        components that handle Active Directory authentication.
    629629        </para>
     
    864864                <indexterm><primary>smbd</primary></indexterm>
    865865                <indexterm><primary>file and print server</primary></indexterm>
    866                 Samba-3 is a file and print server. The core components that provide this functionality are <command>smbd</command>,
     866                Samba is a file and print server. The core components that provide this functionality are <command>smbd</command>,
    867867                <command>nmbd</command>, and the identity resolver daemon, <command>winbindd</command>.
    868868                </para>
     
    871871                <indexterm><primary>SMB/CIFS</primary></indexterm>
    872872                <indexterm><primary>smbclient</primary></indexterm>
    873                 Samba-3 is an SMB/CIFS client. The core component that provides this is called <command>smbclient</command>.
     873                Samba is an SMB/CIFS client. The core component that provides this is called <command>smbclient</command>.
    874874                </para>
    875875
     
    880880                <indexterm><primary>inter-operability</primary></indexterm>
    881881                <indexterm><primary>authentication</primary></indexterm>
    882                 Samba-3 includes a number of helper tools, plug-in modules, utilities, and test and validation facilities.
    883                 Samba-3 includes glue modules that help provide interoperability between MS Windows clients and UNIX/Linux
     882                Samba includes a number of helper tools, plug-in modules, utilities, and test and validation facilities.
     883                Samba includes glue modules that help provide interoperability between MS Windows clients and UNIX/Linux
    884884                servers and clients. It includes Winbind agents that make it possible to authenticate UNIX/Linux access attempts
    885                 as well as logins to an SMB/CIFS authentication server backend. Samba-3 includes name service switch (NSS) modules
     885                as well as logins to an SMB/CIFS authentication server backend. Samba includes name service switch (NSS) modules
    886886                to permit identity resolution via SMB/CIFS servers (Windows NT4/200x, Samba, and a host of other commercial
    887887                server products).
  • vendor/current/docs-xml/Samba3-ByExample/SBE-HighAvailability.xml

    r414 r988  
    1212        to wrap up the theme and contents of a book in what is generally regarded as the
    1313        chapter that should draw conclusions. This book is a suspense thriller, and since
    14         the plot of the stories told mostly lead you to bigger, better Samba-3 networking
     14        the plot of the stories told mostly lead you to bigger, better Samba networking
    1515        solutions, it is perhaps appropriate to close this book with a few pertinent comments
    16         regarding some of the things everyone can do to deliver a reliable Samba-3 network.
     16        regarding some of the things everyone can do to deliver a reliable Samba network.
    1717        </para>
    1818
  • vendor/current/docs-xml/Samba3-ByExample/SBE-MakingHappyUsers.xml

    r746 r988  
    364364        The implementation of Samba BDCs necessitates the installation and configuration of LDAP.
    365365        For this site, you use OpenLDAP, the open source software LDAP server platform. Commercial
    366         LDAP servers in current use with Samba-3 include:
     366        LDAP servers in current use with Samba include:
    367367        </para>
    368368
     
    396396        offerings, it requires that you manually edit the server configuration files and manually
    397397        initialize the LDAP directory database. OpenLDAP itself has only command-line tools to
    398         help you to get OpenLDAP and Samba-3 running as required, albeit with some learning curve challenges.
     398        help you to get OpenLDAP and Samba running as required, albeit with some learning curve challenges.
    399399        </para>
    400400
     
    448448        tools and the creation of shell and Perl scripts a bit
    449449        challenging. OpenLDAP can be easily customized, though it includes
    450         many ready-to-use schemas. Samba-3 provides an OpenLDAP schema file
     450        many ready-to-use schemas. Samba provides an OpenLDAP schema file
    451451        that is required for use as a passdb backend.
    452452        </para>
     
    454454        <para>
    455455        <indexterm><primary>interoperability</primary></indexterm>
    456         For those who are willing to brave the process of installing and configuring LDAP and Samba-3 interoperability,
     456        For those who are willing to brave the process of installing and configuring LDAP and Samba interoperability,
    457457        there are a few nice Web-based tools that may help you to manage your users and groups more effectively.
    458458        The Web-based tools you might like to consider include the
     
    520520        server for UNIX system accounts as well as for Samba. From the OpenLDAP perspective, UNIX system
    521521        accounts are stored POSIX schema extensions. Samba provides its own schema to permit storage of account
    522         attributes Samba needs. Samba-3 can use the LDAP backend to store:
     522        attributes Samba needs. Samba can use the LDAP backend to store:
    523523        </para>
    524524       
     
    540540        <indexterm><primary>UID</primary></indexterm>
    541541        <indexterm><primary>nss_ldap</primary></indexterm>
    542         The use of LDAP with Samba-3 makes it necessary to store UNIX accounts as well as Windows Networking
     542        The use of LDAP with Samba makes it necessary to store UNIX accounts as well as Windows Networking
    543543        accounts in the LDAP backend. This implies the need to use the
    544544        <ulink url="http://www.padl.com/Contents/OpenSourceSoftware.html">PADL LDAP tools</ulink>. The resolution
     
    858858
    859859                <para>
    860                 This book is about Samba-3, so you can confine the printing style to just the smart
     860                This book is about Samba, so you can confine the printing style to just the smart
    861861                style of installation. Those interested in further information regarding intelligent
    862862                printing should review documentation on the Easy Software Products Web site.
     
    12501250
    12511251        <itemizedlist>
    1252                 <listitem><para>Samba-3 PDC Server Configuration</para>
     1252                <listitem><para>Samba PDC Server Configuration</para>
    12531253                        <orderedlist>
    12541254                                <listitem><para>DHCP and DNS servers</para></listitem>
    12551255                                <listitem><para>OpenLDAP server</para></listitem>
    12561256                                <listitem><para>PAM and NSS client tools</para></listitem>
    1257                                 <listitem><para>Samba-3 PDC</para></listitem>
     1257                                <listitem><para>Samba PDC</para></listitem>
    12581258                                <listitem><para>Idealx smbldap scripts</para></listitem>
    12591259                                <listitem><para>LDAP initialization</para></listitem>
     
    12661266                        </orderedlist>
    12671267                </listitem>
    1268                 <listitem><para>Samba-3 BDC Server Configuration</para>
     1268                <listitem><para>Samba BDC Server Configuration</para>
    12691269                        <orderedlist>
    12701270                                <listitem><para>DHCP and DNS servers</para></listitem>
     
    13841384
    13851385        <para>
    1386         Samba-3 and OpenLDAP will have a degree of interdependence that is unavoidable. The method
    1387         for bootstrapping the LDAP and Samba-3 configuration is relatively straightforward. If you
     1386        Samba and OpenLDAP will have a degree of interdependence that is unavoidable. The method
     1387        for bootstrapping the LDAP and Samba configuration is relatively straightforward. If you
    13881388        follow these guidelines, the resulting system should work fine.
    13891389        </para>
     
    17821782                <indexterm><primary>secrets.tdb</primary></indexterm>
    17831783                <indexterm><primary>smbpasswd</primary></indexterm>
    1784                 Samba-3 communicates with the LDAP server. The password that it uses to
     1784                Samba communicates with the LDAP server. The password that it uses to
    17851785                authenticate to the LDAP server must be stored in the <filename>secrets.tdb</filename>
    17861786                file. Execute the following to create the new <filename>secrets.tdb</filename> files
     
    17981798                <indexterm><primary>smbd</primary></indexterm>
    17991799                <indexterm><primary>net</primary><secondary>getlocalsid</secondary></indexterm>
    1800                 Samba-3 generates a Windows Security Identifier (SID) only when <command>smbd</command>
     1800                Samba generates a Windows Security Identifier (SID) only when <command>smbd</command>
    18011801                has been started. For this reason, you start Samba. After a few seconds delay,
    18021802                execute:
     
    18571857
    18581858        <para>
    1859         Your Samba-3 PDC is now ready to communicate with the LDAP password backend. Let's get on with
     1859        Your Samba PDC is now ready to communicate with the LDAP password backend. Let's get on with
    18601860        configuration of the LDAP server.
    18611861        </para>
     
    19261926        <para>
    19271927        <indexterm><primary>Idealx</primary><secondary>smbldap-tools</secondary></indexterm>
    1928         The Idealx scripts, or equivalent, are necessary to permit Samba-3 to manage accounts
     1928        The Idealx scripts, or equivalent, are necessary to permit Samba to manage accounts
    19291929        on the LDAP server. You have chosen the Idealx scripts because they are the best-known
    19301930        LDAP configuration scripts. The use of these scripts will help avoid the necessity
     
    22332233
    22342234        <para>
    2235         At this time, Samba-3 requires that on a PDC all UNIX (POSIX) group accounts that are
     2235        At this time, Samba requires that on a PDC all UNIX (POSIX) group accounts that are
    22362236        mapped (linked) to Windows domain group accounts must be in the LDAP database. It does not
    22372237        hurt to have UNIX user and group accounts in both the system files as well as in the LDAP
     
    22962296        <indexterm><primary>directory</primary><secondary>Computers container</secondary></indexterm>
    22972297        In the following examples, as the LDAP database is initialized, we do create a container
    2298         for Computer (machine) accounts. In the Samba-3 &smb.conf; files, specific use is made
     2298        for Computer (machine) accounts. In the Samba &smb.conf; files, specific use is made
    22992299        of the People container, not the Computers container, for domain member accounts. This is not a
    23002300        mistake; it is a deliberate action that is necessitated by the fact that the resolution of
     
    26732673                <indexterm><primary>ldapsam</primary></indexterm>
    26742674                <indexterm><primary>pdbedit</primary></indexterm>
    2675                 The final validation step involves making certain that Samba-3 can obtain the user
     2675                The final validation step involves making certain that Samba can obtain the user
    26762676                accounts from the LDAP ldapsam passwd backend. Execute the following command as shown:
    26772677<screen>
     
    27582758                <step><para>
    27592759                The server you have so carefully built is now ready for another important step. You
    2760                 start the Samba-3 server and validate its operation. Execute the following to render all
     2760                start the Samba server and validate its operation. Execute the following to render all
    27612761                the processes needed fully operative so that, on system reboot, they are automatically
    27622762                started:
     
    28012801                <step><para>
    28022802                <indexterm><primary>smbclient</primary></indexterm>
    2803                 You may now check Samba-3 operation as follows:
     2803                You may now check Samba operation as follows:
    28042804<screen>
    28052805&rootprompt; smbclient -L massive -U%
     
    28592859        <para>
    28602860        <indexterm><primary>CUPS</primary></indexterm>
    2861         The configuration for Samba-3 to enable CUPS raw-print-through printing has already been
     2861        The configuration for Samba to enable CUPS raw-print-through printing has already been
    28622862        taken care of in the &smb.conf; file. The only preparation needed for <constant>smart</constant>
    2863         printing to be possible involves creation of the directories in which Samba-3 stores
     2863        printing to be possible involves creation of the directories in which Samba stores
    28642864        Windows printing driver files.
    28652865        </para>
     
    29652965
    29662966<sect1 id="sbehap-bldg1">
    2967         <title>Samba-3 BDC Configuration</title>
     2967        <title>Samba BDC Configuration</title>
    29682968
    29692969        <procedure>
     
    30553055                <step><para>
    30563056                <indexterm><primary>smbpasswd</primary></indexterm>
    3057                 You must now set the LDAP administrative password into the Samba-3 <filename>secrets.tdb</filename>
     3057                You must now set the LDAP administrative password into the Samba <filename>secrets.tdb</filename>
    30583058                file by executing this command:
    30593059<screen>
     
    30663066                Now you must obtain the domain SID from the PDC and store it into the
    30673067                <filename>secrets.tdb</filename> file also. This step is not necessary with an LDAP
    3068                 passdb backend because Samba-3 obtains the domain SID from the
     3068                passdb backend because Samba obtains the domain SID from the
    30693069                sambaDomain object it automatically stores in the LDAP backend. It does not hurt to
    30703070                add the SID to the <filename>secrets.tdb</filename>, and if you wish to do so, this
     
    30753075                           for Domain MEGANET2 in secrets.tdb
    30763076</screen>
    3077                 When configuring a Samba-3 BDC that has an LDAP backend, there is no need to take
     3077                When configuring a Samba BDC that has an LDAP backend, there is no need to take
    30783078                any special action to join it to the domain. However, winbind communicates with the
    30793079                domain controller that is running on the localhost and must be able to authenticate,
     
    30953095                        <primary>pdbedit</primary>
    30963096                </indexterm>
    3097                 Verify that user and group account resolution works via Samba-3 tools as follows:
     3097                Verify that user and group account resolution works via Samba tools as follows:
    30983098<screen>
    30993099&rootprompt; pdbedit -L
     
    31243124                <step><para>
    31253125                The server you have so carefully built is now ready for another important step. Now
    3126                 start the Samba-3 server and validate its operation. Execute the following to render all
     3126                start the Samba server and validate its operation. Execute the following to render all
    31273127                the processes needed fully operative so that, upon system reboot, they are automatically
    31283128                started:
     
    31373137&rootprompt; rcwinbind start
    31383138</screen>
    3139                 Samba-3 should now be running and is ready for a quick test. But not quite yet!
     3139                Samba should now be running and is ready for a quick test. But not quite yet!
    31403140                </para></step>
    31413141
  • vendor/current/docs-xml/Samba3-ByExample/SBE-MigrateNT4Samba3.xml

    r414 r988  
    22<!DOCTYPE chapter PUBLIC "-//Samba-Team//DTD DocBook V4.2-Based Variant V1.0//EN" "http://www.samba.org/samba/DTD/samba-doc">
    33<chapter id="ntmigration">
    4   <title>Migrating NT4 Domain to Samba-3</title>
     4  <title>Migrating NT4 Domain to Samba</title>
    55
    66        <para>
    77        Ever since Microsoft announced that it was discontinuing support for Windows
    88        NT4, Samba users started to ask for detailed instructions on how to migrate
    9         from NT4 to Samba-3. This chapter provides background information that should
     9        from NT4 to Samba. This chapter provides background information that should
    1010        meet these needs.
    1111        </para>
     
    3434        <indexterm><primary>accounts</primary><secondary>group</secondary></indexterm>
    3535        <indexterm><primary>accounts</primary><secondary>machine</secondary></indexterm>
    36         The migration from NT4 to Samba-3 can involve a number of factors, including
     36        The migration from NT4 to Samba can involve a number of factors, including
    3737        migration of data to another server, migration of network environment controls
    3838        such as group policies, and migration of the users, groups, and machine
     
    4343        <indexterm><primary>accounts</primary><secondary>Domain</secondary></indexterm>
    4444        It should be pointed out now that it is possible to migrate some systems from
    45         a Windows NT4 domain environment to a Samba-3 domain environment. This is certainly
     45        a Windows NT4 domain environment to a Samba domain environment. This is certainly
    4646        not possible in every case. It is possible to just migrate the domain accounts
    47         to Samba-3 and then to switch machines, but as a hands-off transition, this is more
     47        to Samba and then to switch machines, but as a hands-off transition, this is more
    4848        the exception than the rule. Most systems require some tweaking after
    4949        migration before an environment that is acceptable for immediate use
     
    5959        <indexterm><primary>passdb backend</primary></indexterm>
    6060        You are about to migrate an MS Windows NT4 domain accounts database to
    61         a Samba-3 server. The Samba-3 server is using a
     61        a Samba server. The Samba-3 server is using a
    6262        <parameter>passdb backend</parameter> based on LDAP. The
    6363        <constant>ldapsam</constant> is ideal because an LDAP backend can be distributed
     
    6767        <para>
    6868        Your objective is to document the process of migrating user and group accounts
    69         from several NT4 domains into a single Samba-3 LDAP backend database.
     69        from several NT4 domains into a single Samba LDAP backend database.
    7070        </para>
    7171
     
    101101        <indexterm><primary>migration</primary><secondary>objectives</secondary></indexterm>
    102102        <indexterm><primary>disruptive</primary></indexterm>
    103         Before commencing an NT4 to Samba-3 migration, you should consider what your objectives are.
    104         While in some cases it is possible simply to migrate an NT4 domain to a single Samba-3 server,
     103        Before commencing an NT4 to Samba migration, you should consider what your objectives are.
     104        While in some cases it is possible simply to migrate an NT4 domain to a single Samba server,
    105105        that may not be a good idea from an administration perspective. Since the process involves going
    106106        through a certain amount of disruptive activity anyhow, why not take this opportunity to
     
    117117        particularly Windows XP Professional. The migration provides opportunity to revise and update
    118118        roaming profile deployment as well as folder redirection. Given that you must port the
    119         greater network configuration of this from the old NT4 server to the new Samba-3 server.
     119        greater network configuration of this from the old NT4 server to the new Samba server.
    120120        Do not forget to validate the security descriptors in the profiles share as well as network logon
    121         scripts. Feedback from sites that are migrating to Samba-3 suggests that many are using this
     121        scripts. Feedback from sites that are migrating to Samba suggests that many are using this
    122122        as a good time to update desktop systems also. In all, the extra effort should constitute no
    123123        real disruption to users, but rather, with due diligence and care, should make their network experience
     
    131131        <indexterm><primary>strategic</primary></indexterm>
    132132        <indexterm><primary>active directory</primary></indexterm>
    133         Migration of an NT4 domain user and group database to Samba-3 involves a certain strategic
     133        Migration of an NT4 domain user and group database to Samba involves a certain strategic
    134134        element. Many sites have asked for instructions regarding merging of multiple NT4
    135         domains into one Samba-3 LDAP database. It seems that this is viewed as a significant
     135        domains into one Samba LDAP database. It seems that this is viewed as a significant
    136136        added value compared with the alternative of migration to Windows Server 200x and Active
    137137        Directory. The diagram in <link linkend="ch8-migration"/> illustrates the effect of migration
     
    211211
    212212        <para>
    213         The merging of multiple Windows NT4-style domains into a single LDAP-backend-based Samba-3
     213        The merging of multiple Windows NT4-style domains into a single LDAP-backend-based Samba
    214214        domain may be seen by those who had power over them as a loss of prestige or a loss of
    215215        power. The imposition of a single domain may even be seen as a threat. So in migrating and
     
    220220        <para>
    221221        The best advice that can be given to those who set out to merge NT4 domains into a single
    222         Samba-3 domain is to promote (sell) the action as one that reduces costs and delivers
     222        Samba domain is to promote (sell) the action as one that reduces costs and delivers
    223223        greater network interoperability and manageability.
    224224        </para>
     
    233233        <para>
    234234        From feedback on the Samba mailing lists, it seems that most Windows NT4 migrations
    235         to Samba-3 are being performed using a new server or a new installation of a Linux or UNIX
     235        to Samba are being performed using a new server or a new installation of a Linux or UNIX
    236236        server. If you contemplate doing this, please note that the steps that follow in this
    237237        chapter assume familiarity with the information that has been previously covered in this
     
    241241
    242242        <para>
    243         We present here the steps and example output for two NT4 to Samba-3 domain migrations. The
     243        We present here the steps and example output for two NT4 to Samba domain migrations. The
    244244        first uses an LDAP-based backend, and the second uses a tdbsam backend. In each case the
    245245        scripts you specify in the &smb.conf; file for the <parameter>add user script</parameter>
     
    260260        <itemizedlist>
    261261                <listitem><para>
    262                 Prepare the target Samba-3 server. This involves configuring Samba-3 for
     262                Prepare the target Samba server. This involves configuring Samba-3 for
    263263                migration to either a tdbsam or an ldapsam backend.
    264264                </para></listitem>
     
    284284
    285285                <listitem><para>
    286                 Upgrade the Samba-3 server from a BDC to a PDC, and validate all account
     286                Upgrade the Samba server from a BDC to a PDC, and validate all account
    287287                information.
    288288                </para></listitem>
     
    297297
    298298        <para>
    299         In this example, the migration is of an NT4 PDC to a Samba-3 PDC with an LDAP backend. The accounts about
     299        In this example, the migration is of an NT4 PDC to a Samba PDC with an LDAP backend. The accounts about
    300300        to be migrated are shown in <link linkend="NT4DUM"/>. In this example use is made of the
    301301        smbldap-tools scripts to add the accounts that are migrated into the ldapsam passdb backend.
     
    401401
    402402<example id="sbent4smb">
    403 <title>NT4 Migration Samba-3 Server <filename>smb.conf</filename> &smbmdash; Part: A</title>
     403<title>NT4 Migration Samba Server <filename>smb.conf</filename> &smbmdash; Part: A</title>
    404404<smbconfblock>
    405405<smbconfsection name="[global]"/>
     
    448448
    449449<example id="sbent4smb2">
    450 <title>NT4 Migration Samba-3 Server <filename>smb.conf</filename> &smbmdash; Part: B</title>
     450<title>NT4 Migration Samba Server <filename>smb.conf</filename> &smbmdash; Part: B</title>
    451451<smbconfblock>
    452452<smbconfsection name="[apps]"/>
     
    665665                <para>
    666666                Another way to obtain the domain SID from the target NT4 domain that is being
    667                 migrated to Samba-3 is by executing the following:
     667                migrated to Samba is by executing the following:
    668668<screen>
    669669&rootprompt; net rpc info -S TRANSGRESSION
     
    912912                <step><para>
    913913                Now it is time to join the Samba BDC to the target NT4 domain that is being
    914                 migrated to Samba-3 by executing the following:
     914                migrated to Samba by executing the following:
    915915<screen>
    916916&rootprompt; net rpc join -S TRANSGRESSION -U Administrator%not24get
     
    10461046                <step><para>
    10471047                The final responsibility in the migration process is to create identical
    1048                 shares and printing resources on the new Samba-3 server, copy all data
     1048                shares and printing resources on the new Samba server, copy all data
    10491049                across, set up privileges, and set share and file/directory access controls.
    10501050                </para></step>
     
    10791079                <step><para>
    10801080                Now shut down the old NT4 PDC. Only when the old NT4 PDC and all
    1081                 NT4 BDCs have been shut down can the Samba-3 PDC be started.
     1081                NT4 BDCs have been shut down can the Samba PDC be started.
    10821082                </para></step>
    10831083
     
    10891089
    10901090                <step><para>
    1091                 The configuration of Samba-3 BDC servers can be accomplished now or at any
     1091                The configuration of Samba BDC servers can be accomplished now or at any
    10921092                convenient time in the future. Please refer to the carefully detailed process
    10931093                for doing so is outlined in <link linkend="sbehap-bldg1"/>.
     
    12161216
    12171217                <step><para>
    1218                 Prepare a Samba-3 server precisely per the instructions shown in <link linkend="Big500users"/>.
     1218                Prepare a Samba server precisely per the instructions shown in <link linkend="Big500users"/>.
    12191219                Set the workgroup name to <constant>MEGANET</constant>.
    12201220                </para></step>
     
    13961396
    13971397                <para>
    1398                 Migration of an NT4 PDC database to a Samba-3 PDC is possible.
     1398                Migration of an NT4 PDC database to a Samba PDC is possible.
    13991399                </para>
    14001400
     
    14091409
    14101410                        <listitem><para>
    1411                         Multiple NT4 domains can be merged into a single Samba-3
     1411                        Multiple NT4 domains can be merged into a single Samba
    14121412                        domain.
    14131413                        </para></listitem>
    14141414
    14151415                        <listitem><para>
    1416                         The net Samba-3 domain most likely requires some
     1416                        The net Samba domain most likely requires some
    14171417                        administration and updating before going live.
    14181418                        </para></listitem>
     
    15271527                <primary>LDAP database</primary>
    15281528              </indexterm>
    1529                 Samba-3 must be able to tie all user and group account SIDs to a UNIX UID or GID. Samba
     1529                Samba must be able to tie all user and group account SIDs to a UNIX UID or GID. Samba
    15301530                does not fabricate the UNIX IDs from thin air, but rather requires them to be located
    15311531                in a suitable place.
     
    16321632              </indexterm>
    16331633                I want to change my domain name after I migrate all accounts from an NT4 domain to a
    1634                 Samba-3 domain. Does it make any sense to migrate the machine accounts in that case?
     1634                Samba domain. Does it make any sense to migrate the machine accounts in that case?
    16351635                </para>
    16361636
     
    16491649                I would recommend not to migrate the machine account. The machine accounts should still work, but there are registry entries
    16501650                on each Windows NT4 and upward client that have a tattoo of the old domain name. If you
    1651                 unjoin the domain and then rejoin the newly renamed Samba-3 domain, you can be certain to avoid
     1651                unjoin the domain and then rejoin the newly renamed Samba domain, you can be certain to avoid
    16521652                this tattooing effect.
    16531653                </para>
     
    16621662                <primary>multiple group mappings</primary>
    16631663              </indexterm>
    1664                 After merging multiple NT4 domains into a Samba-3 domain, I lost all multiple group mappings. Why?
     1664                After merging multiple NT4 domains into a Samba domain, I lost all multiple group mappings. Why?
    16651665                </para>
    16661666
     
    16731673                <primary>/etc/group</primary>
    16741674              </indexterm>
    1675                 Samba-3 currently does not implement multiple group membership internally. If you use the Windows
     1675                Samba currently does not implement multiple group membership internally. If you use the Windows
    16761676                NT4 Domain User Manager to manage accounts and you have an LDAP backend, the multiple group
    16771677                membership is stored in the POSIX groups area. If you use either tdbsam or smbpasswd backend,
     
    17531753                <primary>vampire</primary>
    17541754              </indexterm>
    1755                 My Windows NT4 PDC has 323,000 user accounts. How long will it take to migrate them to a Samba-3
     1755                My Windows NT4 PDC has 323,000 user accounts. How long will it take to migrate them to a Samba
    17561756                LDAP backend system using the vampire process?
    17571757                </para>
  • vendor/current/docs-xml/Samba3-ByExample/SBE-MigrateNW4Samba3.xml

    r414 r988  
    22<!DOCTYPE chapter PUBLIC "-//Samba-Team//DTD DocBook V4.2-Based Variant V1.0//EN" "http://www.samba.org/samba/DTD/samba-doc">
    33<chapter id="nw4migration">
    4   <title>Migrating NetWare Server to Samba-3</title>
     4  <title>Migrating NetWare Server to Samba</title>
    55
    66        <para>
     
    137137        the information presented in this chapter is provided to demonstrate
    138138        how Misty dealt with a particular NetWare migration requirement, and
    139         it provides an overall approach to the implementation of a Samba-3
     139        it provides an overall approach to the implementation of a Samba
    140140        environment that is significantly divergent from that presented in
    141141        <link linkend="happy"/>.
  • vendor/current/docs-xml/Samba3-ByExample/SBE-SecureOfficeServer.xml

    r414 r988  
    1010        and dependability. It was enough for the basic needs each was designed to fulfill. In
    1111        this chapter you address a more complex set of needs. The solution you explore
    12         introduces you to basic features that are specific to Samba-3.
     12        introduces you to basic features that are specific to Samba.
    1313        </para>
    1414
    1515        <para>
    1616        You should note that a working and secure solution could be implemented using Samba-2.2.x.
    17         In the exercises presented here, you are gradually using more Samba-3-specific features,
     17        In the exercises presented here, you are gradually using more Samba-specific features,
    1818        so caution is advised for anyone who tries to use Samba-2.2.x with the guidance here given.
    19         To avoid confusion, this book is all about Samba-3. Let's get the exercises in this
     19        To avoid confusion, this book is all about Samba. Let's get the exercises in this
    2020        chapter underway.
    2121        </para>
     
    176176        <para>
    177177        Many of the conclusions you draw here are obvious. Some requirements are not very clear
    178         or may simply be your means of drawing the most out of Samba-3. Much can be done more simply
     178        or may simply be your means of drawing the most out of Samba. Much can be done more simply
    179179        than you will demonstrate here, but keep in mind that the network must scale to at least 500
    180180        users. This means that some functionality will be overdesigned for the current 130-user
     
    235235                The configuration of Web serving, Web proxy services, electronic mail, and the details of
    236236                generic antivirus handling are beyond the scope of this book and therefore are not
    237                 covered except insofar as this affects Samba-3.
     237                covered except insofar as this affects Samba.
    238238                </para>
    239239
     
    789789
    790790                <step><para>
    791                 Install the Samba-3 binary RPM from the Samba-Team FTP site. Assuming that the binary
     791                Install the Samba binary RPM from the Samba-Team FTP site. Assuming that the binary
    792792                RPM file is called <filename>samba-3.0.20-1.i386.rpm</filename>, one way to install this
    793793                file is as follows:
     
    22142214                        <para>
    22152215                        <indexterm><primary>GPL</primary></indexterm>
    2216                         Samba is provided under the terms of the GNU GPL Version 2, a copy of which is provided
     2216                        Samba is provided under the terms of the GNU
     2217                        GPL Version 3, a copy of which is provided
    22172218                        with the source code.
    22182219                        </para>
     
    24612462                The guideline provided in <emphasis>TOSHARG2</emphasis>, Chapter 10, Section 10.1.2,
    24622463                is to limit the number of accounts in the tdbsam backend to 250. This is the point
    2463                 at which most networks tend to want backup domain controllers (BDCs). Samba-3 does
     2464                at which most networks tend to want backup domain controllers (BDCs). Samba does
    24642465                not provide a mechanism for replicating tdbsam data so it can be used by a BDC. The
    24652466                limitation of 250 users per tdbsam is predicated only on the need for replication,
     
    25402541
    25412542                <para>
    2542                 The default order by which Samba-3 attempts to communicate with MS Windows clients is via port 445 (the TCP port
     2543                The default order by which Samba attempts to communicate with MS Windows clients is via port 445 (the TCP port
    25432544                used by Windows clients when NetBIOS-less SMB over TCP/IP is in use). TCP port 139 is the primary port used for NetBIOS
    25442545                over TCP/IP. In this configuration Windows network operations are predicated around NetBIOS over TCP/IP. By
    25452546                specifying the use of only port 139, the intent is to reduce unsuccessful service connection attempts.
    2546                 The result of this is improved network performance. Where Samba-3 is installed as an Active Directory Domain
     2547                The result of this is improved network performance. Where Samba is installed as an Active Directory Domain
    25472548                member, the default behavior is highly beneficial and should not be changed.
    25482549                </para>
  • vendor/current/docs-xml/Samba3-ByExample/SBE-SimpleOfficeServer.xml

    r414 r988  
    1919        Instead of a bland technical discussion, each principle is demonstrated by way of a
    2020        real-world scenario for which a working solution<footnote><para>The examples given mirror those documented
    21         in The Official Samba-3 HOWTO and Reference Guide, Second Edition (TOSHARG2) Chapter 2, Section 2.3.1. You may gain additional
     21        in The Official Samba HOWTO and Reference Guide, Second Edition (TOSHARG2) Chapter 2, Section 2.3.1. You may gain additional
    2222        insight from the standalone server configurations covered in TOSHARG2, sections 2.3.1.2 through 2.3.1.4.
    2323        </para></footnote> is fully described.
     
    148148
    149149                        <step><para>
    150                         Download the Samba-3 RPM packages for Red Hat Fedora Core2 from the Samba
     150                        Download the Samba RPM packages for Red Hat Fedora Core2 from the Samba
    151151                        <ulink url="http://www.samba.org">FTP servers.</ulink>
    152152                        </para></step>
     
    557557                                created. Any new directories created still have the same owner, group, and permissions as the
    558558                                directory they are in. This should eliminate all permissions-based file access problems.  For
    559                                 more information on this subject, refer to TOSHARG2<footnote><para>The Official Samba-3 HOWTO and
     559                                more information on this subject, refer to TOSHARG2<footnote><para>The Official Samba HOWTO and
    560560                                                Reference Guide, Chapter 15, File, Directory and Share Access Controls.</para></footnote> or refer
    561561                                to the UNIX man page for the <command>chmod</command> and the <command>chown</command> commands.
     
    565565                                Install the &smb.conf; file shown in <link linkend="charity-smbconfnew"/> in the
    566566                                <filename>/etc/samba</filename> directory. This newer &smb.conf; file uses user-mode security
    567                                 and is more suited to the mode of operation of Samba-3 than the older share-mode security
     567                                and is more suited to the mode of operation of Samba than the older share-mode security
    568568                                configuration that was shown in the first edition of this book.
    569569                                </para>
     
    10981098
    10991099                <procedure>
    1100                 <title>Migration from Windows NT4 Workstation System to Samba-3</title>
     1100                <title>Migration from Windows NT4 Workstation System to Samba</title>
    11011101
    11021102            <step><para><indexterm>
     
    11141114
    11151115                        <step><para>
    1116                         Install the latest Samba-3 binary Red Hat Linux RPM that is available from the
     1116                        Install the latest Samba binary Red Hat Linux RPM that is available from the
    11171117                        Samba FTP site.
    11181118                        </para></step>
     
    12491249
    12501250                        <step><para>
    1251                         Verify that the files are being copied correctly from the Windows NT4 machine to the Samba-3 server.
    1252                         This is best done on the Samba-3 server. Check the contents of the directory tree under
     1251                        Verify that the files are being copied correctly from the Windows NT4 machine to the Samba server.
     1252                        This is best done on the Samba server. Check the contents of the directory tree under
    12531253                        <filename>/data</filename> by executing the following command:
    12541254<screen>
  • vendor/current/docs-xml/Samba3-ByExample/SBE-Support.xml

    r414 r988  
    7777        url="https://lists.samba.org/mailman/">web</ulink> site. The public mailing list that can be used to obtain
    7878        free, user contributed, support is called the <literal>samba</literal> list. The email address for this list
    79         is at <literal>mail:samba@samba.org</literal>.  Information regarding the Samba IRC channels may be found on
     79        is at <literal>mail:samba@lists.samba.org</literal>.  Information regarding the Samba IRC channels may be found on
    8080        the Samba <ulink url="http://www.samba.org/samba.irc.html">IRC</ulink> web page.
    8181        </para>
  • vendor/current/docs-xml/Samba3-ByExample/SBE-TheSmallOffice.xml

    r414 r988  
    174174                with Samba-2.2.x series releases. This is deliberate so that in the next chapter it is
    175175                possible to start with the installation that you have created here, migrate it
    176                 to a Samba-3 configuration, and then secure the system further. Configurations following
     176                to a Samba configuration, and then secure the system further. Configurations following
    177177                this one utilize features that may not be supported in Samba-2.2.x releases.
    178178                However, you should note that the examples in each chapter start with the assumption
     
    317317
    318318                <step><para>
    319                 Install the Samba-3 binary RPM from the Samba-Team FTP site.
     319                Install the Samba binary RPM from the Samba-Team FTP site.
    320320                </para></step>
    321321
     
    11391139
    11401140                <para>
    1141                 Samba-3 does not permit a Domain Group to become visible to Domain network clients unless the account
     1141                Samba does not permit a Domain Group to become visible to Domain network clients unless the account
    11421142                has a UNIX group account equivalent. The Domain groups that should be given UNIX equivalents are
    11431143                <guimenu>Domain Guests</guimenu>, <guimenu>Domain Users</guimenu>, and <guimenu>Domain Admins</guimenu>.
     
    12221222                <para>
    12231223                If it becomes necessary to change either the server name or the Domain name, be sure to back up the respective
    1224                 SID before the change is made. You can back up the SID using the <command>net getlocalsid</command> (Samba-3)
     1224                SID before the change is made. You can back up the SID using the <command>net getlocalsid</command> (Samba)
    12251225                or the <command>smbpasswd</command> (Samba-2.2.x). To change the SID, you use the same tool. Be sure
    12261226                to check the man page for this command for detailed instructions regarding the steps involved.
     
    12411241
    12421242                <para>
    1243                 Samba-3 implements a Windows NT4-style security domain architecture. This type of Domain cannot
     1243                Samba implements a Windows NT4-style security domain architecture. This type of Domain cannot
    12441244                be managed using tools present on a Windows XP Professional installation. You may download from the
    12451245                Microsoft Web site the SRVTOOLS.EXE package. Extract it into the directory from which you wish to use
    12461246                it. This package extracts the tools: <command>User Manager for Domains</command>, <command>Server Manager</command>, and <command>Event
    1247                 Viewer</command>. You may use the <guimenu>User Manager for Domains</guimenu> to manage your Samba-3
     1247                Viewer</command>. You may use the <guimenu>User Manager for Domains</guimenu> to manage your Samba
    12481248                Domain user and group accounts. Of course, you do need to be logged on as the <constant>Administrator</constant>
    1249                 for the Samba-3 Domain. It may help to log on as the <constant>root</constant> account.
     1249                for the Samba Domain. It may help to log on as the <constant>root</constant> account.
    12501250                </para>
    12511251
  • vendor/current/docs-xml/Samba3-ByExample/SBE-UpgradingSamba.xml

    r414 r988  
    22<!DOCTYPE chapter PUBLIC "-//Samba-Team//DTD DocBook V4.2-Based Variant V1.0//EN" "http://www.samba.org/samba/DTD/samba-doc">
    33<chapter id="upgrades">
    4 <title>Updating Samba-3</title>
     4<title>Updating Samba</title>
    55
    66<para>
     
    1717<indexterm><primary>smbpasswd</primary></indexterm>
    1818<indexterm><primary>passdb backend</primary></indexterm>
    19 There has also been much talk about migration of Samba-3 from an smbpasswd
     19There has also been much talk about migration of Samba from an smbpasswd
    2020passdb backend to the use of the tdbsam or ldapsam facilities that are new
    21 to Samba-3.
     21to Samba.
    2222</para>
    2323
     
    232232        <indexterm><primary>SAS</primary></indexterm>
    233233        <indexterm><primary>SID</primary></indexterm>
    234         In Samba-3 on a domain controller (PDC or BDC), the domain name controls the domain
     234        In Samba on a domain controller (PDC or BDC), the domain name controls the domain
    235235        SID. On all prior versions the hostname (computer name, or NetBIOS name) controlled
    236236        the SID. On a standalone server the hostname still controls the SID.
     
    240240        <indexterm><primary>net</primary><secondary>getlocalsid</secondary></indexterm>
    241241        <indexterm><primary>net</primary><secondary>setlocalsid</secondary></indexterm>
    242         The local machine SID can be backed up using this procedure (Samba-3):
     242        The local machine SID can be backed up using this procedure (Samba):
    243243<screen>
    244244&rootprompt; net getlocalsid > /etc/samba/my-local-SID
     
    262262        <para>
    263263        Where the <filename>secrets.tdb</filename> file exists and a version of Samba 2.x or later
    264         has been used, there is no specific need to go through this update process. Samba-3 has the
     264        has been used, there is no specific need to go through this update process. Samba has the
    265265        ability to read the older tdb file and to perform an in-situ update to the latest tdb format.
    266266        This is not a reversible process &smbmdash; it is a one-way upgrade.
     
    296296&rootprompt; rpcclient hostname lsaquery -Uroot%password
    297297</screen>
    298         This can also be done with Samba-3 by executing:
     298        This can also be done with Samba by executing:
    299299<screen>
    300300&rootprompt; net rpc info -Uroot%password
     
    431431        <para>
    432432        <indexterm><primary>compile-time</primary></indexterm>
    433         Samba-3 provides a neat new way to track the location of all control files as well as to
     433        Samba provides a neat new way to track the location of all control files as well as to
    434434        find the compile-time options used as the Samba package was built. Here  is how the dark
    435435        secrets of the internals of the location of control files within Samba executables can
     
    482482        <indexterm><primary>internationalization</primary></indexterm>
    483483        Samba-2.x had no support for Unicode; instead, all national language character-set support in file names
    484         was done using particular locale codepage mapping techniques. Samba-3 supports Unicode in file names, thus
     484        was done using particular locale codepage mapping techniques. Samba supports Unicode in file names, thus
    485485        providing true internationalization support.
    486486        </para>
     
    496496        <para>
    497497        <indexterm><primary>UTF-8</primary></indexterm>
    498         Files that are created with Samba-3 will use UTF-8 encoding. Should the file system ever end up with a
     498        Files that are created with Samba will use UTF-8 encoding. Should the file system ever end up with a
    499499        mix of codepage (unix charset)-encoded file names and UTF-8-encoded file names, the mess will take some
    500500        effort to set straight.
     
    682682        <para>
    683683        <indexterm><primary>parameters</primary></indexterm>
    684         The following parameters are new to Samba-3 and should be correctly configured.
     684        The following parameters are new to Samba and should be correctly configured.
    685685        Please refer to <link linkend="secure"/> through <link linkend="net2000users"/>
    686686        in this book for examples of use of the new parameters shown here:
     
    710710        <indexterm><primary>add user script</primary></indexterm>
    711711        The <parameter>add machine script</parameter> functionality was previously
    712         handled by the <parameter>add user script</parameter>, which in Samba-3 is
     712        handled by the <parameter>add user script</parameter>, which in Samba is
    713713        used exclusively to add user accounts.
    714714        </para>
     
    749749        Samba version 2.x could be compiled for use either with or without LDAP.
    750750        The LDAP control settings in the &smb.conf; file in this old version are
    751         completely different (and less complete) than they are with Samba-3. This
     751        completely different (and less complete) than they are with Samba. This
    752752        means that after migrating the control files, it is necessary to reconfigure
    753753        the LDAP settings entirely.
     
    828828  * ldapsam - attribute rich account storage and retrieval
    829829    backend utilizing an LDAP directory.
    830   * ldapsam_compat - a 2.2 backward compatible LDAP account
    831     backend
    832830
    833831Certain functions of the smbpasswd(8) tool have been split between the
    834832new smbpasswd(8) utility, the net(8) tool, and the new pdbedit(8)
    835833utility.  See the respective man pages for details.
    836 
    837 ######################################################################
    838 LDAP
    839 ####
    840 
    841 This section outlines the new features affecting Samba / LDAP
    842 integration.
    843 
    844 New Schema
    845 ----------
    846 
    847 A new object class (sambaSamAccount) has been introduced to replace
    848 the old sambaAccount.  This change aids us in the renaming of
    849 attributes to prevent clashes with attributes from other vendors.
    850 There is a conversion script (examples/LDAP/convertSambaAccount) to
    851 modify and LDIF file to the new schema.
    852 
    853 Example:
    854 
    855   $ ldapsearch .... -b "ou=people,dc=..." &gt; sambaAcct.ldif
    856   $ convertSambaAccount --sid=&lt;Domain SID&gt; \
    857     --input=sambaAcct.ldif --output=sambaSamAcct.ldif \
    858     --changetype=[modify|add]
    859 
    860 The &lt;DOM SID&gt; can be obtained by running 'net getlocalsid
    861 &lt;DOMAINNAME&gt;' on the Samba PDC as root.  The changetype determines
    862 the format of the generated LDIF output--either create new entries
    863 or modify existing entries.
    864 
    865 The old sambaAccount schema may still be used by specifying the
    866 "ldapsam_compat" passdb backend.  However, the sambaAccount and
    867 associated attributes have been moved to the historical section of
    868 the schema file and must be uncommented before use if needed.
    869 The 2.2 object class declaration for a sambaAccount has not changed
    870 in the 3.0 samba.schema file.
    871 
    872 Other new object classes and their uses include:
    873 
    874   * sambaDomain - domain information used to allocate rids
    875     for users and groups as necessary.  The attributes are added
    876     in 'ldap suffix' directory entry automatically if
    877     an idmap uid/gid range has been set and the 'ldapsam'
    878     passdb backend has been selected.
    879 
    880   * sambaGroupMapping - an object representing the
    881     relationship between a posixGroup and a Windows
    882     group/SID.  These entries are stored in the 'ldap
    883     group suffix' and managed by the 'net groupmap' command.
    884 
    885   * sambaUnixIdPool - created in the 'ldap idmap suffix' entry
    886     automatically and contains the next available 'idmap uid' and
    887     'idmap gid'
    888 
    889   * sambaIdmapEntry - object storing a mapping between a
    890     SID and a UNIX uid/gid.  These objects are created by the
    891     idmap_ldap module as needed.
    892 
    893   * sambaSidEntry - object representing a SID alone, as a Structural
    894     class on which to build the sambaIdmapEntry.
    895 
    896834
    897835New Suffix for Searching
     
    974912
    975913        <sect2>
    976         <title>Samba-3 to Samba-3 Updates on the Same Server</title>
     914        <title>Samba to Samba-3 Updates on the Same Server</title>
    977915
    978916        <para>
    979917        The guidance in this section deals with updates to an existing
    980         Samba-3 server installation.
     918        Samba server installation.
    981919        </para>
    982920
     
    985923
    986924        <para>
    987         With the provision that the binary Samba-3 package has been built
    988         with the same path and feature settings as the existing Samba-3
    989         package that is being updated, an update of Samba-3 versions 3.0.0
     925        With the provision that the binary Samba package has been built
     926        with the same path and feature settings as the existing Samba
     927        package that is being updated, an update of Samba versions 3.0.0
    990928        through 3.0.4 can be updated to 3.0.5 without loss of functionality
    991929        and without need to change either the &smb.conf; file or, where
     
    1001939        <indexterm><primary>schema</primary></indexterm>
    1002940        <indexterm><primary>LDAP</primary><secondary>schema</secondary></indexterm>
    1003         When updating versions of Samba-3 prior to 3.0.6 to 3.0.6 through 3.0.10,
     941        When updating versions of Samba prior to 3.0.6 to 3.0.6 through 3.0.10,
    1004942        it is necessary only to update the LDAP schema (where LDAP is used).
    1005         Always use the LDAP schema file that is shipped with the latest Samba-3
     943        Always use the LDAP schema file that is shipped with the latest Samba
    1006944        update.
    1007945        </para>
     
    10651003
    10661004        <sect2>
    1067         <title>Migrating Samba-3 to a New Server</title>
     1005        <title>Migrating Samba to a New Server</title>
    10681006
    10691007        <para>
  • vendor/current/docs-xml/Samba3-ByExample/SBE-preface.xml

    r414 r988  
    1616        This book is your means to the straight path. It provides step-by-step,
    1717        proven, working examples of Samba deployments.  If you want to deploy
    18         Samba-3 with the least effort, or if you want to become an expert at deploying
    19         Samba-3 without having to search through lots of documentation, this
     18        Samba with the least effort, or if you want to become an expert at deploying
     19        Samba without having to search through lots of documentation, this
    2020        book is the ticket to your destination.
    2121        </para>
     
    4242
    4343        <para>
    44         The focus of attention in this book is Samba-3. Specific notes are made in
     44        The focus of attention in this book is Samba. Specific notes are made in
    4545        respect of how Samba may be made secure. This book does not attempt to provide
    4646        detailed information regarding secure operation and configuration of peripheral
     
    7575        All example case configuration files, scripts, and other tools are provided
    7676        on the CD-ROM. This book is descriptive, provides detailed diagrams, and
    77         makes deployment of Samba-3 a breeze.
     77        makes deployment of Samba a breeze.
    7878        </para>
    7979
     
    8787        necessitate this documentation update. This update has the specific intent to
    8888        refocus this book so that its guidance can be followed for samba-3.0.20
    89         and beyond. Further changes are expected as Samba-3 matures further and will
     89        and beyond. Further changes are expected as Samba matures further and will
    9090        be reflected in future updates.
    9191        </para>
     
    426426                </para>
    427427
    428                 <para><emphasis>TechInfo</emphasis> &smbmdash; Slave LDAP servers are introduced. Samba is
    429                 configured to use multiple LDAP backends. This is a brief chapter; it assumes that the
     428                <para><emphasis>TechInfo</emphasis> &smbmdash; Slave
     429                LDAP servers are introduced. This is a brief chapter; it assumes that the
    430430                technology has been mastered and gets right down to concepts and how to deploy them.
    431431                </para>
     
    456456
    457457                <varlistentry>
    458                 <term>Chapter 8 &smbmdash; Updating Samba-3.</term><listitem>
     458                <term>Chapter 8 &smbmdash; Updating Samba.</term><listitem>
    459459                <para>
    460460                This chapter is the result of repeated requests for better documentation of the steps
     
    473473
    474474                <varlistentry>
    475                 <term>Chapter 9 &smbmdash; Migrating NT4 Domain to Samba-3.</term><listitem>
     475                <term>Chapter 9 &smbmdash; Migrating NT4 Domain to Samba.</term><listitem>
    476476                <para>
    477477                Another six months have passed. Abmas has acquired yet another company. You will find a
     
    492492                <para>
    493493                Misty Stanley-Jones has contributed information that summarizes her experience at migration
    494                 from a NetWare server to Samba-3.
     494                from a NetWare server to Samba.
    495495                </para>
    496496
     
    523523                <term>Chapter 12 &smbmdash; Integrating Additional Services.</term><listitem>
    524524                <para>
    525                 The battle is almost over, Samba-3 has won the day. Your team are delighted and now you
     525                The battle is almost over, Samba has won the day. Your team are delighted and now you
    526526                find yourself at yet another cross-roads. Abmas have acquired a snack food business, you
    527527                made promises you must keep. IT costs must be reduced, you have new resistance, but you
     
    533533                <para><emphasis>TechInfo</emphasis> &smbmdash; Samba provides the <command>ntlm_auth</command>
    534534                module that makes it possible for MS Windows Internet Explorer to connect via the Squid Web
    535                 and FTP proxy server. You will configure Samba-3 as well as Squid to deliver authenticated
     535                and FTP proxy server. You will configure Samba as well as Squid to deliver authenticated
    536536                access control using the Active Directory Domain user security credentials.
    537537                </para>
  • vendor/current/docs-xml/Samba3-ByExample/index.xml

    r414 r988  
    9494Samba Domain Member Servers and Samba Domain Member Clients to a Samba domain, the other
    9595subject is that of how to migrate from and NT4 Domain, a NetWare server, or from an earlier
    96 Samba version to environments that use the most recent Samba-3 release.
     96Samba version to environments that use the most recent Samba release.
    9797</para>
    9898
     
    130130
    131131        <?latex \cleardoublepage ?>
    132         <xi:include href="SBE-KerberosFastStart.xml"/>
    133         <?latex \cleardoublepage ?>
    134132        <xi:include href="SBE-DomainAppsSupport.xml"/>
    135133        <?latex \cleardoublepage ?>
Note: See TracChangeset for help on using the changeset viewer.