Ignore:
Timestamp:
Nov 24, 2016, 1:14:11 PM (9 years ago)
Author:
Silvan Scherrer
Message:

Samba Server: update vendor to version 4.4.3

File:
1 edited

Legend:

Unmodified
Added
Removed
  • vendor/current/docs-xml/Samba3-HOWTO/TOSHARG-IDMAP.xml

    r414 r988  
    1818The Microsoft Windows operating system has a number of features that impose specific challenges
    1919to interoperability with the operating systems on which Samba is implemented. This chapter deals
    20 explicitly with the mechanisms Samba-3 (version 3.0.8 and later) uses to overcome one of the
     20explicitly with the mechanisms Samba (version 3.0.8 and later) uses to overcome one of the
    2121key challenges in the integration of Samba servers into an MS Windows networking environment.
    2222This chapter deals with identity mapping (IDMAP) of Windows security identifiers (SIDs)
     
    121121        <indexterm><primary>SID</primary></indexterm>
    122122        <indexterm><primary>Active Directory</primary></indexterm>
    123         Samba-3 can act as a Windows NT4 PDC or BDC, thereby providing domain control protocols that
    124         are compatible with Windows NT4. Samba-3 file and print sharing protocols are compatible with
     123        Samba can act as a Windows NT4 PDC or BDC, thereby providing domain control protocols that
     124        are compatible with Windows NT4. Samba file and print sharing protocols are compatible with
    125125        all versions of MS Windows products. Windows NT4, as with MS Active Directory,
    126126        extensively makes use of Windows SIDs.
     
    131131        <indexterm><primary>UID</primary></indexterm>
    132132        <indexterm><primary>GID</primary></indexterm>
    133         Samba-3 domain member servers and clients must interact correctly with MS Windows SIDs. Incoming
     133        Samba domain member servers and clients must interact correctly with MS Windows SIDs. Incoming
    134134        Windows SIDs must be translated to local UNIX UIDs and GIDs. Outgoing information from the Samba
    135135        server must provide to MS Windows clients and servers appropriate SIDs.
     
    236236                                is an appliance like file server on which no local accounts are configured and
    237237                                winbind is used to obtain account credentials from the domain controllers for the
    238                                 domain. The domain control can be provided by Samba-3, MS Windows NT4, or MS Windows
     238                                domain. The domain control can be provided by Samba, MS Windows NT4, or MS Windows
    239239                                Active Directory.
    240240                                </para>
     
    453453        <para>
    454454        IDMAP information can be written directly to the LDAP server so long as all domain controllers
    455         have access to the master (writable) LDAP server. Samba-3 at this time does not handle LDAP redirects
     455        have access to the master (writable) LDAP server. Samba at this time does not handle LDAP redirects
    456456        in the IDMAP backend. This means that it is is unsafe to use a slave (replicate) LDAP server with
    457457        the IDMAP facility.
     
    596596<smbconfoption name="winbind use default domain">Yes</smbconfoption>
    597597<smbconfoption name="winbind nested groups">Yes</smbconfoption>
    598 <smbconfoption name="printer admin">"BUTTERNET\Domain Admins"</smbconfoption>
    599598</smbconfblock>
    600599</example>
     
    729728<smbconfoption name="winbind enum groups">No</smbconfoption>
    730729<smbconfoption name="winbind nested groups">Yes</smbconfoption>
    731 <smbconfoption name="printer admin">"Domain Admins"</smbconfoption>
    732730</smbconfblock>
    733731</example>
     
    822820        <indexterm><primary>ADAM</primary></indexterm>
    823821        <indexterm><primary>ADS</primary></indexterm>
    824         The storage of IDMAP information in LDAP can be used with both NT4/Samba-3-style domains and
     822        The storage of IDMAP information in LDAP can be used with both NT4/Samba-style domains and
    825823        ADS domains. OpenLDAP is a commonly used LDAP server for this purpose, although any
    826824        standards-complying LDAP server can be used. It is therefore possible to deploy this IDMAP
     
    858856        <para>
    859857        <indexterm><primary>realm</primary></indexterm>
    860         In the case of an NT4 or Samba-3-style domain the <parameter>realm</parameter> is not used, and the
     858        In the case of an NT4 or Samba-style domain the <parameter>realm</parameter> is not used, and the
    861859        command used to join the domain is <command>net rpc join</command>. The above example also demonstrates
    862860        advanced error-reporting techniques that are documented in <link linkend="dbglvl">Reporting Bugs</link>.
Note: See TracChangeset for help on using the changeset viewer.