Ignore:
Timestamp:
Nov 24, 2016, 1:14:11 PM (9 years ago)
Author:
Silvan Scherrer
Message:

Samba Server: update vendor to version 4.4.3

File:
1 edited

Legend:

Unmodified
Added
Removed
  • vendor/current/docs-xml/Samba3-HOWTO/TOSHARG-Passdb.xml

    r414 r988  
    2121
    2222<para>
    23 <indexterm><primary>account backends</primary></indexterm>
    24 <indexterm><primary>password backends</primary></indexterm>
    25 <indexterm><primary>scalability</primary></indexterm>
    26 <indexterm><primary>ADS</primary></indexterm>
    27 Early releases of Samba-3 implemented new capability to work concurrently with multiple account backends. This
    28 capability was removed beginning with release of Samba 3.0.23. Commencing with Samba 3.0.23 it is possible to
    29 work with only one specified passwd backend.
    30 </para>
    31 
    32 <para>
    3323<indexterm><primary>passdb backend</primary></indexterm>
    3424<indexterm><primary>smbpasswd</primary></indexterm>
     
    6858<title>Features and Benefits</title>
    6959
    70 <para>
    71 Samba-3 provides for complete backward compatibility with Samba-2.2.x functionality
    72 as follows:
    73 <indexterm><primary>SAM backend</primary><secondary>smbpasswd</secondary></indexterm>
    74 <indexterm><primary>SAM backend</primary><secondary>ldapsam_compat</secondary></indexterm>
    75 <indexterm><primary>encrypted passwords</primary></indexterm>
    76 </para>
    77 
    7860<sect2>
    7961        <title>Backward Compatibility Account Storage Systems</title>
     
    121103                </listitem>
    122104        </varlistentry>
    123 
    124         <varlistentry><term>ldapsam_compat (Samba-2.2 LDAP Compatibility)</term>
    125                 <listitem>
    126                         <para>
    127 <indexterm><primary>ldapsam_compat</primary></indexterm>
    128 <indexterm><primary>Samba-2.2.x LDAP schema</primary></indexterm>
    129 <indexterm><primary>OpenLDAP backend</primary></indexterm>
    130                         There is a password backend option that allows continued operation with
    131                         an existing OpenLDAP backend that uses the Samba-2.2.x LDAP schema extension.
    132                         This option is provided primarily as a migration tool, although there is
    133                         no reason to force migration at this time. This tool will eventually
    134                         be deprecated.
    135                         </para>
    136                 </listitem>
    137         </varlistentry>
    138105</variablelist>
    139106
     
    144111
    145112<para>
    146 Samba-3 introduces a number of new password backend capabilities.
     113Samba introduces a number of new password backend capabilities.
    147114<indexterm><primary>SAM backend</primary><secondary>tdbsam</secondary></indexterm>
    148115<indexterm><primary>SAM backend</primary><secondary>ldapsam</secondary></indexterm>
     
    171138                        smbpasswd</emphasis> information plus the extended MS Windows NT/200x
    172139                        SAM information into a binary format TDB (trivial database) file.
    173                         The inclusion of the extended information makes it possible for Samba-3
     140                        The inclusion of the extended information makes it possible for Samba
    174141                        to implement the same account and system access controls that are possible
    175142                        with MS Windows NT4/200x-based systems.
     
    203170<indexterm><primary>schema file</primary></indexterm>
    204171<indexterm><primary>examples/LDAP</primary></indexterm>
    205                         Samba-3 has a new and extended LDAP implementation that requires configuration
     172                        Samba has a new and extended LDAP implementation that requires configuration
    206173                        of OpenLDAP with a new format Samba schema. The new format schema file is
    207174                        included in the <filename class="directory">examples/LDAP</filename> directory of the Samba distribution.
     
    348315                <note>
    349316                <para>
    350 <indexterm><primary>Windows XP Home</primary></indexterm>
     317<indexterm><primary>Windows Home edition</primary></indexterm>
    351318<indexterm><primary>domain member</primary></indexterm>
    352319<indexterm><primary>domain logons</primary></indexterm>
    353                 MS Windows XP Home does not have facilities to become a domain member, and it cannot participate in domain logons.
     320                MS Windows Home editions do not have facilities to become a domain member, and cannot participate in domain logons.
    354321                </para>
    355322                </note>
     
    362329                        <listitem><para>Windows NT 3.5x.</para></listitem>
    363330                        <listitem><para>Windows NT 4.0.</para></listitem>
    364                         <listitem><para>Windows 2000 Professional.</para></listitem>
    365                         <listitem><para>Windows 200x Server/Advanced Server.</para></listitem>
    366                         <listitem><para>Windows XP Professional.</para></listitem>
     331                        <listitem><para>Windows editions labeled Professional.</para></listitem>
     332                        <listitem><para>Windows editions labeled Server/Advanced Server.</para></listitem>
    367333                </itemizedlist>
    368334
     
    420386<indexterm><primary>SMB encryption</primary></indexterm>
    421387                                Windows NT does not like talking to a server that does not support encrypted passwords. It will refuse to
    422                                 browse the server if the server is also in user-level security mode. It will insist on prompting the user for
     388                                browse the server. It will insist on prompting the user for
    423389                                the password on each connection, which is very annoying. The only thing you can do to stop this is to use SMB
    424390                                encryption.
     
    515481<indexterm><primary>NFS</primary></indexterm>
    516482<indexterm><primary>rsync</primary></indexterm>
    517         Samba-3 has a special facility that makes it possible to maintain identical UIDs and GIDs
     483        Samba has a special facility that makes it possible to maintain identical UIDs and GIDs
    518484        on all servers in a distributed network. A distributed network is one where there exists
    519485        a PDC, one or more BDCs, and/or one or more domain member servers. Why is this important?
     
    1009975                in compliance with government laws and regulations is clear to all. The <command>pdbedit</command> is
    1010976                currently the only Samba tool that provides the capacity to manage account and systems access controls
    1011                 and policies. During the remaining life-cycle of the Samba-3 series it is possible the new tools may
     977                and policies. During the remaining life-cycle of the Samba series it is possible the new tools may
    1012978                be implemented to aid in this important area.
    1013979                </para>
     
    16011567                        <listitem><para>minimum password age = 7 days.</para></listitem>
    16021568                        <listitem><para>bad lockout attempt = 8 bad logon attempts.</para></listitem>
    1603                         <listitem><para>lockout duration = forever, account must be manually reenabled.</para></listitem>
     1569                        <listitem><para>lockout duration = forever, account must be manually re-enabled.</para></listitem>
    16041570                </orderedlist>
    16051571
     
    16351601Account policies must be set individually on each PDC and BDC. At this time (Samba 3.0.11 to Samba 3.0.14a)
    16361602account policies are not replicated automatically. This may be fixed before Samba 3.0.20 ships or some
    1637 time there after. Please check the WHATSNEW.txt file in the Samba-3 tarball for specific update notiations
     1603time there after. Please check the WHATSNEW.txt file in the Samba tarball for specific update notiations
    16381604regarding this facility.
    16391605</para></warning>
     
    16771643<sect1>
    16781644<title>Password Backends</title>
    1679 
    1680 <para>
    1681 <indexterm><primary>account database</primary></indexterm>
    1682 <indexterm><primary>SMB/CIFS server</primary></indexterm>
    1683 Samba offers flexibility in backend account database design. The flexibility is immediately obvious as one
    1684 begins to explore this capability. Recent changes to Samba (since 3.0.23) have removed the mulitple backend
    1685 feature in order to simplify problems that broke some installations. This removal has made the internal
    1686 operation of Samba-3 more consistent and predictable.
    1687 </para>
    1688 
    1689 <para>
    1690 <indexterm><primary>multiple backends</primary></indexterm>
    1691 <indexterm><primary>tdbsam databases</primary></indexterm>
    1692 Beginning with Samba 3.0.23 it is no longer possible to specify use of mulitple passdb backends. Earlier
    1693 versions of Samba-3 made it possible to specify multiple password backends, and even multiple
    1694 backends of the same type. The multiple passdb backend capability caused many problems with name to SID and
    1695 SID to name ID resolution.  The Samba team wrestled with the challenges and decided that this feature needed
    1696 to be removed.
    1697 </para>
    16981645
    16991646        <sect2>
     
    21172064dc: quenya
    21182065o: Quenya Org Network
    2119 description: The Samba-3 Network LDAP Example
     2066description: The Samba Network LDAP Example
    21202067
    21212068# Organizational Role for Directory Management
     
    21942141<indexterm><primary>secrets.tdb</primary></indexterm>
    21952142                Before Samba can access the LDAP server, you need to store the LDAP admin password
    2196                 in the Samba-3 <filename>secrets.tdb</filename> database by:
     2143                in the Samba <filename>secrets.tdb</filename> database by:
    21972144<indexterm><primary>smbpasswd</primary></indexterm>
    21982145<screen>
     
    23242271<indexterm><primary>Domain Groups</primary></indexterm>
    23252272<indexterm><primary>ADS</primary></indexterm>
    2326                         In Samba-3, the group management system is based on POSIX
     2273                        In Samba, the group management system is based on POSIX
    23272274                        groups. This means that Samba makes use of the posixGroup ObjectClass.
    23282275                        For now, there is no NT-like group system management (global and local
    2329                         groups). Samba-3 knows only about <constant>Domain Groups</constant>
    2330                         and, unlike MS Windows 2000 and Active Directory, Samba-3 does not
     2276                        groups). Samba knows only about <constant>Domain Groups</constant>
     2277                        and, unlike MS Windows 2000 and Active Directory, Samba does not
    23312278                        support nested groups.
    23322279                        </para>
     
    25912538
    25922539                <para>
    2593                 Samba-3 and later can update the non-Samba (LDAP) password stored with an account. When
     2540                Samba and later can update the non-Samba (LDAP) password stored with an account. When
    25942541                using pam_ldap, this allows changing both UNIX and Windows passwords at once.
    25952542                </para>
     
    26592606
    26602607        </sect2>
    2661 
    2662         <sect2>
    2663         <title>Configuration of <parameter>auth methods</parameter></title>
    2664 
    2665         <para>
    2666         When explicitly setting an <smbconfoption name="auth methods"/> parameter,
    2667         <parameter>guest</parameter> must be specified as the first entry on the line &smbmdash;
    2668         for example, <smbconfoption name="auth methods">guest sam</smbconfoption>.
    2669         </para>
    2670 
    2671         </sect2>
    2672 
    26732608</sect1>
    26742609
Note: See TracChangeset for help on using the changeset viewer.