Changeset 988 for vendor/current/docs/manpages/smbcacls.1
- Timestamp:
- Nov 24, 2016, 1:14:11 PM (9 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
vendor/current/docs/manpages/smbcacls.1
r860 r988 2 2 .\" Title: smbcacls 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "SMBCACLS" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "SMBCACLS" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 smbcacls {//server/share} {/filename} [\-D|\-\-delete\ acl s] [\-M|\-\-modify\ acls] [\-a|\-\-add\ acls] [\-S|\-\-set\ acls] [\-C|\-\-chown\ name] [\-G|\-\-chgrp\ name] [\-I\ allow|romove|copy] [\-\-numeric] [\-t] [\-U\ username] [\-h] [\-d]34 smbcacls {//server/share} {/filename} [\-D|\-\-delete\ acl] [\-M|\-\-modify\ acl] [\-a|\-\-add\ acl] [\-S|\-\-set\ acl] [\-C|\-\-chown\ name] [\-G|\-\-chgrp\ name] [\-I\ allow|remove|copy] [\-\-numeric] [\-t] [\-U\ username] [\-d] [\-e] [\-m|\-\-max\-protocol\ LEVEL] [\-\-query\-security\-info\ FLAGS] [\-\-set\-security\-info\ FLAGS] [\-\-sddl] [\-\-domain\-sid\ SID] 35 35 .SH "DESCRIPTION" 36 36 .PP … … 41 41 The 42 42 smbcacls 43 program manipulates NT Access Control Lists (ACLs) on SMB file shares\&. 43 program manipulates NT Access Control Lists (ACLs) on SMB file shares\&. An ACL is comprised zero or more Access Control Entries (ACEs), which define access restrictions for a specific user or group\&. 44 44 .SH "OPTIONS" 45 45 .PP … … 48 48 program\&. The format of ACLs is described in the section ACL FORMAT 49 49 .PP 50 \-a|\-\-add acl s51 .RS 4 52 Add the ACLs specified to the ACL list\&. Existing access control entries are unchanged\&.53 .RE 54 .PP 55 \-M|\-\-modify acl s56 .RS 4 57 Modify the mask value (permissions) for the AC Ls specified on the command line\&. An error will be printed for each ACL specified that was not already present in the ACL list58 .RE 59 .PP 60 \-D|\-\-delete acl s61 .RS 4 62 Delete any AC Ls specified on the command line\&. An error will be printed for each ACL specified that was not already present in the ACL list\&.63 .RE 64 .PP 65 \-S|\-\-set acl s66 .RS 4 67 This command sets the ACL s on the file with only the ones specified on the command line\&. All other ACLs areerased\&. Note that the ACL specified must contain at least a revision, type, owner and group for the call to succeed\&.50 \-a|\-\-add acl 51 .RS 4 52 Add the entries specified to the ACL\&. Existing access control entries are unchanged\&. 53 .RE 54 .PP 55 \-M|\-\-modify acl 56 .RS 4 57 Modify the mask value (permissions) for the ACEs specified on the command line\&. An error will be printed for each ACE specified that was not already present in the object\*(Aqs ACL\&. 58 .RE 59 .PP 60 \-D|\-\-delete acl 61 .RS 4 62 Delete any ACEs specified on the command line\&. An error will be printed for each ACE specified that was not already present in the object\*(Aqs ACL\&. 63 .RE 64 .PP 65 \-S|\-\-set acl 66 .RS 4 67 This command sets the ACL on the object with only what is specified on the command line\&. Any existing ACL is erased\&. Note that the ACL specified must contain at least a revision, type, owner and group for the call to succeed\&. 68 68 .RE 69 69 .PP … … 98 98 .RE 99 99 .PP 100 \-m|\-\-max\-protocol PROTOCOL_NAME 101 .RS 4 102 This allows the user to select the highest SMB protocol level that smbcacls will use to connect to the server\&. By default this is set to NT1, which is the highest available SMB1 protocol\&. To connect using SMB2 or SMB3 protocol, use the strings SMB2 or SMB3 respectively\&. Note that to connect to a Windows 2012 server with encrypted transport selecting a max\-protocol of SMB3 is required\&. 103 .RE 104 .PP 100 105 \-t|\-\-test\-args 101 106 .RS 4 … … 103 108 .RE 104 109 .PP 105 \-h|\-\-help 106 .RS 4 107 Print a summary of command line options\&. 108 .RE 109 .PP 110 \-d|\-\-debuglevel=level 111 .RS 4 112 \fIlevel\fR 113 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&. 114 .sp 115 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&. 116 .sp 117 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&. 118 .sp 119 Note that specifying this parameter here will override the 120 \m[blue]\fBlog level\fR\m[] 121 parameter in the 122 smb\&.conf 123 file\&. 124 .RE 125 .PP 126 \-V|\-\-version 127 .RS 4 128 Prints the program version number\&. 129 .RE 130 .PP 131 \-s|\-\-configfile <configuration file> 132 .RS 4 133 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See 134 smb\&.conf 135 for more information\&. The default configuration file name is determined at compile time\&. 136 .RE 137 .PP 138 \-l|\-\-log\-basename=logdirectory 139 .RS 4 140 Base directory name for log/debug files\&. The extension 141 \fB"\&.progname"\fR 142 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&. 143 .RE 144 .PP 145 \-N|\-\-no\-pass 146 .RS 4 147 If specified, this parameter suppresses the normal password prompt from the client to the user\&. This is useful when accessing a service that does not require a password\&. 148 .sp 149 Unless a password is specified on the command line or this parameter is specified, the client will request a password\&. 150 .sp 151 If a password is specified on the command line and this option is also defined the password on the command line will be silently ingnored and no password will be used\&. 152 .RE 153 .PP 154 \-k|\-\-kerberos 155 .RS 4 156 Try to authenticate with kerberos\&. Only useful in an Active Directory environment\&. 157 .RE 158 .PP 159 \-C|\-\-use\-ccache 160 .RS 4 161 Try to use the credentials cached by winbind\&. 162 .RE 163 .PP 164 \-A|\-\-authentication\-file=filename 165 .RS 4 166 This option allows you to specify a file from which to read the username and password used in the connection\&. The format of the file is 167 .sp 168 .if n \{\ 169 .RS 4 170 .\} 171 .nf 172 username = <value> 173 password = <value> 174 domain = <value> 175 .fi 176 .if n \{\ 177 .RE 178 .\} 179 .sp 180 Make certain that the permissions on the file restrict access from unwanted users\&. 181 .RE 182 .PP 183 \-U|\-\-user=username[%password] 184 .RS 4 185 Sets the SMB username or username and password\&. 186 .sp 187 If %password is not specified, the user will be prompted\&. The client will first check the 188 \fBUSER\fR 189 environment variable, then the 190 \fBLOGNAME\fR 191 variable and if either exists, the string is uppercased\&. If these environmental variables are not found, the username 192 \fBGUEST\fR 193 is used\&. 194 .sp 195 A third option is to use a credentials file which contains the plaintext of the username and password\&. This option is mainly provided for scripts where the admin does not wish to pass the credentials on the command line or via environment variables\&. If this method is used, make certain that the permissions on the file restrict access from unwanted users\&. See the 196 \fI\-A\fR 197 for more details\&. 198 .sp 199 Be cautious about including passwords in scripts\&. Also, on many systems the command line of a running process may be seen via the 200 ps 201 command\&. To be safe always allow 202 rpcclient 203 to prompt for a password and type it in directly\&. 110 \-\-query\-security\-info FLAGS 111 .RS 4 112 The security\-info flags for queries\&. 113 .RE 114 .PP 115 \-\-set\-security\-info FLAGS 116 .RS 4 117 The security\-info flags for queries\&. 118 .RE 119 .PP 120 \-\-sddl 121 .RS 4 122 Output and input acls in sddl format\&. 123 .RE 124 .PP 125 \-\-domain\-sid SID 126 .RS 4 127 SID used for sddl processing\&. 204 128 .RE 205 129 .SH "ACL FORMAT" 206 130 .PP 207 The format of an ACL is one or more ACLentries separated by either commas or newlines\&. An ACL entry is one of the following:131 The format of an ACL is one or more entries separated by either commas or newlines\&. An ACL entry is one of the following: 208 132 .PP 209 133 .if n \{\ … … 225 149 The owner and group specify the owner and group sids for the object\&. If a SID in the format S\-1\-x\-y\-z is specified this is used, otherwise the name specified is resolved using the server on which the file or directory resides\&. 226 150 .PP 227 AC Ls specify permissions granted to the SID\&. ThisSID again can be specified in S\-1\-x\-y\-z format or as a name in which case it is resolved against the server on which the file or directory resides\&. The type, flags and mask values determine the type of access granted to the SID\&.228 .PP 229 The type can be either ALLOWED or DENIED to allow/deny access to the SID\&. The flags values are generally zero for file AC Ls and either 9 or 2 for directory ACLs\&. Some common flags are:151 ACEs are specified with an "ACL:" prefix, and define permissions granted to an SID\&. The SID again can be specified in S\-1\-x\-y\-z format or as a name in which case it is resolved against the server on which the file or directory resides\&. The type, flags and mask values determine the type of access granted to the SID\&. 152 .PP 153 The type can be either ALLOWED or DENIED to allow/deny access to the SID\&. The flags values are generally zero for file ACEs and either 9 or 2 for directory ACEs\&. Some common flags are: 230 154 .sp 231 155 .RS 4 … … 275 199 .RE 276 200 .PP 277 At present flags can only be specified as decimal or hexadecimal values\&.201 At present, flags can only be specified as decimal or hexadecimal values\&. 278 202 .PP 279 203 The mask is a value which expresses the access right granted to the SID\&. It can be given as a decimal or hexadecimal value, or by using one of the following text strings which map to the NT file permissions of the same name\&. … … 401 325 .SH "VERSION" 402 326 .PP 403 This man page is correct for version 3of the Samba suite\&.327 This man page is correct for version 4 of the Samba suite\&. 404 328 .SH "AUTHOR" 405 329 .PP
Note:
See TracChangeset
for help on using the changeset viewer.