Changeset 989 for vendor/current/docs-xml
- Timestamp:
- Nov 25, 2016, 8:04:54 PM (9 years ago)
- Location:
- vendor/current/docs-xml
- Files:
-
- 5 edited
Legend:
- Unmodified
- Added
- Removed
-
vendor/current/docs-xml/manpages/vfs_acl_tdb.8.xml
r988 r989 41 41 </para> 42 42 43 <para> 44 This module forces the following parameters: 45 <itemizedlist> 46 <listitem><para>inherit acls = true</para></listitem> 47 <listitem><para>dos filemode = true</para></listitem> 48 <listitem><para>force unknown acl user = true</para></listitem> 49 </itemizedlist> 50 </para> 51 43 52 <para>This module is stackable.</para> 44 53 </refsect1> … … 62 71 better NT ACL compatibility. 63 72 </para> 73 74 <para> 75 If <emphasis>acl_tdb:ignore system acls</emphasis> 76 is set to <emphasis>yes</emphasis>, the following 77 additional settings will be enforced: 78 <itemizedlist> 79 <listitem><para>create mask = 0666</para></listitem> 80 <listitem><para>directory mask = 0777</para></listitem> 81 <listitem><para>map archive = no</para></listitem> 82 <listitem><para>map hidden = no</para></listitem> 83 <listitem><para>map readonly = no</para></listitem> 84 <listitem><para>map system = no</para></listitem> 85 <listitem><para>store dos attributes = yes</para></listitem> 86 </itemizedlist> 87 </para> 88 </listitem> 89 </varlistentry> 90 91 <varlistentry> 92 <term>acl_tdb:default acl style = [posix|windows]</term> 93 <listitem> 94 <para> 95 This parameter determines the type of ACL that is synthesized in 96 case a file or directory lacks an 97 <emphasis>security.NTACL</emphasis> xattr. 98 </para> 99 <para> 100 When set to <emphasis>posix</emphasis>, an ACL will be 101 synthesized based on the POSIX mode permissions for user, group 102 and others, with an additional ACE for <emphasis>NT 103 Authority\SYSTEM</emphasis> will full rights. 104 </para> 105 <para> 106 When set to <emphasis>windows</emphasis>, an ACL is synthesized 107 the same way Windows does it, only including permissions for the 108 owner and <emphasis>NT Authority\SYSTEM</emphasis>. 109 </para> 110 <para> 111 The default for this option is <emphasis>posix</emphasis>. 112 </para> 64 113 </listitem> 65 114 </varlistentry> -
vendor/current/docs-xml/manpages/vfs_acl_xattr.8.xml
r988 r989 45 45 </para> 46 46 47 <para> 48 This module forces the following parameters: 49 <itemizedlist> 50 <listitem><para>inherit acls = true</para></listitem> 51 <listitem><para>dos filemode = true</para></listitem> 52 <listitem><para>force unknown acl user = true</para></listitem> 53 </itemizedlist> 54 </para> 55 47 56 <para>This module is stackable.</para> 48 57 </refsect1> … … 66 75 better NT ACL compatibility. 67 76 </para> 77 78 <para> 79 If <emphasis>acl_xattr:ignore system acls</emphasis> 80 is set to <emphasis>yes</emphasis>, the following 81 additional settings will be enforced: 82 <itemizedlist> 83 <listitem><para>create mask = 0666</para></listitem> 84 <listitem><para>directory mask = 0777</para></listitem> 85 <listitem><para>map archive = no</para></listitem> 86 <listitem><para>map hidden = no</para></listitem> 87 <listitem><para>map readonly = no</para></listitem> 88 <listitem><para>map system = no</para></listitem> 89 <listitem><para>store dos attributes = yes</para></listitem> 90 </itemizedlist> 91 </para> 92 </listitem> 93 </varlistentry> 94 95 <varlistentry> 96 <term>acl_xattr:default acl style = [posix|windows]</term> 97 <listitem> 98 <para> 99 This parameter determines the type of ACL that is synthesized in 100 case a file or directory lacks an 101 <emphasis>security.NTACL</emphasis> xattr. 102 </para> 103 <para> 104 When set to <emphasis>posix</emphasis>, an ACL will be 105 synthesized based on the POSIX mode permissions for user, group 106 and others, with an additional ACE for <emphasis>NT 107 Authority\SYSTEM</emphasis> will full rights. 108 </para> 109 <para> 110 When set to <emphasis>windows</emphasis>, an ACL is synthesized 111 the same way Windows does it, only including permissions for the 112 owner and <emphasis>NT Authority\SYSTEM</emphasis>. 113 </para> 114 <para> 115 The default for this option is <emphasis>posix</emphasis>. 116 </para> 68 117 </listitem> 69 118 </varlistentry> -
vendor/current/docs-xml/manpages/vfs_fruit.8.xml
r988 r989 227 227 </varlistentry> 228 228 229 <varlistentry> 230 <term>fruit:posix_rename = yes | no</term> 231 <listitem> 232 <para>Whether to enable POSIX directory rename behaviour 233 for OS X clients. Without this, directories can't be 234 renamed if any client has any file inside it 235 (recursive!) open.</para> 236 <para>The default is <emphasis>yes</emphasis>.</para> 237 </listitem> 238 </varlistentry> 239 229 240 </variablelist> 230 241 </refsect1> -
vendor/current/docs-xml/smbdotconf/ldap/ldapssl.xml
r988 r989 15 15 <para>LDAP connections should be secured where possible. This may be 16 16 done setting <emphasis>either</emphasis> this parameter to 17 <parameter moreinfo="none"> Start_tls</parameter>17 <parameter moreinfo="none">start tls</parameter> 18 18 <emphasis>or</emphasis> by specifying <parameter moreinfo="none">ldaps://</parameter> in 19 19 the URL argument of <smbconfoption name="passdb backend"/>.</para> … … 37 37 methods. To enable the LDAPv3 StartTLS extended operation (RFC2830) for 38 38 <emphasis>ads</emphasis>, set 39 <smbconfoption name="ldap ssl"> yes</smbconfoption>39 <smbconfoption name="ldap ssl">start tls</smbconfoption> 40 40 <emphasis>and</emphasis> 41 41 <smbconfoption name="ldap ssl ads">yes</smbconfoption>. -
vendor/current/docs-xml/smbdotconf/protocol/dcerpcendpointservers.xml
r988 r989 7 7 </description> 8 8 9 <value type="default">epmapper, wkssvc, rpcecho, samr, netlogon, lsarpc, spoolss,drsuapi, dssetup, unixinfo, browser, eventlog6, backupkey, dnsserver</value>9 <value type="default">epmapper, wkssvc, rpcecho, samr, netlogon, lsarpc, drsuapi, dssetup, unixinfo, browser, eventlog6, backupkey, dnsserver</value> 10 10 <value type="example">rpcecho</value> 11 11 </samba:parameter>
Note:
See TracChangeset
for help on using the changeset viewer.