HP CIFS Server 2.2i Administrator's Guide version A.01.11.01
Installing and Configuring the HP CIFS Server
Step 2: Running the Configuration Script
Chapter 230
• Workgroups do not utilized the centralized authentication of
domains. Samba_setup will require workgroups to choose either
server, share, or user-level security.
Since there are many important aspects of workgroup and domain
architecture too lengthy to be discussed here, you should consult
some of the many books or white papers available through the
world-wide web and book stores if you are not already familiar with
the subject.
3. Select your authentication security type.
Samba supports four types of security: Domain-level security,
Server-level security, User-level security, and Share-level security.
You must select one of these security types for your server prior to
running the configuration script.
• Domain-level security: When this type of security is used, Samba
responds as a member of a Windows domain and checks the
password against the information contained in the Windows NT
domain controller.
• Server-level security: When this security type is specified,
password authentication is handled by another SMB password
server. When a client attempts to access a specific share, Samba
checks that the user is authorized to access the share. Samba
then validates the password via the SMB password server.
• User-level security: When this security type is specified, each
share is assigned specific users. When a request is made for
access, Samba checks the user’s user name and password against
a local list of authorized users and only gives access if a match is
made.
• Share-level security: When this security type is specified, each
share (directory) has at least one password associated with it.
Anyone with a password will be able to access the share. There
are no other access restrictions.
You might use multiple passwords when you want different users
to have different types of access (read-only, read-write, etc).
These security types are described in detail in “Chapter 6, Users,
Security, and Domains” of Using Samba by Eckstein, Collier-Brown
and Kelly.