HP CIFS Server Administrator Guide Version A.03.01.03 (5900-2006, October 2011)
Table Of Contents
- HP CIFS Server Administrator Guide Version A.03.01.03
- Contents
- About this document
- 1 Introduction to the HP CIFS Server
- 2 Installing and configuring HP CIFS Server
- HP CIFS Server requirements and limitations
- Step 1: Installing HP CIFS Server software
- Step 2: Running the configuration script
- Step 3: Modify the configuration
- Step 4: Starting HP CIFS Server
- Other Samba configuration issues
- 3 Managing HP-UX file access permissions from Windows NT/XP/2000/Vista/Windows 7
- Introduction
- UNIX file permissions and POSIX ACLs
- Using the Windows NT Explorer GUI to create ACLs
- Using the Windows Vista Explorer GUI to create ACLs
- POSIX ACLs and Windows 2000, Windows XP, Windows Vista, and Windows 7 clients
- HP CIFS Server Directory ACLs and Windows 2000, Windows XP, Windows Vista, and Windows 7 clients
- In conclusion
- 4 Windows style domains
- Introduction
- Configure HP CIFS Server as a PDC
- Configure HP CIFS Server as a BDC
- Domain member server
- Create the Machine Trust Accounts
- Configure domain users
- Join a Windows client to a Samba domain
- Roaming profiles
- Configuring user logon scripts
- Home drive mapping support
- Trust relationships
- 5 Windows 2003 and Windows 2008 domains
- 6 LDAP integration support
- Overview
- Network environments
- Summary of installing and configuring
- Installing and configuring your Directory Server
- Installing LDAP-UX Client Services on an HP CIFS Server
- Configuring the LDAP-UX Client Services
- Enabling Secure Sockets Layer (SSL)
- Extending the Samba subschema into your Directory Server
- Migrating your data to the Directory Server
- Configuring the HP CIFS Server
- Creating Samba users in directory
- Management tools
- 7 Winbind support
- 8 Kerberos support
- 9 HP CIFS deployment models
- Introduction
- Samba Domain Model
- Windows Domain Model
- Unified Domain Model
- 10 Securing HP CIFS Server
- 11 Configuring HA HP CIFS
- 12 HP-UX configuration for HP CIFS
- 13 Tool reference
- Glossary
- Index
-I, –WINS-by-ip <ip> This option queries winbindd to send a node status request
to get the NetBIOS name associated with the IP address
specified by the ip parameter.
-n, –name-to-sid <name> This option queries winbindd for Windows SID associated
with the name specified.
-s, –sid-to-name <sid> Uses this option to resolve a Windows SID to a name. This
is the inverse of the -n option. The Windows SID must be
specified as ASCII strings in the traditional Microsoft format.
For example,
S-1-5-21-1455342024-3071081365-2475485837-500.
-U, –uid-to-sid <uid> Converts an UNIX user UID to a Windows SID. If the UID
specified does not refer to the one within the idmap uid
range then the operation will fail.
-G <gid> Converts an UNIX GID to a Windows SID. If the GID
specified does not refer to the one within the idmap gid
range then the operation will fail.
-S, –sid-to-uid <sid> Converts a Windows SID to an UNIX user id. If the Windows
SID does not correspond to an UNIX user mapped by
winbindd then the operation will fail.
-Y, –sid-to-gid <sid> Converts a Windows SID to an UNIX group id. If the
windows SID does not correspond to an UNIX group
mapped by winbindd then the operation will fail.
-A, –allocate-rid Gets a new RID from idmap.
-t, –check-secret Verifies that the workstation trust account created when the
Samba server is added to the Windows NT domain is
working.
-p, –ping Ping winbindd to see whether it is still alive.
–domain <name> This parameter sets the domain on which any specified
operations will performed. Currently only the --sequence,
-u, and -g options honor this parameter
-D, –domain-info <domain> Shows most of the information we have about the domain.
-r, –user-groups <username> Gets the list of UNIX group ids that a specific user belongs
to. This only works for users defined on a Domain Controller.
–user-domgroups <SID> Gets user domain groups.
–user-sids <SID> Gets user group SIDs for user.
-V, –version Prints the winbind version.
-a, –authenticate
<username%password>
Authenticates a user via winbindd. This checks both
authentication methods and reports its results.
–set-auth-user
<username%password>
Stores username and password used by winbindd during
session setup to a domain controller. This option is only
available for root.
–get-auth-user Prints username and password used by winbindd during
session setup to a domain controller. This option is only
available for root.
–getdcname <domainname> Gets the name of the Domain Controller for the specified
domain.
–sequence Shows sequence numbers of all known domains.
-?, -h, –help Shows the help messages.
HP CIFS management tools 167