VFS_FAKE_PERMS(1M) System Administration tools VFS_FAKE_PERMS(1M)NAMEvfs_fake_perms - enable read only Roaming Profiles
SYNOPSIS
vfs objects = fake_perms
DESCRIPTION
This VFS module is part of the samba(7) suite.
The vfs_fake_perms VFS module was created to allow Roaming Profile
files and directories to be set (on the Samba server under UNIX) as
read only. This module will, if installed on the Profiles share, report
to the client that the Profile files and directories are writeable.
This satisfies the client even though the files will never be
overwritten as the client logs out or shuts down.
This module is stackable.
EXAMPLES
[Profiles]
path = /profiles
vfs objects = fake_perms
VERSION
This man page is correct for version 3.0.25 of the Samba suite.
AUTHOR
The original Samba software and related utilities were created by
Andrew Tridgell. Samba is now developed by the Samba Team as an Open
Source project similar to the way the Linux kernel is developed.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
┌────────────────────┬─────────────────────────────────┐
│ ATTRIBUTE TYPE │ ATTRIBUTE VALUE │
├────────────────────┼─────────────────────────────────┤
│Availability │ SUNWsmbar, SUNWsmbac, SUNWsmbau │
├────────────────────┼─────────────────────────────────┤
│Interface Stability │ External │
└────────────────────┴─────────────────────────────────┘
NOTES
Source code for Samba is available in the SUNWsmbaS package.
Samba(7) delivers the set of four SMF(5) services as can be seen from
the following example:
$ svcs samba wins winbind swat
STATE STIME FMRI
disabled Apr_21 svc:/network/samba:default
disabled Apr_21 svc:/network/winbind:default
disabled Apr_21 svc:/network/wins:default
disabled Apr_21 svc:/network/swat:default
where the services are:
"samba"
runs the smbd daemon managing the CIFS sessions
"wins"
runs the nmbd daemon enabling the browsing (WINS)
"winbind"
runs the winbindd daemon making the domain idmap
"swat"
Samba Web Administration Tool is a service providing access to
browser-based Samba administration interface and on-line
documentation. The service runs on software loopback network
interface on port 901/tcp, i.e. opening "http://localhost:901/" in
browser will access the SWAT service on local machine.
Please note: SWAT uses HTTP Basic Authentication scheme where user name
and passwords are sent over the network in clear text. In the SWAT case
the user name is root. Transferring such sensitive data is advisable
only on the software loopback network interface or over secure
networks.
Samba 3.6 04/10/2012 VFS_FAKE_PERMS(1M)