2013年9月5日 星期四

samba conf sample

   workgroup = KIDO
   password server = ad.kido.idv.tw
   realm = KIDO.IDV.TW
   security = ads
   idmap uid = 16777216-33554431
   idmap gid = 16777216-33554431
   template shell = /bin/bash
   template homedir = /home/%U
   winbind use default domain = true
   winbind offline logon = false

#--authconfig--end-line--
;        workgroup     = ntc
        netbios name  = sambalab
        server string = This is samba server

        unix charset    = utf8
        display charset = utf8
        dos charset     = cp950
        log file = /var/log/samba/log.%m
        max log size = 50
;        security = share
        load printers   = no

[temp]
        comment    = Temporary file space
        path       = /tmp
        writable   = yes
        browseable = yes
#        valid users = %S
admin users = @"ntc\\domain users"

[kido]
        comment = Kido
        writeable = yes
        path = /home/u70604
create mask = 0770
admin users = @"ntc+domain admins"
guest ok = no

[homes]
   comment = Home Direcotries
   valid users = %S
   read only = No
   browseable = No
   path = /home/%S
   create mask = 700
   directory mask = 700
   root preexec = /usr/local/sbin/mkhomedir.sh %U %D
   inherit permissions = Yes

system-auth
auth        required      pam_env.so
auth        sufficient    pam_fprintd.so
auth        sufficient    pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 500 quiet
auth        sufficient    pam_krb5.so use_first_pass
auth        required      pam_deny.so

account     required      pam_unix.so broken_shadow
account     sufficient    pam_localuser.so
account     sufficient    pam_succeed_if.so uid < 500 quiet
account     [default=bad success=ok user_unknown=ignore] pam_krb5.so
account     required      pam_permit.so

password    requisite     pam_cracklib.so try_first_pass retry=3 type=
password    sufficient    pam_unix.so md5 shadow nullok try_first_pass use_authtok
password    sufficient    pam_krb5.so use_authtok
password    required      pam_deny.so

session     optional      pam_keyinit.so revoke
session     required      pam_limits.so
session     [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session     required      pam_unix.so
session     optional      pam_krb5.so


password-auth
auth        required      pam_env.so
auth        sufficient    pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 500 quiet
auth        sufficient    pam_krb5.so use_first_pass
auth        required      pam_deny.so

account     required      pam_unix.so broken_shadow
account     sufficient    pam_localuser.so
account     sufficient    pam_succeed_if.so uid < 500 quiet
account     [default=bad success=ok user_unknown=ignore] pam_krb5.so
account     required      pam_permit.so

password    requisite     pam_cracklib.so try_first_pass retry=3 type=
password    sufficient    pam_unix.so md5 shadow nullok try_first_pass use_authtok
password    sufficient    pam_krb5.so use_authtok
password    required      pam_deny.so

session     optional      pam_keyinit.so revoke
session     required      pam_limits.so
session     [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session     required      pam_unix.so
session     optional      pam_krb5.so

沒有留言: