Using NFS v4 ACLs with Samba in a multiprotocol environment
|
|
|
- Ethan Page
- 9 years ago
- Views:
Transcription
1 Using NFS v4 ACLs with Samba in a multiprotocol environment Alexander Werth IBM 2009 IBM Corporation
2 Using NFS v4 ACLs with Samba in a multiprotocol environment Use multiple protocols with different authorization models to access the data. SMB (via Samba) NFS v4 NFS v3 FTP, SCP Using NFS v4 ACLs to store the authorization information. Use NFS v4 ACLs to authorize access. What works well what doesn't? NFS v4 SMB NFS v4 Filesystem NFS v4 ACL Magic NFS v3 FTP, IBM Corporation
3 NTFS ACL Default dialog to view the list of access permissions for individuals or groups ACL: Access control list ACE: Access control list entries SD: Security descriptor Type can be allow or deny Permission column contains a summary more on the next slide Inheritance to subfolders displayed in InheritedFrom, Apply To column IBM Corporation
4 NTFS ACL Permissions Traverse folder / execute file List folder / read data Read attributes Read extended attributes Create files / write data Create folders / append data Write attributes Write extended attributes Delete subfolders and files Delete Read permissions Change permissions Take ownership Fine grained control over individual permissions Some have a different meaning for files and folders Ability to select inheritance Checkbox Apply these permissions to objects... within this container only IBM Corporation
5 NFS v4 ACL A list of the following permissions for individual users LIST_DIRECTORY / READ_DATA (share the same bit) ADD_FILE / WRITE_DATA (share the same bit) ADD_SUBDIRECTORY / APPEND_DATA (share the same bit) READ_NAMED_ATTRS WRITE_NAMED_ATTRS EXECUTE DELETE_CHILD READ_ATTRIBUTES WRITE_ATTRIBUTES WRITE_RETENTION (new in NFS v4.1) WRITE_RETENTION_HOLD (new in NFS v4.1) DELETE READ_ACL WRITE_ACL WRITE_OWNER SYNCHRONIZE (optional) Source: RFC 5661, Network File System (NFS) Version 4 Minor Version 1 Protocol IBM Corporation
6 Trivial NFSv4 ACL to NTFS ACL permission mapping Designed to fit the same features as NTFS ACLs have into a unix environment LIST_DIRECTORY / READ_DATA - List folder / read data ADD_FILE / WRITE_DATA - Create files / write data ADD_SUBDIR. / APPEND_DATA - Create folders / append data READ_NAMED_ATTRS - Read extended attributes WRITE_NAMED_ATTRS - Write extended attributes EXECUTE - Traverse folder / execute file DELETE_CHILD - Delete subfolders and files READ_ATTRIBUTES - Read attributes WRITE_ATTRIBUTES - Write attributes WRITE_RETENTION WRITE_RETENTION_HOLD DELETE - Delete READ_ACL - Read permissions WRITE_ACL - Change permissions WRITE_OWNER - Take ownership SYNCHRONIZE IBM Corporation
7 Obvious mapping problem 1 WRITE_RETENTION WRITE_RETENTION_HOLD optional for NFS v4.1 permission to modify retention may also be controlled by write attribute Map a set write attribute to also have the write retention permission set We can't represent a case where this bit is set differently from write attribute. If someone uses the windows dialog to modify the ACL they will lose these bits. SYNCHRONIZE A similar permission is actually definied for the NTFS ACE but not exposed. Description indicates it can be used to toggle a particular server behavior. Just map to the corresponding non exposed NTFS permission. Right now that bit doesn't work due to some ZFS issue. Move that to ZFS code IBM Corporation
8 Non obvious mapping problem 1 READ_ATTRIBUTES - Read attributes Same permission name but a sightly different semantic NFS v4: Stat call is allowed and NFS v4.1 attributes can be read Windows: Dos attributes (hidden, archive, etc) and timestamps can be read. On windows the read attribute permission is not required to figure out if a file is really a file or a directory. In windows someone with the List folder permission on the current folder can learn if something in that folder is a file or directory. Useability vs. Security If someone doesn't set this permission on NFS v4. Does he really want to hide if something is a file or a directory? Different users might expect different things IBM Corporation
9 Non obvious mapping problem 2 WRITE_ATTRIBUTES - Write attributes On NFSv4 write attribute implies the modification and creation time of a file can be changed. On window this permission doesn't allow to change these timestamps. Also only NFS v4.1 specifies that this permission also extends to a hidden and system attribute of files IBM Corporation
10 NFS v4 recommends to deny setting of useless ACLs The NFS v4 spec notes that some permission combinations might be hard to implement. For example the distinction between append and write. NFS v4 recommends that a set ACL call with these invalid permission combinations get's denied. In windows arbitrary and even invalid data can be stored in an ACL. Windows doesn't expect that it can't store all combinations. Unexpected problems when migrating data with invalid permission combinations. Instead of a partial failure or limitation the entire ACL gets rejected. But the windows GUI places restrictions on the ACLs that can be created and viewed. Getting these possible ACLs to work is a reasonable goal IBM Corporation
11 Default permission NFS v4.1 and NTFS explicitely states that a permission that allowed or denied for a user with an ACL entry is denied by default. The NFS v4 spec states that it's up to the implementation if a particular permission is denied or allowed by default. There is no good way to convert an ACL with some permissions enabled by default into a NTFS ACL with the same expected behavior. Adding an entry that allows particular permissions at the end of the NTFS ACL fails because the windows UI places restrictions on the order of ACLs IBM Corporation
12 Permission implementation 1 Samba performs it's own checks checks on operations based on the SD. That's very important for non NFS v4 filesystems with a very different authorization scheme. Even for NFS v4 filesystems the Samba checks are useful because Samba has to map operations to system calls and there frequently isn't a system call with exactly the same semantic required by a compareable Windows call. Checking the permissions in Samba requires to read the permissions even if the user doesn't have the Read permissions permission. Read permissions only controls when permissions can be returned and not when they are evaluated. Samba will have to read the permissions for internal use regardless of the corresponding permission bit. become_root() for reading the permissions will be required. A similar construct might be required around other calls IBM Corporation
13 Permission implementation 2 Windows allows to open a file without the read, write or execute permission. For example to read the permissions of a file. The posix open call requires at least one of these to be specified at open. Right now the NFS v4 read permission is required for pretty much everything. Using become_root() around open() is a security nightmare IBM Corporation
14 Read data and read permissions is almost always required ACL permission behavior Traverse folder / execute file [6] List folder / read data Read attribute s Read extende d attribute s [7] Create files / write data Create folders / append data Write attribute s Write extende d attribute s Delete subfolde r and files Delete Read permissi ons Write permissi ons Take ownershi p Operation Execute file X X X List folder X F Read data from file X X X X Read attributes X Create file P Create folder P Write data to file X X X X X X X Write file/folder attributes X X X Delete or rename file/folder X,P X P P or X X,P Read file/folder permissions X X Write file/folder permissions X X X Take file/folder ownership X X X IBM Corporation
15 Requirements What criteria can we use to determine what's right and what not? Perfect ACL compatibility within one protocol Using just SMB the behavior should match a windows server Using just NFS v4 the behavior should match the NFS v4 spec Using just NFS v3 the behavior should match a typical NFS v3 server Intuitive and secure mixed protocol access Common operations should have the same meaning on all protocols. People should have access to approximately the same operations. Support for specific common legacy features Performance should be acceptable IBM Corporation
16 Requirements Breakdown Using just SMB the behavior should match a windows server All SDs generated by the windows advanced ACL editor can be stored. All permission bits can be stored individually All parts of a SD that are evaluated by a windows server can be stored. All SDs that can be stored through windows API calls can be stored and reproduced. The effect of each permission is identical to the behavior of windows. Using just NFS v4 the behavior should match the NFS v4 spec Trivial if the underlying filesystem is NFS v4. Using just NFS v3 the behavior should match a typical NFS v3 server The NFS v4.1 spec already addresses how NFS v4 options are mapped to Nfs v3. Other protocols like FTP typically don't specify how to interact with ACLs IBM Corporation
17 Applying these criteria to permissions How good is a trivial mapping of NTFS permissions to NFS v4 permissions? Using just SMB the behavior should match a windows server All NTFS permissions can be stored individually The filesystem might reject some combinations. They should avoid that. All SDs generated by the windows advanced ACL editor can be stored. All parts of a SD that are evaluated by a windows server can be stored. We can't store arbitrary data in the ACL. We could store the arbitrary data in an xattr since it's not relevant for NFS v4. The effect of each permission is identical to the behavior of windows. Read permissions, Read data,... Intuitive and secure mixed protocol access All permissions in NTFS have a counterpart in NFS v4. But due to the implementation of the permissions it doesn't work well. Support for specific common legacy features Performance should be acceptable IBM Corporation
18 More than permissions in the ACL A NTFS ACL for permissions is also called DACL This stands for Discretionary Access Control List An ACE in a DACL consists of: The permissions. A type that describes if the ACE denies or allows operations. Information about inheritance. SID of the user or group the ACE applies to. A NFS v4 ACE consists of The permissions. A type that can describe if the ACE denies or allows operations. Information about inheritance. A UID/GID or special entry that describes to whom the ACE applies to IBM Corporation
19 Inheritance information in ACEs The following inheritance related information is stored on each ACE of a DACL If this ACE inherits down to and applies to subfolders. If this ACE inherits down to subfolders and files and applies to files. If this ACE applies only after it has been inherited at least once. If this ACE is inherited just once. If this ACE has been inherited at all. There is a 1:1 mapping to similar behaving NFS v4 flags for each which is great. In both windows and NFS the ACLs are static ACLs. That means the ACLs are created at file creation and just the ACLs of the current file or folder have to be considered when evaluating the ACLs. If the inheritance information is adjusted through windows it is automatically applied to each subdirectory by the windows client IBM Corporation
20 Order of ACEs in ACLs The windows client automatically orders the ACEs of each ACL in the following way: Deny ACEs that are new at the current file or folder. Allow ACEs that are new at the current file or folder. ACEs inherited from the parent folder in the order there. Because of that the order in which ACEs are added or removed doesn't matter. NFS v4 doesn't place a restriction on the order of the ACEs in an ACL. People creating NFS v4 ACLs are unlikely to manually create the right order. Using only allow ACEs works fine and should be recommended. If an ACL is in the wrong order windows will already complain and suggests to reorder the ACL when the ACL is viewed and not just when it is edited IBM Corporation
21 Acting on GIDs and UIDs instead of SIDs The NTFS ACE contains a SID of the user or group the ACL applies to. The SIDs of the ACE are compared to the SIDs of the security token obtained when the connection is established. The NFS v4 ACE contains either a UID or a GID or a special ID At the time a NTFS ACL is created a mapping from SID to UID/GID must exist. Typically this mapping is part of a LDAP directory or AD with SFU. But such a mapping might still not be available when an ACL is created: SID to UID/GID mapping has not been distributed through forest of domains. The SID is a buildin SID and isn't stored in the AD. The SID is not part of the AD. Typically this implies that the SID can't be used to authenticate with the file server and as such is irrelevant for authentication. But not for backups IBM Corporation
22 Creator Owner The NTFS ACE can contain SIDs that belong to creator owner or creator group. These ACEs must be inherited. These ACEs can't apply to the current folder. On folder creation the server splits these ACEs: One part is the original inheriting creator owner or creator group ACE. This is still inheriting and doesn't apply to the current folder. A non inheriting ACE for the file creator that applies to the current file. On file creation the server just creates a ACE for the user creating a file. When trying to create a creator owner entry that applies to the current folder the windows GUI splits the entry in a way similar to the one described above. The creator group entries apply to the primary group of the file creator. This behavior of a creator owner entry is very similar to the NFS v4 special owner@ and group@ entries with the InheritOnly flag set. The NFS v4 filesystem doesn't split the ACE on file creation. But the inherited special owner@ ACE behaves similar to both of the split NTFS ACEs. So it's sufficient to split these only when displaying the NFS v4 ACL through SMB IBM Corporation
23 Mode bits rwxrwxrwx The NFS v4 spec recommends that the mode bit's are calculated based on the NFS v4 special IDs and that apply to the current file. The mode bits for Everyone are easy to explain. The InheritOnly and special IDs are already used for creator owner. This implies that for files created without SMB the mode bits will be determined by the creator owner and creator group NTFS ACEs. In particular the mode bits will match the permissions of the non inheriting ACL entries of the file owner. Consistency suggests to always store the non inheriting ACEs of the file owner as NFS v4 special IDs. Mode bits of the owner and group match the permissions of the non inheriting ACEs for the file owner and group. Inherited mode bits can be controlled through creator owner and creator group IBM Corporation
24 NFS v3 and mode bits rwxrwxrwx How does NFS v3 handle ACLs? NFS v3 implements an access call asking the file server if a user has access to a particular file. The file server can return success or access denied. The actual ACL implementation is transparent to NFS v3. But: Some NFS v3 clients take the answer and most of it away. With the exception of the mode bits. So mode bits are important for NFS v3 access to files with NFS v4 ACLs IBM Corporation
25 More than the ACL in the SD A windows Security Descriptor consists of more that just the DACL: The DACL A SACL (System ACL that contains audit and alarm entries) A SID indicating the file owner A SID indicating the file owning group Control access bit flags IBM Corporation
26 SACL and DACL in SD vs audit ACLs A windows SD can contain two ACLs, each with different ACE types: DACL can contain allow and deny ACEs. SACL can contain audit and alarm ACEs. A NFS v4 ACL can contain four ACE types: Allow, Deny, Audit, and Alarm ACEs Storing the SACL and DACL in the same NFS v4 ACL and splitting it up again when reading the ACL seems to work. A minor issue would be that one couldn't distinguish between an empty SACL and no SACL at all. Windows allows SACLs with size 0. But that doesn't result in a functional distinction. And windows uses operations that will only update the DACL and not the SACL. To emulate this with NFS v4 ACLs one has to read the NFS v4 ACL to check if it contains any SACL entries that need to be preserved and write back the updated NFS v4 ACL. This is slower than just writing the ACL. Acting on the SACL or the NFSv4 audit and alarm entries is a different matter IBM Corporation
27 SACL and DACL in SD vs audit ACLs A windows SD can contain two ACLs, each with different ACE types: DACL can contain allow and deny ACEs. SACL can contain audit and alarm ACEs. A NFS v4 ACL can contain four ACE types: Allow, Deny, Audit, and Alarm ACEs Storing the SACL and DACL in the same NFS v4 ACL and splitting it up again when reading the ACL seems to work. A minor issue would be that one couldn't distinguish between an empty SACL and no SACL at all. Windows allows SACLs with size 0. But that doesn't result in a functional distinction. And windows uses operations that will only update the DACL and not the SACL. To emulate this with NFS v4 ACLs one has to read the NFS v4 ACL to check if it contains any SACL entries that need to be preserved and write back the updated NFS v4 ACL. This is slower than just writing the ACL. Acting on the SACL or the NFSv4 audit and alarm entries is a different matter IBM Corporation
28 Owner and owning group SID in SD The windows SD contains fields for A SID indicating the file owner A SID indicating the file owning group Only one of these fields will be filled when the windows dialogs are used. There is no corresponding field in a NFS v4 ACL but there is a file owner and file group in unix filesystems. Standard Samba 4.0 mechanism to map these fields to the file owner and file group. Use trick to map each ID only once for UID and GID and then store this ID in both UID and GID fields. Otherwise we don't know if the user or group mapping to SIDs should be used IBM Corporation
29 Control access bit flags Also known as ACL flags These contain information about how inheritance is to be computed. Most information seems to be redundant. Probably used for sensible recovery from errors in the ACL inheritance. No similar data available in the NFS v4 spec. It's up to the filesystem to store this data or use a xattr IBM Corporation
30 DACL Protected The DACL Protected bit in the Control access bit flags is actually useful: Without this bit set windows applies a heuristic to determine if an ACE is inherited from the parent folder. If all inheriting ACEs from the parent folder show up in the ACL of the current folder windows assumes the ACL has been generated through inheritance and checks the ACL entries inherited from parent checkbox in it's ACL dialog. That's even when the ACEs don't have the inherited bit set. Breaking inheritance by unchecking the box and copying all entries doesn't work. If the DACL Protected bit is set the box ACLs inherited from parent is unchecked IBM Corporation
31 Summary Permission map very well between NFS v4 and NTFS ACLs. But not everything can be mapped perfectly between NFS v4 and NTFS ACLs. Enough can be mapped to have a useful and sensible multiprotocol behavior. More improvements are possible IBM Corporation
32 Thanks for listening Questions? IBM Corporation
Permissions Mapping in the Isilon OneFS File System
Permissions Mapping in the Isilon OneFS File System NTFS ACLs, NFSv4 ACLs, and POSIX Mode Bits Steven Danneman and Zack Kirsch Agenda What is OneFS? POSIX, NTFS and NFSv4 Permission Overview Isilon s Permission
SGI NAS. CIFS User Guide Release 3.1.x 007-5949-001
SGI NAS CIFS User Guide Release 3.1.x 007-5949-001 Copyright 2013 SGI. All rights reserved; provided portions may be copyright in third parties, as indicated elsewhere herein. No permission is granted
Implementing an advanced access control model on Linux
Implementing an advanced access control model on Linux Aneesh Kumar K.V IBM Linux Technology Center [email protected] Andreas Grünbacher SUSE Labs, Novell [email protected] Greg Banks [email protected]
EMC ISILON MULTIPROTOCOL DATA ACCESS WITH A UNIFIED SECURITY MODEL
White Paper EMC ISILON MULTIPROTOCOL DATA ACCESS WITH A UNIFIED SECURITY MODEL Abstract This paper explains how the unified security model of EMC Isilon OneFS 6.5.5 resolves mismatches between the permissions
WHITE PAPER. Understanding Windows & UNIX File Permissions on GuardianOS
WHITE PAPER Understanding Windows & UNIX File Permissions on GuardianOS Introduction Overland Storage Snap Server storage systems powered by the GuardianOS operating system support many file access protocols
Distributed File Systems. Chapter 10
Distributed File Systems Chapter 10 Distributed File System a) A distributed file system is a file system that resides on different machines, but offers an integrated view of data stored on remote disks.
Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger. www.cse.psu.edu/~tjaeger/cse497b-s07/
Windows Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ Windows Security 0 to full speed No protection system in early versions
CIS 551 / TCOM 401 Computer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 3 1/18/07 CIS/TCOM 551 1 Announcements Email project groups to Jeff (vaughan2 AT seas.upenn.edu) by Jan. 25 Start your projects early!
This section discusses the protocols available for volumes on Nasuni Filers.
Nasuni Corporation Natick, MA Introduction The Nasuni Filer provides efficient and convenient global access to your data. Nasuni s patented file system, UniFS, combines the performance and consistency
Objectives. At the end of this chapter students should be able to:
NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE
White Paper USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE CONTENTS Executive Summary 1 Introduction 1 Audience 2 Terminology 2 Windows Concepts
SHARING FILE SYSTEM RESOURCES
1 Chapter 9 SHARING FILE SYSTEM RESOURCES Chapter 9: SHARING FILE SYSTEM RESOURCES 2 CHAPTER OVERVIEW Create and manage file system shares and work with share permissions Use NTFS file system permissions
CIS 551 / TCOM 401 Computer and Network Security. Spring 2005 Lecture 4
CIS 551 / TCOM 401 Computer and Network Security Spring 2005 Lecture 4 Access Control: The Big Picture Objects - resources being protected E.g. files, devices, etc. Subjects - active entities E.g. processes,
Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1
Migrating Your Windows File Server to a CTERA Cloud Gateway Cloud Attached Storage February 2015 Version 4.1 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document may be
CSE331: Introduction to Networks and Security. Lecture 34 Fall 2006
CSE331: Introduction to Networks and Security Lecture 34 Fall 2006 Announcements Problem with Crypto.java Look for a new Crypto.java file later today Project 4 is due Dec. 8th at midnight. Homework 3 is
ChangeAuditor 5.6. For Windows File Servers Event Reference Guide
ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
Integrating Lustre with User Security Administration. LAD 15 // Chris Gouge // 2015 Sep
Integrating Lustre with User Security Administration LAD 15 // Chris Gouge // 2015 Sep Topics User Security in Linux POSIX Permissions The Requirement for Upcall in Lustre Upcall Utilities Overview Upcall
9 Administering Shared Folders
9 Administering Shared Folders Exam Objectives in this Chapter: Manage and troubleshoot access to shared folders. Create and remove shared folders. Why This Chapter Matters Control access to shared folders
Smooth migration or how to preserve access rights during a win2000 migration? M. Köhler. -MPY- WNT Projektgruppe 20/04/2001 1
Smooth migration or how to preserve access rights during a win2000 migration? M. Köhler -MPY- WNT Projektgruppe 20/04/2001 1 Goals and situation at Microsoft s scenario Smooth migration scenario Cloning
FreeIPA 3.3 Trust features
FreeIPA 3.3 features Sumit Bose, Alexander Bokovoy March 2014 FreeIPA and Active Directory FreeIPA and Active Directory both provide identity management solutions on top of the Kerberos infrastructure
CSE543 - Introduction to Computer and Network Security. Module: Reference Monitor
CSE543 - Introduction to Computer and Network Security Module: Reference Monitor Professor Trent Jaeger 1 Living with Vulnerabilities So, software is potentially vulnerable In a variety of ways So, how
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA
Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA Alexander Bokovoy May 21th, 2015 Samba Team / Red Hat 0 A crisis of identity (solved?) FreeIPA What is
SHAREENUM: WE WRAPPED SAMBA SO YOU DON T HAVE TO
SHAREENUM: WE WRAPPED SAMBA SO YOU DON T HAVE TO Lucas Morris Michael McAtee @lucasjmorris @michael.mcatee About Us Lucas Morris Manager at Crowe Horwath LLP Manager, Pentester, Code Monkey Michael McAtee
Combining Shared Folder and NTFS Permissions
Combining Shared Folder and When you combine NTFS permissions and share permissions the most restrictive effective permission applies. For example, if you share a folder and assign the share permission
The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones
The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 5: Active Directory Auditing... 63 Goals of Native Auditing... 63 Native Auditing
ACE Names and UID/GID/SIDs
ACE Names and UID/GID/SIDs Mapping NFSv4 ACE Names to Internal Identifiers Or How to Deal with Users and Groups From Muitple Domains on POSIX and Multi-Protocol File Servers and Clients [email protected]
FTP Service Reference
IceWarp Server FTP Service Reference Version 10 Printed on 12 August, 2009 i Contents FTP Service 1 V10 New Features... 2 FTP Access Mode... 2 FTP Synchronization... 2 FTP Service Node... 3 FTP Service
CONFIGURING ACTIVE DIRECTORY IN LIFELINE
White Paper CONFIGURING ACTIVE DIRECTORY IN LIFELINE CONTENTS Introduction 1 Audience 1 Terminology 1 Test Environment 2 Joining a Lenovo network storage device to an AD domain 3 Importing Domain Users
IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE
White Paper IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE Abstract The OneFS user mapping service combines a user s identities from different directory services into a single access
SimpleFTP. User s Guide. On-Core Software, LLC. 893 Sycamore Ave. Tinton Falls, NJ 07724 United States of America
SimpleFTP User s Guide On-Core Software, LLC. 893 Sycamore Ave. Tinton Falls, NJ 07724 United States of America Website: http://www.on-core.com Technical Support: [email protected] Information: [email protected]
File systems security: Shared folders & NTFS permissions, EFS Disk Quotas
File systems security: Shared folders & NTFS permissions, EFS Disk Quotas (November 2, 2015) Abdou Illia, Fall 2015 1 Learning Objective Understand Shared Folders Assign Shared Folder permissions NTFS
CIFS Permissions Best Practices Nasuni Corporation Natick, MA
Nasuni Corporation Natick, MA Overview You use permissions to control user access to data. There are two basic considerations when using permissions to control user access to data: Which users have access
Introduction to Computer Security
Introduction to Computer Security Windows Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Microsoft Windows Family Tree Key security milestones: NT 3.51 (1993): network drivers and
Clustered Data ONTAP 8.2
Updated for 8.2.1 Clustered Data ONTAP 8.2 File Access Management Guide for NFS NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone:
Advanced Audit Policy Configurations for LT Auditor+ Reference Guide
Advanced Audit Policy Configurations for LT Auditor+ Reference Guide Contents WINDOWS AUDIT POLICIES REQUIRED FOR LT AUDITOR+....3 ACTIVE DIRECTORY...3 Audit Policy for the Domain...3 Advanced Auditing
Filesystem Security. General Principles
Filesystem Security 1 General Principles Files and folders are managed by the operating system Applications, including shells, access files through an API Access control entry (ACE) Allow/deny a certain
Quest ChangeAuditor 5.1. For Windows File Servers. Events Reference
Quest ChangeAuditor For Windows File Servers 5.1 Events Reference 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
ONEFS MULTIPROTOCOL SECURITY UNTANGLED
White Paper ONEFS MULTIPROTOCOL SECURITY UNTANGLED Abstract This paper describes the role that identity management, authentication, and access control play in the security system of the EMC Isilon OneFS
Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS
Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS 03Archer.indd 71 8/4/05 9:13:59 AM Address Book 3.1 What Is the Address Book The Address Book in Outlook is actually a collection of address books
UOFL SHAREPOINT ADMINISTRATORS GUIDE
UOFL SHAREPOINT ADMINISTRATORS GUIDE WOW What Power! Learn how to administer a SharePoint site. [Type text] SharePoint Administrator Training Table of Contents Basics... 3 Definitions... 3 The Ribbon...
Symantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book
84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff
84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff This article is designed to provide security administrators with a security checklist for going live with Windows NT.
Oracle BI EE 11g - Security Auditing
Oracle BI EE 11g - Security Auditing Venkatakrishnan J Agenda Overview of BI EE Security Authentication Authorization Security Endpoints Overview Weblogic & EM BI Server Presentation Server - How is Web
How To Manage File Access On Data Ontap On A Pc Or Mac Or Mac (For A Mac) On A Network (For Mac) With A Network Or Ipad (For An Ipad) On An Ipa (For Pc Or
Clustered Data ONTAP 8.3 File Access Management Guide for NFS NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277
Creating Home Directories for Windows and Macintosh Computers
ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory
GuardianOS Data Migration Tool Enables Ease of Snap Server Deployment and Data Consolidation WHITE PAPER
GuardianOS Data Migration Tool Enables Ease of Snap Server Deployment and Data Consolidation WHITE PAPER Introduction Powered by the GuardianOS operating system, the Overland Storage Snap Server family
Mac OS X Server. File Services Administration For Version 10.4 or Later
Mac OS X Server File Services Administration For Version 10.4 or Later K Apple Computer, Inc. 2005 Apple Computer, Inc. All rights reserved. The owner or authorized user of a valid copy of Mac OS X Server
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
IBM Rational ClearCase 4.x and Active Directory
IBM Rational ClearCase 4.x and Active Directory ABSTRACT: Like any enterprise-scale application in a Windows network, Rational ClearCase will be affected when the network is converted from using Windows
A COMPARISON BETWEEN THE SAMBA3 AND LIKEWISE LWIOD FILE SERVERS
A COMPARISON BETWEEN THE SAMBA3 AND LIKEWISE LWIOD FILE SERVERS May 7, 2010 Outline Overview Architecture Feature Set Administrator Perspective Developer Perspective Overview 18 years development GPLv3
Sun ZFS Storage Appliance Rule-Based Identity Mapping Between Active Directory and Network Information Services Implementation Guide
An Oracle White Paper February 2011 Sun ZFS Storage Appliance Rule-Based Identity Mapping Between Active Directory and Network Information Services Implementation Guide Introduction... 4 Overview and Prerequisites...
User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
Symantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book
NYSeMail Office 365 Administration Guide for Agencies
NYSeMail Office 365 Administration Guide for Agencies Office 365 Overview... 34 What is included... 34 Software Requirements... 34 Message Limits... 34 Provisioning... 34 Archive and Retention Policy...
ADMT v3.1 Guide: Migrating and Restructuring Active Directory Domains
ADMT v3.1 Guide: Migrating and Restructuring Active Directory Domains Microsoft Corporation Published: July 2008 Authors: Moon Majumdar, Brad Mahugh Editors: Jim Becker, Fran Tooke Abstract This guide
Active Directory and Linux Identity Management
Active Directory and Linux Identity Management Published by the Open Source Software Lab at Microsoft. December 2007. Special thanks to Chris Travers, Contributing Author to the Open Source Software Lab.
IceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide
ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance
An Oracle Technical White Paper November 2014 How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance Table of Contents Introduction...3 Active Directory LDAP Services...4
Symantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1
Symantec Enterprise Vault Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault: Upgrading to Enterprise Vault 11.0.1 The software described in this book is furnished under a license agreement
EMC Celerra Network Server
EMC Celerra Network Server Release 5.6.47 Using Windows Administrative Tools with Celerra P/N 300-004-139 REV A02 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com
Symantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book
Operating Systems. 07.02 File system mounting, sharing, and protection. File System Mounting
07.02 File system mounting, sharing, and protection emanuele lattanzi isti information science and technology institute 1/15 File System Mounting A file system must be mounted before it can be accessed
Symantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book
Integrated Migration Tool
IceWarp Unified Communications Integrated Migration Tool Version 10.4 Printed on 16 April, 2012 Contents Integrated Migration Tool 1 How It Works... 2 Performing Migration... 3 Set up the Domain in IceWarp
FOR SYSTEM ADMINISTRATORS AND USERS. August 2012 Version 2
FOR SYSTEM ADMINISTRATORS AND USERS August 2012 Version 2 TABLE OF CONTENTS SECTION 1: BEST PRACTICES FOR SYSADMINS... 1 Best Practices Recommendations... 1 Permissions... 1 Security... 2 Miscellaneous...
FirstClass FAQ's An item is missing from my FirstClass desktop
FirstClass FAQ's An item is missing from my FirstClass desktop Deleted item: If you put a item on your desktop, you can delete it. To determine what kind of item (conference-original, conference-alias,
Windows Advanced Audit Policy Configuration
Windows Advanced Audit Policy Configuration EventTracker v7.x Publication Date: May 6, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This document describes auditing
Administration Guide. . All right reserved. For more information about Specops Password Sync and other Specops products, visit www.specopssoft.
Administration Guide. All right reserved. For more information about Specops Password Sync and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Password Sync is a trademark
Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard
White Paper Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard Abstract This document describes how PowerBroker Identity Services Enterprise and Microsoft Active Directory
Administering Group Policy with Group Policy Management Console
Administering Group Policy with Group Policy Management Console By Jim Lundy Microsoft Corporation Published: April 2003 Abstract In conjunction with Windows Server 2003, Microsoft has released a new Group
Frequently Asked Questions: Cisco Jabber 9.x for Android
Frequently Asked Questions Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions (FAQs) 2 Setup 2 Basics 4 Connectivity 8 Calls 9 Contacts and Directory Search 14 Voicemail
FTP Service Reference
IceWarp Unified Communications Reference Version 11.3 Published on 1/6/2015 Contents... 3 About... 4 Reference... 5 General Tab... 5 Dialog... 6 FTP Site... 6 Users... 7 Groups... 11 Options... 14 Access...
5. At the Windows Component panel, select the Internet Information Services (IIS) checkbox, and then hit Next.
Installing IIS on Windows XP 1. Start 2. Go to Control Panel 3. Go to Add or RemovePrograms 4. Go to Add/Remove Windows Components 5. At the Windows Component panel, select the Internet Information Services
Liferay Portal 4.0 - User Guide. Joseph Shum Alexander Chow
Liferay Portal 4.0 - User Guide Joseph Shum Alexander Chow Liferay Portal 4.0 - User Guide Joseph Shum Alexander Chow Table of Contents Preface... viii User Administration... 1 Overview... 1 Administration
File System Security: Secure Network Data Sharing for NT and UNIX
The following paper was originally published in the Proceedings of the Large Installation System Administration of Windows NT Conference Seattle, Washington, August 5 8, 1998 File System Security: Secure
Security Explorer 9.5. User Guide
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
Gladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
Kaseya 2. User Guide. Version 1.1
Kaseya 2 Directory Services User Guide Version 1.1 September 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
Integrating UNIX and Linux with Active Directory. John H Terpstra
Integrating UNIX and Linux with Active Directory John H Terpstra CTO, PrimaStasys Inc. [email protected] Slide 1 Agenda Definition of the Integration Problem Technical Background Review of Solution Choices
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
SerNet. Clustered Samba. Nürnberg April 29, 2009. Volker Lendecke SerNet Samba Team. Network Service in a Service Network
Clustered Samba Nürnberg April 29, 2009 Volker Lendecke SerNet Samba Team 04/2009, Volker Lendecke, SerNet Service Network GmbH, Seite 1 Volker Lendecke Co-founder SerNet - Service Network GmbH Free Software
ALTIRIS Integrated Component for Microsoft Active Directory 6.1 Help
ALTIRIS Integrated Component for Microsoft Active Directory 6.1 Help Notice Altiris Integrated Component for Microsoft Active Directory 6.1 Help 1998-2006 Altiris, Inc. All rights reserved. Document Date:
CommVault Simpana Archive 8.0 Integration Guide
CommVault Simpana Archive 8.0 Integration Guide Data Domain, Inc. 2421 Mission College Boulevard, Santa Clara, CA 95054 866-WE-DDUPE; 408-980-4800 Version 1.0, Revision B September 2, 2009 Copyright 2009
Concentsus Online Backup User Manual
Concentsus Online Backup User Manual Concentsus Small Business 5252 Edgewood Drive, Suite 250 Provo, UT 84604 888-889-9949 www.concentsus.com 2008 Concentsus, a service of efilecabinet, LC All Rights Reserved.
ADO and SQL Server Security
ADO and SQL Server Security Security is a growing concern in the Internet/intranet development community. It is a constant trade off between access to services and data, and protection of those services
Solaris CIFS Service CIFS. Alan Wright [email protected]
Solaris CIFS Service CIFS Alan Wright [email protected] Solaris CIFS Service Windows Interoperability opensolaris First-class Solaris Citizen kernel based protocol (a la NFS) file system (vfs and zfs) support
Vector HelpDesk - Administrator s Guide
Vector HelpDesk - Administrator s Guide Vector HelpDesk - Administrator s Guide Configuring and Maintaining Vector HelpDesk version 5.6 Vector HelpDesk - Administrator s Guide Copyright Vector Networks
Setting Up Your FTP Server
Requirements:! A computer dedicated to FTP server only! Linksys router! TCP/IP internet connection Steps: Getting Started Configure Static IP on the FTP Server Computer: Setting Up Your FTP Server 1. This
Security Explorer 9.5. About Security Explorer 9.5. New features. June 2014
June 2014 These release notes provide information about Dell. About New features s Known issues System requirements Product licensing Getting started with Security Explorer Globalization About Dell About
Logi Ad Hoc Reporting System Administration Guide
Logi Ad Hoc Reporting System Administration Guide Version 11.2 Last Updated: March 2014 Page 2 Table of Contents INTRODUCTION... 4 Target Audience... 4 Application Architecture... 5 Document Overview...
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
Security Guidelines for MapInfo Discovery 1.1
Security Guidelines for MapInfo Discovery 1.1 This paper provides guidelines and detailed instructions for improving the security of your Mapinfo Discovery deployment. In this document: Overview.........................................
