# Global parameters
[global]
security = ADS
workgroup = MAD
realm = MAD.CAPONATO.ES
server role = member server
log file = /var/log/samba/%m.log
bind interfaces only = yes
# Please substitute your own physical eth adapter here:
interfaces = lo ens3

# winbind config:
winbind use default domain = yes

# The following options are only useful for testing. Comment out in production.    
# winbind enum users = yes  
# winbind enum groups = yes

# Kerberos
winbind refresh tickets = Yes
dedicated keytab file = /etc/krb5.keytab
kerberos method = secrets and keytab

# Configure share's security (Windows ACLs) using extended attributes (XATTR)
# Needed for Linux, as it does not support NFS4 ACLs
vfs objects = acl_xattr 
map acl inherit = yes

# When you have configured the share's security (Windows ACLs) with XATTRs 
# from a Windows computer you can safely uncomment the following. Not before 
acl_xattr:ignore system acls = yes

# Veto Files (do not allow these files in the server)
veto files = /Thumbs.db/.DS_Store/._.DS_Store/.com.apple*/.AppleDB/.AppleDouble/.AppleDesktop/:2eDS_Store/Network Trash Folder/Temporary Items/TheVolumeSettingsFolder/.@__thumb/.@__desc/:2e*/$/._
delete veto files = yes

# Default ID mapping configuration for local BUILTIN accounts
idmap config * : backend = tdb
idmap config * : range = 3000-7999

# If you want to use ad idmap backend, change the following lines accordingly. See "idmap-backends" entry
# idmap config for the MAD domain using the rid backend
idmap config MAD : backend = rid
idmap config MAD : range = 10000-999999

Global Parameters

Winbind Configuration

Kerberos configuration:

Extended Attributes configuration

See this article for more info.

Housekeeping settings

ID Mapping

See this article for more info.


Caponato's Samba notebook. Start here or else Main menu