diff options
author | Andrew Bartlett <abartlet@samba.org> | 2004-05-13 15:34:56 +0000 |
---|---|---|
committer | Gerald (Jerry) Carter <jerry@samba.org> | 2007-10-10 12:53:42 -0500 |
commit | d12e825042d1f108051eb6e205340dee444d5591 (patch) | |
tree | 5adf81912ab36d1a9c1e3eb28f6aa6d83c655a05 /source4/smb_server | |
parent | 060f94b9fcf9ceddff6700738e35b537cef605ca (diff) | |
download | samba-d12e825042d1f108051eb6e205340dee444d5591.tar.gz samba-d12e825042d1f108051eb6e205340dee444d5591.tar.bz2 samba-d12e825042d1f108051eb6e205340dee444d5591.zip |
r685: The SAM is dead! Long live the new SAM! ;-)
This commit kills passdb, which was only hosting the auth subsystem.
With the work tridge has done on Samba4's SAM backend, this can (and
now is) all hosted on ldb. The auth_sam.c file now references this
backend.
You will need to assign your users passwords in ldb - adding a new line:
unicodePwd: myPass
to a record, using ldbedit, should be sufficient. Naturally, this
assumes you have had your personal SAMR provisioning tutorial from
tridge. Everybody else can still use the anonymous logins.
Andrew Bartlett
(This used to be commit 2aa0b55fb86648731d5f2201fa5a6aa993b7ca48)
Diffstat (limited to 'source4/smb_server')
-rw-r--r-- | source4/smb_server/password.c | 9 |
1 files changed, 1 insertions, 8 deletions
diff --git a/source4/smb_server/password.c b/source4/smb_server/password.c index bb78230ff3..8dadd0400e 100644 --- a/source4/smb_server/password.c +++ b/source4/smb_server/password.c @@ -68,7 +68,6 @@ void invalidate_vuid(struct server_context *smb, uint16 vuid) from the vuid 'owner' of connections */ /* REWRITE: conn_clear_vuid_cache(smb, vuid); */ - delete_nt_token(&vuser->nt_user_token); SAFE_FREE(vuser); smb->users.num_validated_vuids--; } @@ -136,15 +135,9 @@ int register_vuid(struct server_context *smb, vuser->vuid = smb->users.next_vuid; - vuser->guest = server_info->guest; - vuser->session_key = *session_key; - DEBUG(10,("register_vuid: guest=%d\n", vuser->guest )); - - if (server_info->ptok) { - vuser->nt_user_token = dup_nt_token(server_info->ptok); - } else { + if (!server_info->ptok) { DEBUG(1, ("server_info does not contain a user_token - cannot continue\n")); free_server_info(&server_info); |