From b3b24fb6904770e9bb211b42c7745e85b98d9a2b Mon Sep 17 00:00:00 2001 From: Andrew Bartlett Date: Sat, 2 Nov 2002 12:13:44 +0000 Subject: Merge of my 'ldap trust ids' patch from HEAD. This hopefully provides a peformance boost by not hitting getpwnam() for every entry in an enumeration, instead reteriving entries directly (if available). idra has reviewed this patch. Andrew Bartlett (This used to be commit 8abe71c4d7a796001c5765f4dd88c2e6f5637802) --- docs/docbook/manpages/smb.conf.5.sgml | 46 +++++++++++++++++++++++++++++------ 1 file changed, 39 insertions(+), 7 deletions(-) (limited to 'docs/docbook/manpages/smb.conf.5.sgml') diff --git a/docs/docbook/manpages/smb.conf.5.sgml b/docs/docbook/manpages/smb.conf.5.sgml index e4c4587c1f..621b764a11 100644 --- a/docs/docbook/manpages/smb.conf.5.sgml +++ b/docs/docbook/manpages/smb.conf.5.sgml @@ -663,6 +663,7 @@ ldap user suffix ldap machine suffix ldap passwd sync + ldap trust ids lm announce lm interval @@ -3464,16 +3465,20 @@ The ldap ssl can be set to one of three values: - On = Always use SSL when contacting the - ldap server. - Off = Never use SSL when querying the directory. Start_tls = Use the LDAPv3 StartTLS extended operation (RFC2830) for communicating with the directory server. + + On = + Use SSL on the ldaps port when contacting the + ldap server. Only + available when the backwards-compatiblity + --with-ldapsam option is specified + to configure. See passdb backend - Default : ldap ssl = on + Default : ldap ssl = start_tls @@ -3540,9 +3545,24 @@ + + ldap trust ids (G) + Normally, Samba validates each entry + in the LDAP server against getpwnam(). This allows + LDAP to be used for Samba with the unix system using + NIS (for example) and also ensures that Samba does not + present accounts that do not otherwise exist. + This option is used to disable this functionality, and + instead to rely on the presence of the appropriate + attributes in LDAP directly, which can result in a + significant performance boost in some situations. + Setting this option to yes effectivly assumes + that the local machine is running nss_ldap against the + same LDAP server. - - + Default: ldap trust ids = No + + level2 oplocks (S) @@ -5357,8 +5377,20 @@ ldapsam_nua - The LDAP based passdb backend, with non unix account support. Takes an LDAP URL as an optional argument (defaults to ldap://localhost) + Note: In this module, any account + without a matching POSIX account is regarded + as 'non unix'. See also - non unix account range + non unix account + range + + LDAP connections should be secured where + possible. This may be done using either + Start-TLS (see + ldap ssl) or by + specifying ldaps:// in + the URL argument. + nisplussam - The NIS+ based passdb backend. Takes name NIS domain as an optional argument. Only works with sun NIS+ servers. -- cgit