From 62b976057f1ad64092ca1be6b09168656aaa6600 Mon Sep 17 00:00:00 2001 From: John Terpstra Date: Mon, 8 Nov 2004 06:10:13 +0000 Subject: Updated username mape man page to reflect post 3.0.7 operation. (This used to be commit db5b2ef32a92d47e2c02a1fc111177bfd8bfa179) --- docs/smbdotconf/security/usernamemap.xml | 28 +++++++++++++++++++++++++++- 1 file changed, 27 insertions(+), 1 deletion(-) (limited to 'docs/smbdotconf') diff --git a/docs/smbdotconf/security/usernamemap.xml b/docs/smbdotconf/security/usernamemap.xml index 1dae4f0932..a76fc283ef 100644 --- a/docs/smbdotconf/security/usernamemap.xml +++ b/docs/smbdotconf/security/usernamemap.xml @@ -83,7 +83,33 @@ guest = * Also note that no reverse mapping is done. The main effect this has is with printing. Users who have been mapped may have trouble deleting print jobs as PrintManager under WfWg will think - they don't own the print job. + they don't own the print job. + + + Samab versions prior to 3.0.8 would only support reading the fully qualified + username (e.g.: DOMAIN\user) from the username map when performing a + kerberos login from a client. However, when looking up a map + entry for a user authenticated by NTLM[SSP], only the login name would be + used for matches. This resulted in inconsistent behavior sometimes + even on the same server. + + + + The following functionality is obeyed in version 3.0.8 and later: + + + + When performing local authentication, the username map is + applied to the login name before attempting to authenticate + the connection. + + + + When relying upon a external domain controller for validating + authentication requests, smbd will apply the username map + to the fully qualified username (i.e. DOMAIN\user) only + after the user has been successfully authenticated. + no username map -- cgit