| 7.2) name-based mapping rules +------------------------------------------ add -d winuser:*[email protected] unixuser:* add -d wingroup:*[email protected] unixgroup:*
The problem is that your rules are unidirectional so when CIFS server wants to create a Windows security descriptor based on the stored ACL it cannot map back the stored UIDs/GIDs to users/groups in ad.hugeinc.com domain so it will map them to some local SIDs which are created based on UID/GID value and there is no name for this arithmetically created SIDs, that's why you see SIDs not names on your Windows client screen. So, there is no bugs and I'm not sure why you have defined your rules unidirectional, but if you want to see the correct names you need to define bi-directional rules i.e get rid of "-d" in the rules. Afshin david stahl wrote:
here is the output of that script http://txtb.in/5Gz here is a link to a screenshot how things are showing up. http://www.screencast.com/users/dstahl/folders/Jing/media/1d400f71-1222-4053-9de2-5a26acfaa435 here is the output from an /bin/ls -V r...@opensolaris:/opensolaris/shares/it# /bin/ls -Vd test/ d---------+ 2 dstahl Domain Users 2 Oct 8 16:04 test/ group:huge:r-x---a-R-c--s:fd-----:allow group:Domain Admins:r-x---a-R-c--s:fd----I:allow
_______________________________________________ cifs-discuss mailing list [email protected] http://mail.opensolaris.org/mailman/listinfo/cifs-discuss
