Adaptec 5325301507 Administration Guide - Page 124

Setting File and Directory Access Permissions and Inheritance (Windows), GROUP, Users

Page 124 highlights

Windows ACLs Windows personality file or directory (or deletes and recreates it), the personality will change to UNIX with the UNIX permissions specified by the client. Note Group membership of NFS clients is established by configuring the local client's user account or the NIS domain. Group membership of SnapServer local users or users ID-mapped to domain users is not observed by NFS clients. Therefore, ACL permissions applied to groups may not apply as expected to NFS clients. Default File and Folder Permissions When a file or directory is created by an SMB client, the owner of the file will be the user who created the file (except for files created by local or domain administrators, in which case the owner will be the "Administrators" group, mapped to the local admingrp), and the ACL will be inherited per the inheritance ACEs on the parent directory's ACL. The owner of a file or directory always implicitly has the ability to change permissions, regardless of the permissions established in the ACL. In addition, members of the SnapServer's local admin group, as well as members of Domain Admins (if the server is configured to belong to a domain) always implicitly have take ownership and change ownership permissions. Setting File and Directory Access Permissions and Inheritance (Windows) Access permissions for files and directories with the Windows security personality are set using standard Windows NT, 2000, 2003, XP, Vista, 2008, or 7 security tools. GuardianOS supports: • All standard generic and advanced access permissions that can be assigned by Windows clients. • All levels of inheritance that can be assigned to an ACE in a directory ACL from a Windows client. • Automatic inheritance from parent directories, as well as the ability to disable automatic inheritance from parents. • Special assignment and inheritance of the CREATOR OWNER, CREATOR GROUP, Users, Authenticated Users, and Administrators built-in users and groups. 108 SnapServer Administrator Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250

Windows ACLs
108
SnapServer Administrator Guide
Windows personality file or directory (or deletes and recreates it), the personality
will change to UNIX with the UNIX permissions specified by the client.
Note
Group membership of NFS clients is established by configuring the local
client’s user account or the NIS domain. Group membership of SnapServer local
users or users ID-mapped to domain users is not observed by NFS clients.
Therefore, ACL permissions applied to groups may not apply as expected to NFS
clients.
Default File and Folder Permissions
When a file or directory is created by an SMB client, the owner of the file will be the
user who created the file (except for files created by local or domain administrators,
in which case the owner will be the “Administrators” group, mapped to the local
admingrp), and the ACL will be inherited per the inheritance ACEs on the parent
directory’s ACL. The owner of a file or directory always implicitly has the ability to
change permissions, regardless of the permissions established in the ACL. In
addition, members of the SnapServer’s local admin group, as well as members of
Domain Admins (if the server is configured to belong to a domain) always
implicitly have
take ownership
and
change ownership
permissions.
Setting File and Directory Access Permissions and Inheritance
(Windows)
Access permissions for files and directories with the Windows security personality
are set using standard Windows NT, 2000, 2003, XP, Vista, 2008, or 7 security tools.
GuardianOS supports:
All standard generic and advanced access permissions that can be assigned by
Windows clients.
All levels of inheritance that can be assigned to an ACE in a directory ACL from a
Windows client.
Automatic inheritance from parent directories, as well as the ability to disable
automatic inheritance from parents.
Special assignment and inheritance of the CREATOR OWNER, CREATOR
GROUP, Users, Authenticated Users, and Administrators built-in users and
groups.