Adaptec 5325301656 Administration Guide - Page 105

Setting File and Directory Access Permissions and Inheritance (Windows), GROUP, Users

Page 105 highlights

Windows ACLs Permissions are enforced for the specified users in the same manner for all client protocols, including non-SMB clients that normally have the UNIX security personality. However, if a non-SMB client changes permissions or ownership on a Windows personality file or directory (or deletes and recreates it), the personality will change to UNIX with the UNIX permissions specified by the client. Note Group membership of NFS clients is established by configuring the local client's user account or the NIS domain. Group membership of Snap Server local users or users ID-mapped to domain users is not observed by NFS clients. Therefore, ACL permissions applied to groups may not apply as expected to NFS clients. Default File and Folder Permissions When a file or directory is created by an SMB client, the owner of the file will be the user who created the file (except for files created by local or domain administrators, in which case the owner will be the "Administrators" group, mapped to the local admingrp), and the ACL will be inherited per the inheritance ACEs on the parent directory's ACL. The owner of a file or directory always implicitly has the ability to change permissions, regardless of the permissions established in the ACL. In addition, members of the Snap Server's local admin group, as well as members of Domain Admins (if the server is configured to belong to a domain) always implicitly have take ownership and change ownership permissions. Setting File and Directory Access Permissions and Inheritance (Windows) Access permissions for files and directories with the Windows security personality are set using standard Windows NT, 2000, 2003, XP, or Vista security tools. GuardianOS supports: • All standard generic and advanced access permissions that can be assigned by Windows clients. • All levels of inheritance that can be assigned to an ACE in a directory ACL from a Windows client. • Automatic inheritance from parent directories, as well as the ability to disable automatic inheritance from parents. • Special assignment and inheritance of the CREATOR OWNER, CREATOR GROUP, Users, Authenticated Users, and Administrators built-in users and groups. Chapter 6 Share and File Access 91

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224

Windows ACLs
Chapter 6
Share and File Access
91
Permissions are enforced for the specified users in the same manner for all client
protocols, including non-SMB clients that normally have the UNIX security
personality. However, if a non-SMB client changes permissions or ownership on a
Windows personality file or directory (or deletes and recreates it), the personality
will change to UNIX with the UNIX permissions specified by the client.
Note
Group membership of NFS clients is established by configuring the local
client’s user account or the NIS domain. Group membership of Snap Server local
users or users ID-mapped to domain users is not observed by NFS clients.
Therefore, ACL permissions applied to groups may not apply as expected to NFS
clients.
Default File and Folder Permissions
When a file or directory is created by an SMB client, the owner of the file will be the
user who created the file (except for files created by local or domain administrators,
in which case the owner will be the “Administrators” group, mapped to the local
admingrp), and the ACL will be inherited per the inheritance ACEs on the parent
directory’s ACL. The owner of a file or directory always implicitly has the ability to
change permissions, regardless of the permissions established in the ACL. In
addition, members of the Snap Server’s local admin group, as well as members of
Domain Admins (if the server is configured to belong to a domain) always
implicitly have
take ownership
and
change ownership
permissions.
Setting File and Directory Access Permissions and Inheritance
(Windows)
Access permissions for files and directories with the Windows security personality
are set using standard Windows NT, 2000, 2003, XP, or Vista security tools.
GuardianOS supports:
All standard generic and advanced access permissions that can be assigned by
Windows clients.
All levels of inheritance that can be assigned to an ACE in a directory ACL from a
Windows client.
Automatic inheritance from parent directories, as well as the ability to disable
automatic inheritance from parents.
Special assignment and inheritance of the CREATOR OWNER, CREATOR
GROUP, Users, Authenticated Users, and Administrators built-in users and
groups.