sharesec - Set or get share ACLs


   sharesec {sharename} [-r, --remove=ACL] [-m, --modify=ACL]
    [-a, --add=ACL] [-R, --replace=ACLs] [-D, --delete] [-v, --view]
    [--view-all] [-M, --machine-sid] [-F, --force]
    [-d, --debuglevel=DEBUGLEVEL] [-s, --configfile=CONFIGFILE]
    [-l, --log-basename=LOGFILEBASE] [--version] [-?, --help] [--usage]
    [-S, --setsddl=STRING] [-V, --viewsddl]


   This tool is part of the samba(7) suite.

   The sharesec program manipulates share permissions on SMB file shares.


   The following options are available to the sharesec program. The format
   of ACLs is described in the section ACL FORMAT

       Add the ACEs specified to the ACL list.

       Delete the entire security descriptor.

       Force storing the ACL.

       Modify existing ACEs.

       Initialize the machine SID.

       Remove ACEs.

       Overwrite an existing share permission ACL.

       List a share acl

       List all share acls

       Set security descriptor by providing ACL in SDDL format.

       List a share acl in SDDL format.

       Print a summary of command line options.

       level is an integer from 0 to 10. The default value if this
       parameter is not specified is 0.

       The higher this value, the more detail will be logged to the log
       files about the activities of the server. At level 0, only critical
       errors and serious warnings will be logged. Level 1 is a reasonable
       level for day-to-day running - it generates a small amount of
       information about operations carried out.

       Levels above 1 will generate considerable amounts of log data, and
       should only be used when investigating a problem. Levels above 3
       are designed for use only by developers and generate HUGE amounts
       of log data, most of which is extremely cryptic.

       Note that specifying this parameter here will override the log
       level parameter in the smb.conf file.

       Prints the program version number.

   -s|--configfile=<configuration file>
       The file specified contains the configuration details required by
       the server. The information in this file includes server-specific
       information such as what printcap file to use, as well as
       descriptions of all the services that the server is to provide. See
       smb.conf for more information. The default configuration file name
       is determined at compile time.

       Base directory name for log/debug files. The extension ".progname"
       will be appended (e.g. log.smbclient, log.smbd, etc...). The log
       file is never removed by the client.

       Set the smb.conf(5) option "<name>" to value "<value>" from the
       command line. This overrides compiled-in defaults and options read
       from the configuration file.


   The format of an ACL is one or more ACL entries separated by either
   commas or newlines. An ACL entry is one of the following:

            REVISION:<revision number>
            OWNER:<sid or name>
            GROUP:<sid or name>
            ACL:<sid or name>:<type>/<flags>/<mask>

   The revision of the ACL specifies the internal Windows NT ACL revision
   for the security descriptor. If not specified it defaults to 1. Using
   values other than 1 may cause strange behaviour.

   The owner and group specify the owner and group SIDs for the object.
   Share ACLs do not specify an owner or a group, so these fields are

   ACLs specify permissions granted to the SID. This SID can be specified
   in S-1-x-y-z format or as a name in which case it is resolved against
   the server on which the file or directory resides. The type, flags and
   mask values determine the type of access granted to the SID.

   The type can be either ALLOWED or DENIED to allow/deny access to the
   SID. The flags values are generally zero for share ACLs.

   The mask is a value which expresses the access right granted to the
   SID. It can be given as a decimal or hexadecimal value, or by using one
   of the following text strings which map to the NT file permissions of
   the same name.

   *   R - Allow read access

   *   W - Allow write access

   *   X - Execute permission on the object

   *   D - Delete the object

   *   P - Change permissions

   *   O - Take ownership

   The following combined permissions can be specified:

   *   READ - Equivalent to 'RX' permissions

   *   CHANGE - Equivalent to 'RXWD' permissions

   *   FULL - Equivalent to 'RWXDPO' permissions


   The sharesec program sets the exit status depending on the success or
   otherwise of the operations performed. The exit status may be one of
   the following values.

   If the operation succeeded, sharesec returns and exit status of 0. If
   sharesec couldn't connect to the specified server, or there was an
   error getting or setting the ACLs, an exit status of 1 is returned. If
   there was an error parsing any command line arguments, an exit status
   of 2 is returned.


   Add full access for SID S-1-5-21-1866488690-1365729215-3963860297-17724
   on share:

            host:~ # sharesec share -a S-1-5-21-1866488690-1365729215-3963860297-17724:ALLOWED/0/FULL

   List all ACEs for share:

            host:~ # sharesec share -v


   This man page is correct for version 3 of the Samba suite.


   The original Samba software and related utilities were created by
   Andrew Tridgell. Samba is now developed by the Samba Team as an Open
   Source project similar to the way the Linux kernel is developed.

More Linux Commands

tickadj(1) - set time-related kernel variables (Man Page)...
The tickadj program reads, and optionally modifies, several timekeeping-related variables in the running kernel in some machines, via /dev/kmem . The particular

ip-monitor(8) state monitoring (Admin - Linux man page).....
The ip utility can monitor the state of devices, addresses and routes continuously. This option has a slightly different format. Namely, the monitor command is

sigstack(3) - set and/or get signal stack context (ManPage)
sigaltstack() allows a process to define a new alternate signal stack and/or retrieve the state of an existing alternate signal stack. An alternate signal stack

perlrepository(1) Links to current information on the Perl s
Perls source code is stored in a Git repository. See perlhack for an explanation of Perl development, including the Super Quick Patch Guide for making and submi

rvmtab(8) (Administration - Linux man page)................
rvmtab will list out the content of /proc/mounts sorted first of all in the reverse order of the parent IDs found in /proc/self/mountinfo and then in a second s

postfix(1) - Postfix control program - Linux manual page....
This command is reserved for the superuser. To submit mail, use the Postfix sendmail(1) command. The postfix(1) command controls the operation of the Postfix ma

Bootloader::Core::ELILO(3pm) - ELILO library for bootloader
$obj_ref = Bootloader::Core::ELILO-&gt;new (); Creates an instance of the Bootloader::Core::ELILO class. First argumetn is old configuration and second is architec

request-key(8) - Handle key instantiation callback requests
This program is invoked by the kernel when the kernel is asked for a key that it doesnt have immediately available. The kernel creates a partially set up key an

ld-linux(8) - dynamic linker/loader - Linux manual page.....
The programs and* find and load the shared libraries needed by a program, prepare the program to run, and then run it. Linux binaries require

ExtUtils::MM(3pm) - OS adjusted ExtUtils::MakeMaker subclass
FOR INTERNAL USE ONLY ExtUtils::MM is a subclass of ExtUtils::MakeMaker which automatically chooses the appropriate OS specific subclass for you (ie. ExtUils::M

g++-4.6(1) - GNU project C and C++ compiler - Linux man page
When you invoke GCC , it normally does preprocessing, compilation, assembly and linking. The overall options allow you to stop this process at an intermediate s

AutoSplit(3pm) - split a package for autoloading (Man Page)
This function will split up your program into files that the AutoLoader module can handle. It is used by both the standard perl libraries and by the MakeMaker u

We can't live, work or learn in freedom unless the software we use is free.