There are only two types of security modes for Samba, share-level and user-level,
which are collectively known as security
levels. Share-level security can only be implemented in one
way, while user-level security can be implemented in one of four
different ways. The different ways of implementing a security level
are called security modes.
User-level security is the default setting for Samba. Even if
the security = user directive is not
listed in the smb.conf file, it is used by
Samba. If the server accepts the client's username/password, the
client can then mount multiple shares without specifying a password
for each instance. Samba can also accept session-based
username/password requests. The client maintains multiple
authentication contexts by using a unique UID for each logon.
In smb.conf, the security = user directive that sets user-level
security is:
[GLOBAL]
...
security = user
...
|
With share-level security, the server accepts only a password
without an explicit username from the client. The server expects a
password for each share, independent of the username. There have
been recent reports that Microsoft Windows clients have
compatibility issues with share-level security servers. Samba
developers strongly discourage use of share-level security.
In smb.conf, the security = share directive that sets share-level
security is:
[GLOBAL]
...
security = share
...
|
In domain security mode, the Samba server has a machine account
(domain security trust account) and causes all authentication
requests to be passed through to the domain controllers. The Samba
server is made into a domain member server by using the following
directives in smb.conf:
[GLOBAL]
...
security = domain
workgroup = MARKETING
...
|
If you have an Active Directory environment, it is possible to
join the domain as a native Active Directory member. Even if a
security policy restricts the use of NT-compatible authentication
protocols, the Samba server can join an ADS using Kerberos. Samba
in Active Directory member mode can accept Kerberos tickets.
In smb.conf, the following directives
make Samba an Active Directory member server:
[GLOBAL]
...
security = ADS
realm = EXAMPLE.COM
password server = kerberos.example.com
...
|
Server security mode was previously used when Samba was not
capable of acting as a domain member server.
|
Note |
|
It is highly recommended to not use this
mode since there are numerous security drawbacks.
|
In smb.conf, the following directives
enable Samba to operate in server security mode:
[GLOBAL]
...
encrypt passwords = Yes
security = server
password server = "NetBIOS_of_Domain_Controller"
...
|