#ntvfs server blocks copychunk with execute access on read handle
^samba4.smb2.ioctl.copy_chunk_bad_access
^samba4.drs.getnc_exop.python.*getnc_exop.DrsReplicaPrefixMapTestCase.test_regular_prefix_map_ex_attid.*
-#ad_member does not support for user@realm NTLM authentication
-^samba3.unix.whoami ntlm user@realm.*\(ad_member
NTSTATUS result;
bool was_mapped;
char *internal_username = NULL;
+ bool upn_form = false;
+
+ if (client_domain[0] == '\0' && strchr(smb_name, '@')) {
+ upn_form = true;
+ }
was_mapped = map_username(talloc_tos(), smb_name, &internal_username);
if (!internal_username) {
* non-domain member box will also map to WORKSTATION\user.
* This also deals with the client passing in a "" domain */
- if (!is_trusted_domain(domain) &&
+ if (!upn_form && !is_trusted_domain(domain) &&
!strequal(domain, my_sam_name()) &&
- !strequal(domain, get_global_sam_name()))
- {
+ !strequal(domain, get_global_sam_name())) {
if (lp_map_untrusted_to_domain())
domain = my_sam_name();
else