A Samba administrator account (i.e., a Samba account that has <literal>root</literal> privileges on the
Samba server) must be entered here; the operation will fail if an ordinary user account is given.
The necessary privilege can be assured by creating a Samba SAM account for <literal>root</literal> or
- by granting the <literal>SeMachineAccountPrivilege</literal> privilage to the user account.
+ by granting the <literal>SeMachineAccountPrivilege</literal> privilege to the user account.
</para>
<para>
<para>The default guest account was <literal>nobody</literal>, uid -1, which produced log messages on one of our machines saying "your server is being unfriendly," so we created a specific Samba guest account for browsing and printing:</para>
-<programlisting># superuser account - admin privilages to shares, with no
+<programlisting># superuser account - admin privileges to shares, with no
# restrictions
# WARNING - use this with care: files can be modified,
# regardless of file permissions
timezone
- attempted alignment fixups (to speed up memcpy)
- added some DCE/DFS support (thanks to Jim Doyle <doyle@oec.com>)
- - added fix so that root doesn't have special privilages to open
+ - added fix so that root doesn't have special privileges to open
readonly files for writing (but admin users do). This fixes the MS
office install problem.
- fixed trans2 response bug in client
se_map_generic(&des_access, &usr_generic_mapping);
/*
- * Get the sampass first as we need to check privilages
+ * Get the sampass first as we need to check privileges
* based on what kind of user object this is.
* But don't reveal info too early if it didn't exist.
*/
* Cheat - allow GENERIC_RIGHTS_USER_WRITE if pipe user is
* in DOMAIN_GROUP_RID_ADMINS. This is almost certainly not
* what Windows does but is a hack for people who haven't
- * set up privilages on groups in Samba.
+ * set up privileges on groups in Samba.
*/
if (acb_info & (ACB_SVRTRUST|ACB_DOMTRUST)) {
if (lp_enable_privileges() && nt_token_check_domain_rid(p->server_info->ptok,
request_ok(state);
}
-/* Where can I find the privilaged pipe? */
+/* Where can I find the privileged pipe? */
void winbindd_priv_pipe_dir(struct winbindd_cli_state *state)
{
esac])
#################################################
-# set where the winbindd privilaged socket should be put
+# set where the winbindd privileged socket should be put
AC_ARG_WITH(winbindd-privileged-socket-dir,
[AS_HELP_STRING([--with-winbindd-privileged-socket-dir=DIR],[Where to put the winbindd socket ($winbindd_privileged_socket_dir)])],
[ case "$withval" in
runcmd "Lookup name" "lookup $DOMAIN\\$USERNAME" || failed=`expr $failed + 1`
-#Fails unless there are privilages
+#Fails unless there are privileges
#runcmd "Lookup privs of name" "privileges $DOMAIN\\$USERNAME" || failed=`expr $failed + 1`
# do some simple operations using old protocol versions
}
samdb_msg_add_delete(state->sam_ldb, mem_ctx, msg,
- "privilage");
+ "privilege");
ret = samdb_replace(state->sam_ldb, mem_ctx, msg);
if (ret != 0) {
[out,switch_is(level)] nbtd_info info
);
- /* Send a GetDCName from the privilaged port (owned by nbtd),
+ /* Send a GetDCName from the privileged port (owned by nbtd),
* and await a reply */
void nbtd_getdcname(
}
for (j=0;j<account->privilege_entries; j++) {
if (!found_priv_in_lsa[j]) {
- printf("Privilage %s on account %s not found in LSA\n", account->privilege_name[j].string,
+ printf("Privilege %s on account %s not found in LSA\n", account->privilege_name[j].string,
dom_sid_string(mem_ctx, dom_sid));
ret = false;
}