Solved

Error applying attributes to the file.

Posted on 2006-11-15
5
638 Views
Last Modified: 2008-01-09
Running RHEL 4 / SAMBA 3.0.10 on my server. I set up several unix users added shares, smb.conf looks good. Created two groups users and pca. Added users to samba with full access. The issue, user(s) log on from XP home workstation, shares map fine. All users can create folders add, delete files, no problem. However, the first user I setup can change attributes on files (read-only, hidden, archive), all others users cannot change attributes, "An error occurred applying attributes to the file". I have compared the users until I'm blue in the face and see no differences, except the unix user id values (500-508).

Any suggestions. Thanks.
0
Comment
Question by:headjava
  • 2
5 Comments
 
LVL 43

Accepted Solution

by:
ravenpl earned 250 total points
ID: 17954046
> except the unix user id values (500-508).
Well this is importand. Make samba force the user on created files

[share]
        comment = SHARE
        path = /...
        valid users = @special_share_group
        force user = special_share_owner
        force group = special_share_group
        read only = No
0
 

Author Comment

by:headjava
ID: 17957112
Thank you for the reply. I'm very new to linux. I did determine the user that creates or copies the file to my RHEL server is who can change attributes (owner). Not clear on the force user option in smb.conf. Would this still only allow the special_share_owner to change attributes ? How would the special_share_owner be different than all other users ?
Its like I need to have an anonymous user and use that user as the special_share_owner.

Thanks for your help.
0
 
LVL 43

Expert Comment

by:ravenpl
ID: 17957185
The idea of 'force user' is that anybody who is allowed to access this share(valid users) will act as forced user/group and not the real connected user.
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

​Being a Managed Services Provider (MSP) has presented you  with challenges in the past— and by meeting those challenges you’ve reaped the rewards of success.  In 2014, challenges and rewards remain; but as the Internet and business environment evol…
Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now