Solved

Samba public share with some private folders inside

Posted on 2013-01-30
5
374 Views
Last Modified: 2013-02-04
Given a Samba share that anyone can scan to, how can I setup private folders within that share folder that only the given user and someone in his group can scan to, i.e. rw over the network?
0
Comment
Question by:SStory
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 14

Expert Comment

by:ThomasMcA2
ID: 38835900
Can the private folder be moved so that it is a sibling of the current parent? Then you could create a new share for the moved folder. So instead of this:

Folder1
.....Folder2

...you would have this:

Folder1
Folder2
0
 
LVL 25

Author Comment

by:SStory
ID: 38835968
I could do it as a ton of shares. I was hoping to avoid this and have one share that they can all scan too, but private folders within that, that limit who can get to those docs. Is this not possible.

I do know how to make lots of shares, but I know this could result in 20 or more and I'd prefer to not do it that way.
0
 
LVL 14

Accepted Solution

by:
ThomasMcA2 earned 500 total points
ID: 38836472
The subfolder permissions can be specified using acl command setfacl for the right group/person.

use getfacl to check/display the applied permissions.
0
 
LVL 25

Author Comment

by:SStory
ID: 38836717
Thanks!

Is there any way other than acl?

I don't understand why it won't work by just setting the owner/group permissions and world to 0, but it does not. Can Samba not allow this?
0
 
LVL 25

Author Closing Comment

by:SStory
ID: 38851497
setfacl in conjunction with the sticky bit to force the group to that user does just want I wanted.
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question