SMB Protocol
Connector name |
|
Connector type | Executable |
Type (UI field value) |
|
Target system versions supported / tested | In most scenarios, these connectors are used with an Active Directory connector to manage network resources. However, they can be used for operations the Active connector cannot do. For example, you could use SMB protocol to target the server where the user’s home directories are located. This way, a home directory can also be created when a new user account is created. |
Connector status / support | Bravura Security-Verified This connector has been tested and is fully supported by Bravura Security. |
Upgrade notes | CautionThe The |
Bravura Security Fabric uses network resource connectors to:
Update ACLs for shares and folders
Create, delete, and rename folders on an Active Directory server
Create, delete, and modify shares; for example, share and unshare existing folders, or modify shares
See also:
Active Directory DN for information about setting up, and targeting network resources on an Active Directory DN server.
Supported operations
The SMB protocol network resource connectors support the following operations on a network resource target system using the SMB Protocol:
nrcreatecreate a shared folder.nrdeletedelete or unshare a shared foldernrmoverename or move a shared foldernrupdateupdate access rights for a shared folder
These operations must be added by a request rewrite plugin. The network resource target system is used to store the credentials, configure the account attributes when operating on folders/shares, and configure the target system address to the domain to look up SID/account information.
Targeting Network Resources
For each Active Directory DN or Legacy Active Directory server, add a target (Manage the system > Resources > Target systems) :
Type is one of the following, listed under Network Resource :
SMB Protocol for Active Directory DN
SMB Protocol for Legacy Active Directory (4.5 or earlier)
Address for:
Active Directory DN uses options listed in the table below.
Legacy Active Directory uses only Domain or domain controller and Connection over SSL settings:
Administrator ID and Password are the credentials used to contact the Active Directory domain and update folders/shares on the file servers.
Option | Description |
|---|---|
Options marked with a | |
Domain or domain controller | The DNS domain name, the domain controller’s FQDN, a custom DNS name to target or IP address; for example: globaldomain.example.com or \\mydomaincontroller.example.com or \\mydomaincontroller or \\customdnsname Use the IP address only if DNS is not resolving, otherwise avoid using the IP address of the domain controller. The DNS domain name or the FQDN should be specified. A custom DNS name should only be used if absolutely necessary. (key: server) |
Connection over SSL | Select to enforce SSL connections. (key: ssl) |
Custom LDAP search expression for filtering users | Restrict user listing by using LDAP search filters. (key: userFilter) |
Custom LDAP search expression for filtering groups | Restrict group listing by using LDAP search filters. (key: groupFilter) |
OUs to list users from | List only those users who exist in one or more containers . (key: listOUs) |
Groups to list users from | List only those users who exist in one or more groups. (key: listGroups) |
OUs to list groups from | List only those groups that exist in one or more containers. (key: listGroupOUs) |
Groups to list member groups from | List only those groups that exist in one or more groups. (key: listGroupGroups) |
OUs to list computers from | List only those computer objects that exist in one or more containers. (key: listComputerOUs) |
Groups to list computers from | List only those computer objects that exist in one or more groups . (key: listComputerGroups) |
OUs to exclude from listing | Exclude certain OUs to further restrict listing. (key: excludeOUs) |
List nested groups | Recursively list all users and computers contained within groups specified by the " Groups to list. ." options. (key: listNestedGrps) |
List members for nested groups | Recursively list users’ group membership for groups contained within groups specified by the Groups to list users from option. (key: listNestedNOSGrps) |
Abort listing when an invalid group is encountered | Return failure when a group list includes an invalid group. (key: listFailOnNonExistentGrp) |
Abort listing when an invalid OU is encountered | Return failure when an OU list includes an invalid OU. (key: listFailOnNonExistentOU) |
When listing group members and managers, list groups as their individual user members | Depending on the version of Bravura Security Fabric you have installed, you may need to list groups and group managers in flattened form if nested groups are not supported. Bravura Security Fabric versions 9.0.1 or earlier do not support nested groups . (key: listFlatGroups) |
List entire forest | List objects outside the domain specified in the Domain or domain ontroller target address option. (key: listForest) |
Delete users with sub objects | Delete users with leaf objects. In some environments, Active Directory accounts will have a leaf object created, for example Exchange with ActiveSync. By default these users will not be deleted. (key: deleteSubs) |
Create an OU when creating user if it does not already exist | If enabled, when an account is being created, and a non-existing OU is specified , the OU will be created instead of giving an error. (key: createOU) |
List deleted users on supported systems | Choose whether to list only regular users (default), only deleted users, or both. Deleted users are listed in NT4 format. Active Directory moves deleted accounts to a "recycle bin". If enabled in Bravura Security Fabric , these accounts are restrored. (key: listDeleted) |
Name format | Use NT4 format or fully qualified domain name (FQDN). (key: nameFormat) |
Group Name format | Use NT4 format or fully qualified domain name (FQDN). (key: groupNameFormat) |
Attribute specifying group owners | The attribute name that specifies the owner or list of owners for a group. The default value is managedBy. When set to a single valued attribute such as managedBy, the Target system supports multiple owners on groups target system option should be unchecked. Only one group owner is supported in this case. A multi-valued attribute may also be specified in order to support multiple group owners. In this case, the Target system supports multiple owners on groups target system option should be checked. (key: grpowner_attr) |
Persistent list search wait time (in seconds) | The interval time in seconds that the connector will wait to search for changes in the native target. The default value is 7,200 seconds (2 hours). If this value is set too small for a large native target, the connector may not be able to retrieve changes completely in the native target. Setting the value too small will also impose excess load on related services, which drag down the system performance. (key: persistentSearchWait) |
Disable recursive searches of members in domain groups to improve nr performance | Recursively traverse all groups contained with groups when checking permissions in the network resources sub folder operation. Turning this option on is more precise for the checking of permissions, however it will have a performance impact. Default is false. (key: nrIsMemberOfDomainGroupRecursive) NoteThe option Disable recursive searches of members in domain groups to improve nr performance was added in Connector Pack 4.6.0. |
Account attributes for shared folders
The following account attributes exist for creating and updating shared folders:
ntfs-sddl An SDDL (Security Descriptor Definition Language) string which represents the ACL to set on the newly-created folder. This attribute can be used to perform "copy" or "replace" operations; the SID of the modeluid will be replaced with the SID of the account in the SDDL string. This attribute can also be used for setting, and can be ignored if the other ntfs- attributes are preferred.
When part of the sddl string contains %ACCT_SID%, it will be replaced by the SID of the Active Directory account ID or the value of the pseudo-attribute _acctSID.
ntfs-dacl A multi-valued attribute where each value represents the modification to the ACL of the folder. Each value in this attribute uses "bare" the KVGroup syntax format to apply the modification. This attribute can be configured using one of the following formats:
{grant=<sid|acct>;mask={<perm>;<perm>;};flags={<flag>;<flag>;};[replace;]}{deny=<sid|acct>;mask={<perm>;<perm>;};flags={<flag>;<flag>;};[replace;]}{remove=<sid|acct>;[granted;|denied;]}
Where:
<sid|acct>is the SID or account to which to apply the access.<perm>is a permission mask with one of the following values:Simple permissions:
N – No access F – Full access M – Modify access RX – Read and execute access R – Read-only access W – Write-only access D – Delete access
Fine-grained permissions
DE – Delete RC – Read control WDAC – Write DAC WO – Write owner S – Synchronize AS – Access system security MA – Maximum allowed GR – Generic read GW – Generic write GE – Generic execute GA – Generic all RD – Read data/list directory WD – Write data/add file AD – Append data/add sub-directory REA – Read extended attributes WEA – Write extended attributes X – Execute/traverse DC – Delete child RA – Read attributes WA – Write attributes
<flag>is one of the following:OI – Object inherit CI – Container inherit IO – Inherit only NP – Don’t propagate inherit
replace– Replace the specified permissions, rather than modify individual permissions.granted– Remove granted permissionsdenied– Remove denied permissions
ntfs-owner The SID or account name of the group or account which should be the owner for this folder.
ntfs-group The SID or group name for the group which should be the primary group for this folder. This is only used for POSIX sub-systems.
inherit Controls inheritance behavior for ACLs on the folder. It can be configured to use one of the following values:
E – enable inheritance. This is valid for both create and update.
D – disable inheritance and copy ACE’s (only valid for update)
R – remove all inherited ACE’s (only valid for update)
N – no inheritance (only valid for create)
Use of ntfs-sddl in conjunction with ntfs-dacl, ntfs-owner, ntfs-group or inherit is not permitted because the ntfs-sddl string contains all of the information in the other attributes.
propagate Controls permission propagation when updating folder ownership. It can be configured to use one of the following values:
S -- If ACLs are specified they are propagated based on inheritance rules.
R -- If ACLs are specified all child objects have their ACLs replaced with the specified ones.
E -- If ACLs are specified all inherited ACLs are replaced, but explicit ones are left.
N -- Only set permission of the object itself.
R is the default value if nothing is specified. For ownership, S, R and E will cause the ownership to be set on all child objects. The attribute is ignored for create since there will not be child objects.
share-sddl An SDDL (Security Descriptor Definition Language) string which represents the ACL to set on the newly created folder. This attribute can be used to perform copy/replace operations; the SID of the modeluid is replaced with the SID of the account in the SDDL string. This attribute can also be used for setting and can be ignored if the other share-dacl is preferred.
When part of the sddl string contains %ACCT_SID%, it will be replaced by the SID of the Active Directory account ID or the value of the pseudo-attribute _acctSID.
share-dacl A multi-valued attribute where each value represents the modification to the ACL of the folder. The format of each value of this attribute uses "bare" KVG syntax to apply the modification. It can use one of the following formats:
{grant=<sid|acct>;mask={<perm>;<perm>;}[replace;]}{deny=<sid|acct>;mask={<perm>;<perm>;};[replace;]}{remove=<sid|acct>;[granted;|denied;]}
This is a simplified version of the ntfs-dacl attribute. The following <perm> mappings are equivalent to the share UI perms:
Full – F;
Read – RX;
Read and Write – RX;W;D
Use of share-sddl in conjunction with share-dacl is not permitted because the share-sddl string contains all of the information in the share-dacl attribute.
share-comment The comment to be specified for the share.
share-path The local file system path to which the share applies.
share-max-uses The maximum number of connections to the share at any one time. Use the value of -1 for unlimited.
_acctSID Pseudo-attribute used to transfer the "objectSid" value from Active Directory.
_acctSAM Pseudo-attribute used to transfer the "sAMAccountName" value from Active Directory.
See Account attributes for more information about configuring account attributes.
