1NET(8)                    System Administration tools                   NET(8)
2
3
4

NAME

6       net - Tool for administration of Samba and remote CIFS servers.
7

SYNOPSIS

9       net {<ads|rap|rpc>} [-h|--help] [-w|--workgroup workgroup]
10        [-W|--myworkgroup myworkgroup] [-U|--user user]
11        [-I|--ipaddress ip-address] [-p|--port port] [-n myname] [-s conffile]
12        [-S|--server server] [-l|--long] [-v|--verbose] [-f|--force]
13        [-P|--machine-pass] [-d debuglevel] [-V] [--request-timeout seconds]
14        [-t|--timeout seconds] [-i|--stdin] [--tallocreport]
15

DESCRIPTION

17       This tool is part of the samba(7) suite.
18
19       The Samba net utility is meant to work just like the net utility
20       available for windows and DOS. The first argument should be used to
21       specify the protocol to use when executing a certain command. ADS is
22       used for ActiveDirectory, RAP is using for old (Win9x/NT3) clients and
23       RPC can be used for NT4 and Windows 2000. If this argument is omitted,
24       net will try to determine it automatically. Not all commands are
25       available on all protocols.
26

OPTIONS

28       -?|--help
29           Print a summary of command line options.
30
31       -k|--kerberos
32           Try to authenticate with kerberos. Only useful in an Active
33           Directory environment.
34
35       -w|--workgroup target-workgroup
36           Sets target workgroup or domain. You have to specify either this
37           option or the IP address or the name of a server.
38
39       -W|--myworkgroup workgroup
40           Sets client workgroup or domain
41
42       -U|--user user
43           User name to use
44
45       -I|--ipaddress ip-address
46           IP address of target server to use. You have to specify either this
47           option or a target workgroup or a target server.
48
49       -p|--port port
50           Port on the target server to connect to (usually 139 or 445).
51           Defaults to trying 445 first, then 139.
52
53       -n|--netbiosname <primary NetBIOS name>
54           This option allows you to override the NetBIOS name that Samba uses
55           for itself. This is identical to setting the netbios name parameter
56           in the smb.conf file. However, a command line setting will take
57           precedence over settings in smb.conf.
58
59       -s|--configfile=<configuration file>
60           The file specified contains the configuration details required by
61           the server. The information in this file includes server-specific
62           information such as what printcap file to use, as well as
63           descriptions of all the services that the server is to provide. See
64           smb.conf for more information. The default configuration file name
65           is determined at compile time.
66
67       -S|--server server
68           Name of target server. You should specify either this option or a
69           target workgroup or a target IP address.
70
71       -l|--long
72           When listing data, give more information on each item.
73
74       -v|--verbose
75           When listing data, give more verbose information on each item.
76
77       -f|--force
78           Enforcing a net command.
79
80       -P|--machine-pass
81           Make queries to the external server using the machine account of
82           the local server.
83
84       --request-timeout 30
85           Let client requests timeout after 30 seconds the default is 10
86           seconds.
87
88       -t|--timeout 30
89           Set timeout for client operations to 30 seconds.
90
91       --use-ccache
92           Try to use the credentials cached by winbind.
93
94       -i|--stdin
95           Take input for net commands from standard input.
96
97       --tallocreport
98           Generate a talloc report while processing a net command.
99
100       -T|--test
101           Only test command sequence, dry-run.
102
103       -F|--flags FLAGS
104           Pass down integer flags to a net subcommand.
105
106       -C|--comment COMMENT
107           Pass down a comment string to a net subcommand.
108
109       -n|--myname MYNAME
110           Use MYNAME as a requester name for a net subcommand.
111
112       -c|--container CONTAINER
113           Use a specific AD container for net ads operations.
114
115       -M|--maxusers MAXUSERS
116           Fill in the maxusers field in net rpc share operations.
117
118       -r|--reboot
119           Reboot a remote machine after a command has been successfully
120           executed (e.g. in remote join operations).
121
122       --force-full-repl
123           When calling "net rpc vampire keytab" this option enforces a full
124           re-creation of the generated keytab file.
125
126       --single-obj-repl
127           When calling "net rpc vampire keytab" this option allows to
128           replicate just a single object to the generated keytab file.
129
130       --clean-old-entries
131           When calling "net rpc vampire keytab" this option allows to cleanup
132           old entries from the generated keytab file.
133
134       --db
135           Define dbfile for "net idmap" commands.
136
137       --lock
138           Activates locking of the dbfile for "net idmap check" command.
139
140       -a|--auto
141           Activates noninteractive mode in "net idmap check".
142
143       --repair
144           Activates repair mode in "net idmap check".
145
146       --acls
147           Includes ACLs to be copied in "net rpc share migrate".
148
149       --attrs
150           Includes file attributes to be copied in "net rpc share migrate".
151
152       --timestamps
153           Includes timestamps to be copied in "net rpc share migrate".
154
155       -X|--exclude DIRECTORY
156           Allows to exclude directories when copying with "net rpc share
157           migrate".
158
159       --destination SERVERNAME
160           Defines the target servername of migration process (defaults to
161           localhost).
162
163       -L|--local
164           Sets the type of group mapping to local (used in "net groupmap
165           set").
166
167       -D|--domain
168           Sets the type of group mapping to domain (used in "net groupmap
169           set").
170
171       -N|--ntname NTNAME
172           Sets the ntname of a group mapping (used in "net groupmap set").
173
174       -R|--rid RID
175           Sets the rid of a group mapping (used in "net groupmap set").
176
177       --reg-version REG_VERSION
178           Assume database version {n|1,2,3} (used in "net registry check").
179
180       -o|--output FILENAME
181           Output database file (used in "net registry check").
182
183       --wipe
184           Createa a new database from scratch (used in "net registry check").
185
186       --precheck PRECHECK_DB_FILENAME
187           Defines filename for database prechecking (used in "net registry
188           import").
189
190       -e|--encrypt
191           This command line parameter requires the remote server support the
192           UNIX extensions or that the SMB3 protocol has been selected.
193           Requests that the connection be encrypted. Negotiates SMB
194           encryption using either SMB3 or POSIX extensions via GSSAPI. Uses
195           the given credentials for the encryption negotiation (either
196           kerberos or NTLMv1/v2 if given domain/username/password triple.
197           Fails the connection if encryption cannot be negotiated.
198
199       -d|--debuglevel=level
200           level is an integer from 0 to 10. The default value if this
201           parameter is not specified is 1.
202
203           The higher this value, the more detail will be logged to the log
204           files about the activities of the server. At level 0, only critical
205           errors and serious warnings will be logged. Level 1 is a reasonable
206           level for day-to-day running - it generates a small amount of
207           information about operations carried out.
208
209           Levels above 1 will generate considerable amounts of log data, and
210           should only be used when investigating a problem. Levels above 3
211           are designed for use only by developers and generate HUGE amounts
212           of log data, most of which is extremely cryptic.
213
214           Note that specifying this parameter here will override the log
215           level parameter in the smb.conf file.
216
217       -V|--version
218           Prints the program version number.
219
220       -s|--configfile=<configuration file>
221           The file specified contains the configuration details required by
222           the server. The information in this file includes server-specific
223           information such as what printcap file to use, as well as
224           descriptions of all the services that the server is to provide. See
225           smb.conf for more information. The default configuration file name
226           is determined at compile time.
227
228       -l|--log-basename=logdirectory
229           Base directory name for log/debug files. The extension ".progname"
230           will be appended (e.g. log.smbclient, log.smbd, etc...). The log
231           file is never removed by the client.
232
233       --option=<name>=<value>
234           Set the smb.conf(5) option "<name>" to value "<value>" from the
235           command line. This overrides compiled-in defaults and options read
236           from the configuration file.
237

COMMANDS

239   CHANGESECRETPW
240       This command allows the Samba machine account password to be set from
241       an external application to a machine account password that has already
242       been stored in Active Directory. DO NOT USE this command unless you
243       know exactly what you are doing. The use of this command requires that
244       the force flag (-f) be used also. There will be NO command prompt.
245       Whatever information is piped into stdin, either by typing at the
246       command line or otherwise, will be stored as the literal machine
247       password. Do NOT use this without care and attention as it will
248       overwrite a legitimate machine password without warning. YOU HAVE BEEN
249       WARNED.
250
251   TIME
252       The NET TIME command allows you to view the time on a remote server or
253       synchronise the time on the local server with the time on the remote
254       server.
255
256   TIME
257       Without any options, the NET TIME command displays the time on the
258       remote server. The remote server must be specified with the -S option.
259
260   TIME SYSTEM
261       Displays the time on the remote server in a format ready for /bin/date.
262       The remote server must be specified with the -S option.
263
264   TIME SET
265       Tries to set the date and time of the local server to that on the
266       remote server using /bin/date. The remote server must be specified with
267       the -S option.
268
269   TIME ZONE
270       Displays the timezone in hours from GMT on the remote server. The
271       remote server must be specified with the -S option.
272
273   [RPC|ADS] JOIN [TYPE] [-U username[%password]] [createupn=UPN]
274       [createcomputer=OU] [machinepass=PASS] [osName=string osVer=string]
275       [options]
276       Join a domain. If the account already exists on the server, and [TYPE]
277       is MEMBER, the machine will attempt to join automatically. (Assuming
278       that the machine has been created in server manager) Otherwise, a
279       password will be prompted for, and a new account may be created.
280
281       [TYPE] may be PDC, BDC or MEMBER to specify the type of server joining
282       the domain.
283
284       [UPN] (ADS only) set the principalname attribute during the join. The
285       default format is host/netbiosname@REALM.
286
287       [OU] (ADS only) Precreate the computer account in a specific OU. The OU
288       string reads from top to bottom without RDNs, and is delimited by a
289       ´/´. Please note that ´\´ is used for escape by both the shell and
290       ldap, so it may need to be doubled or quadrupled to pass through, and
291       it is not used as a delimiter.
292
293       [PASS] (ADS only) Set a specific password on the computer account being
294       created by the join.
295
296       [osName=string osVer=String] (ADS only) Set the operatingSystem and
297       operatingSystemVersion attribute during the join. Both parameters must
298       be specified for either to take effect.
299
300   [RPC] OLDJOIN [options]
301       Join a domain. Use the OLDJOIN option to join the domain using the old
302       style of domain joining - you need to create a trust account in server
303       manager first.
304
305   [RPC|ADS] USER
306   [RPC|ADS] USER
307       List all users
308
309   [RPC|ADS] USER DELETE target
310       Delete specified user
311
312   [RPC|ADS] USER INFO target
313       List the domain groups of the specified user.
314
315   [RPC|ADS] USER RENAME oldname newname
316       Rename specified user.
317
318   [RPC|ADS] USER ADD name [password] [-F user flags] [-C comment]
319       Add specified user.
320
321   [RPC|ADS] GROUP
322   [RPC|ADS] GROUP [misc options] [targets]
323       List user groups.
324
325   [RPC|ADS] GROUP DELETE name [misc. options]
326       Delete specified group.
327
328   [RPC|ADS] GROUP ADD name [-C comment]
329       Create specified group.
330
331   [RAP|RPC] SHARE
332   [RAP|RPC] SHARE [misc. options] [targets]
333       Enumerates all exported resources (network shares) on target server.
334
335   [RAP|RPC] SHARE ADD name=serverpath [-C comment] [-M maxusers] [targets]
336       Adds a share from a server (makes the export active). Maxusers
337       specifies the number of users that can be connected to the share
338       simultaneously.
339
340   SHARE DELETE sharename
341       Delete specified share.
342
343   [RPC|RAP] FILE
344   [RPC|RAP] FILE
345       List all open files on remote server.
346
347   [RPC|RAP] FILE CLOSE fileid
348       Close file with specified fileid on remote server.
349
350   [RPC|RAP] FILE INFO fileid
351       Print information on specified fileid. Currently listed are: file-id,
352       username, locks, path, permissions.
353
354   [RAP|RPC] FILE USER user
355       List files opened by specified user. Please note that net rap file user
356       does not work against Samba servers.
357
358   SESSION
359   RAP SESSION
360       Without any other options, SESSION enumerates all active SMB/CIFS
361       sessions on the target server.
362
363   RAP SESSION DELETE|CLOSE CLIENT_NAME
364       Close the specified sessions.
365
366   RAP SESSION INFO CLIENT_NAME
367       Give a list with all the open files in specified session.
368
369   RAP SERVER DOMAIN
370       List all servers in specified domain or workgroup. Defaults to local
371       domain.
372
373   RAP DOMAIN
374       Lists all domains and workgroups visible on the current network.
375
376   RAP PRINTQ
377   RAP PRINTQ INFO QUEUE_NAME
378       Lists the specified print queue and print jobs on the server. If the
379       QUEUE_NAME is omitted, all queues are listed.
380
381   RAP PRINTQ DELETE JOBID
382       Delete job with specified id.
383
384   RAP VALIDATE user [password]
385       Validate whether the specified user can log in to the remote server. If
386       the password is not specified on the commandline, it will be prompted.
387
388           Note
389           Currently NOT implemented.
390
391   RAP GROUPMEMBER
392   RAP GROUPMEMBER LIST GROUP
393       List all members of the specified group.
394
395   RAP GROUPMEMBER DELETE GROUP USER
396       Delete member from group.
397
398   RAP GROUPMEMBER ADD GROUP USER
399       Add member to group.
400
401   RAP ADMIN command
402       Execute the specified command on the remote server. Only works with
403       OS/2 servers.
404
405           Note
406           Currently NOT implemented.
407
408   RAP SERVICE
409   RAP SERVICE START NAME [arguments...]
410       Start the specified service on the remote server. Not implemented yet.
411
412           Note
413           Currently NOT implemented.
414
415   RAP SERVICE STOP
416       Stop the specified service on the remote server.
417
418           Note
419           Currently NOT implemented.
420
421   RAP PASSWORD USER OLDPASS NEWPASS
422       Change password of USER from OLDPASS to NEWPASS.
423
424   LOOKUP
425   LOOKUP HOST HOSTNAME [TYPE]
426       Lookup the IP address of the given host with the specified type
427       (netbios suffix). The type defaults to 0x20 (workstation).
428
429   LOOKUP LDAP [DOMAIN]
430       Give IP address of LDAP server of specified DOMAIN. Defaults to local
431       domain.
432
433   LOOKUP KDC [REALM]
434       Give IP address of KDC for the specified REALM. Defaults to local
435       realm.
436
437   LOOKUP DC [DOMAIN]
438       Give IP´s of Domain Controllers for specified
439        DOMAIN. Defaults to local domain.
440
441   LOOKUP MASTER DOMAIN
442       Give IP of master browser for specified DOMAIN or workgroup. Defaults
443       to local domain.
444
445   CACHE
446       Samba uses a general caching interface called ´gencache´. It can be
447       controlled using ´NET CACHE´.
448
449       All the timeout parameters support the suffixes:
450           s - Seconds
451           m - Minutes
452           h - Hours
453           d - Days
454           w - Weeks
455
456   CACHE ADD key data time-out
457       Add specified key+data to the cache with the given timeout.
458
459   CACHE DEL key
460       Delete key from the cache.
461
462   CACHE SET key data time-out
463       Update data of existing cache entry.
464
465   CACHE SEARCH PATTERN
466       Search for the specified pattern in the cache data.
467
468   CACHE LIST
469       List all current items in the cache.
470
471   CACHE FLUSH
472       Remove all the current items from the cache.
473
474   GETLOCALSID [DOMAIN]
475       Prints the SID of the specified domain, or if the parameter is omitted,
476       the SID of the local server.
477
478   SETLOCALSID S-1-5-21-x-y-z
479       Sets SID for the local server to the specified SID.
480
481   GETDOMAINSID
482       Prints the local machine SID and the SID of the current domain.
483
484   SETDOMAINSID
485       Sets the SID of the current domain.
486
487   GROUPMAP
488       Manage the mappings between Windows group SIDs and UNIX groups. Common
489       options include:
490
491       ·   unixgroup - Name of the UNIX group
492
493       ·   ntgroup - Name of the Windows NT group (must be resolvable to a SID
494
495       ·   rid - Unsigned 32-bit integer
496
497       ·   sid - Full SID in the form of "S-1-..."
498
499       ·   type - Type of the group; either ´domain´, ´local´, or ´builtin´
500
501       ·   comment - Freeform text description of the group
502
503
504   GROUPMAP ADD
505       Add a new group mapping entry:
506
507           net groupmap add {rid=int|sid=string} unixgroup=string \
508                [type={domain|local}] [ntgroup=string] [comment=string]
509
510
511
512   GROUPMAP DELETE
513       Delete a group mapping entry. If more than one group name matches, the
514       first entry found is deleted.
515
516       net groupmap delete {ntgroup=string|sid=SID}
517
518   GROUPMAP MODIFY
519       Update an existing group entry.
520
521           net groupmap modify {ntgroup=string|sid=SID} [unixgroup=string] \
522                  [comment=string] [type={domain|local}]
523
524
525
526   GROUPMAP LIST
527       List existing group mapping entries.
528
529       net groupmap list [verbose] [ntgroup=string] [sid=SID]
530
531   MAXRID
532       Prints out the highest RID currently in use on the local server (by the
533       active ´passdb backend´).
534
535   RPC INFO
536       Print information about the domain of the remote server, such as domain
537       name, domain sid and number of users and groups.
538
539   [RPC|ADS] TESTJOIN
540       Check whether participation in a domain is still valid.
541
542   [RPC|ADS] CHANGETRUSTPW
543       Force change of domain trust password.
544
545   RPC TRUSTDOM
546   RPC TRUSTDOM ADD DOMAIN
547       Add a interdomain trust account for DOMAIN. This is in fact a Samba
548       account named DOMAIN$ with the account flag ´I´ (interdomain trust
549       account). This is required for incoming trusts to work. It makes Samba
550       be a trusted domain of the foreign (trusting) domain. Users of the
551       Samba domain will be made available in the foreign domain. If the
552       command is used against localhost it has the same effect as smbpasswd
553       -a -i DOMAIN. Please note that both commands expect a appropriate UNIX
554       account.
555
556   RPC TRUSTDOM DEL DOMAIN
557       Remove interdomain trust account for DOMAIN. If it is used against
558       localhost it has the same effect as smbpasswd -x DOMAIN$.
559
560   RPC TRUSTDOM ESTABLISH DOMAIN
561       Establish a trust relationship to a trusted domain. Interdomain account
562       must already be created on the remote PDC. This is required for
563       outgoing trusts to work. It makes Samba be a trusting domain of a
564       foreign (trusted) domain. Users of the foreign domain will be made
565       available in our domain. You´ll need winbind and a working idmap config
566       to make them appear in your system.
567
568   RPC TRUSTDOM REVOKE DOMAIN
569       Abandon relationship to trusted domain
570
571   RPC TRUSTDOM LIST
572       List all interdomain trust relationships.
573
574   RPC TRUST
575   RPC TRUST CREATE
576       Create a trust object by calling lsaCreateTrustedDomainEx2. The can be
577       done on a single server or on two servers at once with the possibility
578       to use a random trust password.
579
580       Options:
581
582       otherserver
583           Domain controller of the second domain
584
585       otheruser
586           Admin user in the second domain
587
588       otherdomainsid
589           SID of the second domain
590
591       other_netbios_domain
592           NetBIOS (short) name of the second domain
593
594       otherdomain
595           DNS (full) name of the second domain
596
597       trustpw
598           Trust password
599
600       Examples:
601
602       Create a trust object on srv1.dom1.dom for the domain dom2
603
604               net rpc trust create \
605                   otherdomainsid=S-x-x-xx-xxxxxxxxxx-xxxxxxxxxx-xxxxxxxxx \
606                   other_netbios_domain=dom2 \
607                   otherdomain=dom2.dom \
608                   trustpw=12345678 \
609                   -S srv1.dom1.dom
610
611       Create a trust relationship between dom1 and dom2
612
613               net rpc trust create \
614                   otherserver=srv2.dom2.test \
615                   otheruser=dom2adm \
616                   -S srv1.dom1.dom
617
618   RPC TRUST DELETE
619       Delete a trust object by calling lsaDeleteTrustedDomain. The can be
620       done on a single server or on two servers at once.
621
622       Options:
623
624       otherserver
625           Domain controller of the second domain
626
627       otheruser
628           Admin user in the second domain
629
630       otherdomainsid
631           SID of the second domain
632
633       Examples:
634
635       Delete a trust object on srv1.dom1.dom for the domain dom2
636
637               net rpc trust delete \
638                   otherdomainsid=S-x-x-xx-xxxxxxxxxx-xxxxxxxxxx-xxxxxxxxx \
639                   -S srv1.dom1.dom
640
641       Delete a trust relationship between dom1 and dom2
642
643               net rpc trust delete \
644                   otherserver=srv2.dom2.test \
645                   otheruser=dom2adm \
646                   -S srv1.dom1.dom
647
648
649   RPC RIGHTS
650       This subcommand is used to view and manage Samba´s rights assignments
651       (also referred to as privileges). There are three options currently
652       available: list, grant, and revoke. More details on Samba´s privilege
653       model and its use can be found in the Samba-HOWTO-Collection.
654
655   RPC ABORTSHUTDOWN
656       Abort the shutdown of a remote server.
657
658   RPC SHUTDOWN [-t timeout] [-r] [-f] [-C message]
659       Shut down the remote server.
660
661       -r
662           Reboot after shutdown.
663
664       -f
665           Force shutting down all applications.
666
667       -t timeout
668           Timeout before system will be shut down. An interactive user of the
669           system can use this time to cancel the shutdown.
670
671       -C message
672           Display the specified message on the screen to announce the
673           shutdown.
674
675   RPC SAMDUMP
676       Print out sam database of remote server. You need to run this against
677       the PDC, from a Samba machine joined as a BDC.
678
679   RPC VAMPIRE
680       Export users, aliases and groups from remote server to local server.
681       You need to run this against the PDC, from a Samba machine joined as a
682       BDC. This vampire command cannot be used against an Active Directory,
683       only against an NT4 Domain Controller.
684
685   RPC VAMPIRE KEYTAB
686       Dump remote SAM database to local Kerberos keytab file.
687
688   RPC VAMPIRE LDIF
689       Dump remote SAM database to local LDIF file or standard output.
690
691   RPC GETSID
692       Fetch domain SID and store it in the local secrets.tdb (or
693       secrets.ntdb).
694
695   ADS LEAVE
696       Make the remote host leave the domain it is part of.
697
698   ADS STATUS
699       Print out status of machine account of the local machine in ADS. Prints
700       out quite some debug info. Aimed at developers, regular users should
701       use NET ADS TESTJOIN.
702
703   ADS PRINTER
704   ADS PRINTER INFO [PRINTER] [SERVER]
705       Lookup info for PRINTER on SERVER. The printer name defaults to "*",
706       the server name defaults to the local host.
707
708   ADS PRINTER PUBLISH PRINTER
709       Publish specified printer using ADS.
710
711   ADS PRINTER REMOVE PRINTER
712       Remove specified printer from ADS directory.
713
714   ADS SEARCH EXPRESSION ATTRIBUTES...
715       Perform a raw LDAP search on a ADS server and dump the results. The
716       expression is a standard LDAP search expression, and the attributes are
717       a list of LDAP fields to show in the results.
718
719       Example: net ads search ´(objectCategory=group)´ sAMAccountName
720
721   ADS DN DN (attributes)
722       Perform a raw LDAP search on a ADS server and dump the results. The DN
723       standard LDAP DN, and the attributes are a list of LDAP fields to show
724       in the result.
725
726       Example: net ads dn ´CN=administrator,CN=Users,DC=my,DC=domain´
727       SAMAccountName
728
729   ADS WORKGROUP
730       Print out workgroup name for specified kerberos realm.
731
732   ADS ENCTYPES
733       List, modify or delete the value of the "msDS-SupportedEncryptionTypes"
734       attribute of an account in AD.
735
736       This attribute allows to control which Kerberos encryption types are
737       used for the generation of initial and service tickets. The value
738       consists of an integer bitmask with the following values:
739
740       0x00000001 DES-CBC-CRC
741
742       0x00000002 DES-CBC-MD5
743
744       0x00000004 RC4-HMAC
745
746       0x00000008 AES128-CTS-HMAC-SHA1-96
747
748       0x00000010 AES256-CTS-HMAC-SHA1-96
749
750   ADS ENCTYPES LIST <ACCOUNTNAME>
751       List the value of the "msDS-SupportedEncryptionTypes" attribute of a
752       given account.
753
754       Example: net ads enctypes list Computername
755
756   ADS ENCTYPES SET <ACCOUNTNAME> [enctypes]
757       Set the value of the "msDS-SupportedEncryptionTypes" attribute of the
758       LDAP object of ACCOUNTNAME to a given value. If the value is ommitted,
759       the value is set to 31 which enables all the currently supported
760       encryption types.
761
762       Example: net ads enctypes set Computername 24
763
764   ADS ENCTYPES DELETE <ACCOUNTNAME>
765       Deletes the "msDS-SupportedEncryptionTypes" attribute of the LDAP
766       object of ACCOUNTNAME.
767
768       Example: net ads enctypes set Computername 24
769
770   SAM CREATEBUILTINGROUP <NAME>
771       (Re)Create a BUILTIN group. Only a wellknown set of BUILTIN groups can
772       be created with this command. This is the list of currently recognized
773       group names: Administrators, Users, Guests, Power Users, Account
774       Operators, Server Operators, Print Operators, Backup Operators,
775       Replicator, RAS Servers, Pre-Windows 2000 compatible Access. This
776       command requires a running Winbindd with idmap allocation properly
777       configured. The group gid will be allocated out of the winbindd range.
778
779   SAM CREATELOCALGROUP <NAME>
780       Create a LOCAL group (also known as Alias). This command requires a
781       running Winbindd with idmap allocation properly configured. The group
782       gid will be allocated out of the winbindd range.
783
784   SAM DELETELOCALGROUP <NAME>
785       Delete an existing LOCAL group (also known as Alias).
786
787   SAM MAPUNIXGROUP <NAME>
788       Map an existing Unix group and make it a Domain Group, the domain group
789       will have the same name.
790
791   SAM UNMAPUNIXGROUP <NAME>
792       Remove an existing group mapping entry.
793
794   SAM ADDMEM <GROUP> <MEMBER>
795       Add a member to a Local group. The group can be specified only by name,
796       the member can be specified by name or SID.
797
798   SAM DELMEM <GROUP> <MEMBER>
799       Remove a member from a Local group. The group and the member must be
800       specified by name.
801
802   SAM LISTMEM <GROUP>
803       List Local group members. The group must be specified by name.
804
805   SAM LIST <users|groups|localgroups|builtin|workstations> [verbose]
806       List the specified set of accounts by name. If verbose is specified,
807       the rid and description is also provided for each account.
808
809   SAM RIGHTS LIST
810       List all available privileges.
811
812   SAM RIGHTS GRANT <NAME> <PRIVILEGE>
813       Grant one or more privileges to a user.
814
815   SAM RIGHTS REVOKE <NAME> <PRIVILEGE>
816       Revoke one or more privileges from a user.
817
818   SAM SHOW <NAME>
819       Show the full DOMAIN\\NAME the SID and the type for the corresponding
820       account.
821
822   SAM SET HOMEDIR <NAME> <DIRECTORY>
823       Set the home directory for a user account.
824
825   SAM SET PROFILEPATH <NAME> <PATH>
826       Set the profile path for a user account.
827
828   SAM SET COMMENT <NAME> <COMMENT>
829       Set the comment for a user or group account.
830
831   SAM SET FULLNAME <NAME> <FULL NAME>
832       Set the full name for a user account.
833
834   SAM SET LOGONSCRIPT <NAME> <SCRIPT>
835       Set the logon script for a user account.
836
837   SAM SET HOMEDRIVE <NAME> <DRIVE>
838       Set the home drive for a user account.
839
840   SAM SET WORKSTATIONS <NAME> <WORKSTATIONS>
841       Set the workstations a user account is allowed to log in from.
842
843   SAM SET DISABLE <NAME>
844       Set the "disabled" flag for a user account.
845
846   SAM SET PWNOTREQ <NAME>
847       Set the "password not required" flag for a user account.
848
849   SAM SET AUTOLOCK <NAME>
850       Set the "autolock" flag for a user account.
851
852   SAM SET PWNOEXP <NAME>
853       Set the "password do not expire" flag for a user account.
854
855   SAM SET PWDMUSTCHANGENOW <NAME> [yes|no]
856       Set or unset the "password must change" flag for a user account.
857
858   SAM POLICY LIST
859       List the available account policies.
860
861   SAM POLICY SHOW <account policy>
862       Show the account policy value.
863
864   SAM POLICY SET <account policy> <value>
865       Set a value for the account policy. Valid values can be: "forever",
866       "never", "off", or a number.
867
868   SAM PROVISION
869       Only available if ldapsam:editposix is set and winbindd is running.
870       Properly populates the ldap tree with the basic accounts
871       (Administrator) and groups (Domain Users, Domain Admins, Domain Guests)
872       on the ldap tree.
873
874   IDMAP DUMP <local tdb file name>
875       Dumps the mappings contained in the local tdb file specified. This
876       command is useful to dump only the mappings produced by the idmap_tdb
877       backend.
878
879   IDMAP RESTORE [input file]
880       Restore the mappings from the specified file or stdin.
881
882   IDMAP SET SECRET <DOMAIN> <secret>
883       Store a secret for the specified domain, used primarily for domains
884       that use idmap_ldap as a backend. In this case the secret is used as
885       the password for the user DN used to bind to the ldap server.
886
887   IDMAP SET RANGE <RANGE> <SID> [index] [--db=<DB>]
888       Store a domain-range mapping for a given domain (and index) in autorid
889       database.
890
891   IDMAP SET CONFIG <config> [--db=<DB>]
892       Update CONFIG entry in autorid database.
893
894   IDMAP GET RANGE <SID> [index] [--db=<DB>]
895       Get the range for a given domain and index from autorid database.
896
897   IDMAP GET RANGES [<SID>] [--db=<DB>]
898       Get ranges for all domains or for one identified by given SID.
899
900   IDMAP GET CONFIG [--db=<DB>]
901       Get CONFIG entry from autorid database.
902
903   IDMAP DELETE MAPPING [-f] [--db=<DB>] <ID>
904       Delete a mapping sid <-> gid or sid <-> uid from the IDMAP database.
905       The mapping is given by <ID> which may either be a sid: S-x-..., a gid:
906       "GID number" or a uid: "UID number". Use -f to delete an invalid
907       partial mapping <ID> -> xx
908
909       Use "smbcontrol all idmap ..." to notify running smbd instances. See
910       the smbcontrol(1) manpage for details.
911
912   IDMAP DELETE RANGE [-f] [--db=<TDB>] <RANGE>|(<SID> [<INDEX>])
913       Delete a domain range mapping identified by ´RANGE´ or "domain SID and
914       INDEX" from autorid database. Use -f to delete invalid mappings.
915
916   IDMAP DELETE RANGES [-f] [--db=<TDB>] <SID>
917       Delete all domain range mappings for a domain identified by SID. Use -f
918       to delete invalid mappings.
919
920   IDMAP CHECK [-v] [-r] [-a] [-T] [-f] [-l] [--db=<DB>]
921       Check and repair the IDMAP database. If no option is given a read only
922       check of the database is done. Among others an interactive or automatic
923       repair mode may be chosen with one of the following options:
924
925       -r|--repair
926           Interactive repair mode, ask a lot of questions.
927
928       -a|--auto
929           Noninteractive repair mode, use default answers.
930
931       -v|--verbose
932           Produce more output.
933
934       -f|--force
935           Try to apply changes, even if they do not apply cleanly.
936
937       -T|--test
938           Dry run, show what changes would be made but don´t touch anything.
939
940       -l|--lock
941           Lock the database while doing the check.
942
943       --db <DB>
944           Check the specified database.
945
946       It reports about the finding of the following errors:
947
948       Missing reverse mapping:
949           A record with mapping A->B where there is no B->A. Default action
950           in repair mode is to "fix" this by adding the reverse mapping.
951
952       Invalid mapping:
953           A record with mapping A->B where B->C. Default action is to
954           "delete" this record.
955
956       Missing or invalid HWM:
957           A high water mark is not at least equal to the largest ID in the
958           database. Default action is to "fix" this by setting it to the
959           largest ID found +1.
960
961       Invalid record:
962           Something we failed to parse. Default action is to "edit" it in
963           interactive and "delete" it in automatic mode.
964
965   USERSHARE
966       Starting with version 3.0.23, a Samba server now supports the ability
967       for non-root users to add user defined shares to be exported using the
968       "net usershare" commands.
969
970       To set this up, first set up your smb.conf by adding to the [global]
971       section: usershare path = /usr/local/samba/lib/usershares Next create
972       the directory /usr/local/samba/lib/usershares, change the owner to root
973       and set the group owner to the UNIX group who should have the ability
974       to create usershares, for example a group called "serverops". Set the
975       permissions on /usr/local/samba/lib/usershares to 01770. (Owner and
976       group all access, no access for others, plus the sticky bit, which
977       means that a file in that directory can be renamed or deleted only by
978       the owner of the file). Finally, tell smbd how many usershares you will
979       allow by adding to the [global] section of smb.conf a line such as :
980       usershare max shares = 100. To allow 100 usershare definitions. Now,
981       members of the UNIX group "serverops" can create user defined shares on
982       demand using the commands below.
983
984       The usershare commands are:
985           net usershare add sharename path [comment [acl] [guest_ok=[y|n]]] -
986           to add or change a user defined share.
987           net usershare delete sharename - to delete a user defined share.
988           net usershare info [-l|--long] [wildcard sharename] - to print info
989           about a user defined share.
990           net usershare list [-l|--long] [wildcard sharename] - to list user
991           defined shares.
992
993   USERSHARE ADD sharename path [comment] [acl] [guest_ok=[y|n]]
994       Add or replace a new user defined share, with name "sharename".
995
996       "path" specifies the absolute pathname on the system to be exported.
997       Restrictions may be put on this, see the global smb.conf parameters:
998       "usershare owner only", "usershare prefix allow list", and "usershare
999       prefix deny list".
1000
1001       The optional "comment" parameter is the comment that will appear on the
1002       share when browsed to by a client.
1003
1004       The optional "acl" field specifies which users have read and write
1005       access to the entire share. Note that guest connections are not allowed
1006       unless the smb.conf parameter "usershare allow guests" has been set.
1007       The definition of a user defined share acl is: "user:permission", where
1008       user is a valid username on the system and permission can be "F", "R",
1009       or "D". "F" stands for "full permissions", ie. read and write
1010       permissions. "D" stands for "deny" for a user, ie. prevent this user
1011       from accessing this share. "R" stands for "read only", ie. only allow
1012       read access to this share (no creation of new files or directories or
1013       writing to files).
1014
1015       The default if no "acl" is given is "Everyone:R", which means any
1016       authenticated user has read-only access.
1017
1018       The optional "guest_ok" has the same effect as the parameter of the
1019       same name in smb.conf, in that it allows guest access to this user
1020       defined share. This parameter is only allowed if the global parameter
1021       "usershare allow guests" has been set to true in the smb.conf.
1022
1023
1024       There is no separate command to modify an existing user defined share,
1025       just use the "net usershare add [sharename]" command using the same
1026       sharename as the one you wish to modify and specify the new options you
1027       wish. The Samba smbd daemon notices user defined share modifications at
1028       connect time so will see the change immediately, there is no need to
1029       restart smbd on adding, deleting or changing a user defined share.
1030
1031   USERSHARE DELETE sharename
1032       Deletes the user defined share by name. The Samba smbd daemon
1033       immediately notices this change, although it will not disconnect any
1034       users currently connected to the deleted share.
1035
1036   USERSHARE INFO [-l|--long] [wildcard sharename]
1037       Get info on user defined shares owned by the current user matching the
1038       given pattern, or all users.
1039
1040       net usershare info on its own dumps out info on the user defined shares
1041       that were created by the current user, or restricts them to share names
1042       that match the given wildcard pattern (´*´ matches one or more
1043       characters, ´?´ matches only one character). If the ´-l´ or ´--long´
1044       option is also given, it prints out info on user defined shares created
1045       by other users.
1046
1047       The information given about a share looks like: [foobar]
1048       path=/home/jeremy comment=testme usershare_acl=Everyone:F guest_ok=n
1049       And is a list of the current settings of the user defined share that
1050       can be modified by the "net usershare add" command.
1051
1052   USERSHARE LIST [-l|--long] wildcard sharename
1053       List all the user defined shares owned by the current user matching the
1054       given pattern, or all users.
1055
1056       net usershare list on its own list out the names of the user defined
1057       shares that were created by the current user, or restricts the list to
1058       share names that match the given wildcard pattern (´*´ matches one or
1059       more characters, ´?´ matches only one character). If the ´-l´ or
1060       ´--long´ option is also given, it includes the names of user defined
1061       shares created by other users.
1062
1063   [RPC] CONF
1064       Starting with version 3.2.0, a Samba server can be configured by data
1065       stored in registry. This configuration data can be edited with the new
1066       "net conf" commands. There is also the possibility to configure a
1067       remote Samba server by enabling the RPC conf mode and specifying the
1068       address of the remote server.
1069
1070       The deployment of this configuration data can be activated in two
1071       levels from the smb.conf file: Share definitions from registry are
1072       activated by setting registry shares to “yes” in the [global] section
1073       and global configuration options are activated by setting include =
1074       registry in the [global] section for a mixed configuration or by
1075       setting config backend = registry in the [global] section for a
1076       registry-only configuration. See the smb.conf(5) manpage for details.
1077
1078       The conf commands are:
1079           net [rpc] conf list - Dump the complete configuration in smb.conf
1080           like format.
1081           net [rpc] conf import - Import configuration from file in smb.conf
1082           format.
1083           net [rpc] conf listshares - List the registry shares.
1084           net [rpc] conf drop - Delete the complete configuration from
1085           registry.
1086           net [rpc] conf showshare - Show the definition of a registry share.
1087           net [rpc] conf addshare - Create a new registry share.
1088           net [rpc] conf delshare - Delete a registry share.
1089           net [rpc] conf setparm - Store a parameter.
1090           net [rpc] conf getparm - Retrieve the value of a parameter.
1091           net [rpc] conf delparm - Delete a parameter.
1092           net [rpc] conf getincludes - Show the includes of a share
1093           definition.
1094           net [rpc] conf setincludes - Set includes for a share.
1095           net [rpc] conf delincludes - Delete includes from a share
1096           definition.
1097
1098   [RPC] CONF LIST
1099       Print the configuration data stored in the registry in a smb.conf-like
1100       format to standard output.
1101
1102   [RPC] CONF IMPORT [--test|-T] filename [section]
1103       This command imports configuration from a file in smb.conf format. If a
1104       section encountered in the input file is present in registry, its
1105       contents is replaced. Sections of registry configuration that have no
1106       counterpart in the input file are not affected. If you want to delete
1107       these, you will have to use the "net conf drop" or "net conf delshare"
1108       commands. Optionally, a section may be specified to restrict the effect
1109       of the import command to that specific section. A test mode is enabled
1110       by specifying the parameter "-T" on the commandline. In test mode, no
1111       changes are made to the registry, and the resulting configuration is
1112       printed to standard output instead.
1113
1114   [RPC] CONF LISTSHARES
1115       List the names of the shares defined in registry.
1116
1117   [RPC] CONF DROP
1118       Delete the complete configuration data from registry.
1119
1120   [RPC] CONF SHOWSHARE sharename
1121       Show the definition of the share or section specified. It is valid to
1122       specify "global" as sharename to retrieve the global configuration
1123       options from registry.
1124
1125   [RPC] CONF ADDSHARE sharename path [writeable={y|N} [guest_ok={y|N}
1126       [comment]]]
1127       Create a new share definition in registry. The sharename and path have
1128       to be given. The share name may not be "global". Optionally, values for
1129       the very common options "writeable", "guest ok" and a "comment" may be
1130       specified. The same result may be obtained by a sequence of "net conf
1131       setparm" commands.
1132
1133   [RPC] CONF DELSHARE sharename
1134       Delete a share definition from registry.
1135
1136   [RPC] CONF SETPARM section parameter value
1137       Store a parameter in registry. The section may be global or a
1138       sharename. The section is created if it does not exist yet.
1139
1140   [RPC] CONF GETPARM section parameter
1141       Show a parameter stored in registry.
1142
1143   [RPC] CONF DELPARM section parameter
1144       Delete a parameter stored in registry.
1145
1146   [RPC] CONF GETINCLUDES section
1147       Get the list of includes for the provided section (global or share).
1148
1149       Note that due to the nature of the registry database and the nature of
1150       include directives, the includes need special treatment: Parameters are
1151       stored in registry by the parameter name as valuename, so there is only
1152       ever one instance of a parameter per share. Also, a specific order like
1153       in a text file is not guaranteed. For all real parameters, this is
1154       perfectly ok, but the include directive is rather a meta parameter, for
1155       which, in the smb.conf text file, the place where it is specified
1156       between the other parameters is very important. This can not be
1157       achieved by the simple registry smbconf data model, so there is one
1158       ordered list of includes per share, and this list is evaluated after
1159       all the parameters of the share.
1160
1161       Further note that currently, only files can be included from registry
1162       configuration. In the future, there will be the ability to include
1163       configuration data from other registry keys.
1164
1165   [RPC] CONF SETINCLUDES section [filename]+
1166       Set the list of includes for the provided section (global or share) to
1167       the given list of one or more filenames. The filenames may contain the
1168       usual smb.conf macros like %I.
1169
1170   [RPC] CONF DELINCLUDES section
1171       Delete the list of includes from the provided section (global or
1172       share).
1173
1174   REGISTRY
1175       Manipulate Samba´s registry.
1176
1177       The registry commands are:
1178           net registry enumerate   - Enumerate registry keys and values.
1179           net registry enumerate_recursive - Enumerate registry key and its
1180           subkeys.
1181           net registry createkey   - Create a new registry key.
1182           net registry deletekey   - Delete a registry key.
1183           net registry deletekey_recursive - Delete a registry key with
1184           subkeys.
1185           net registry getvalue    - Print a registry value.
1186           net registry getvalueraw - Print a registry value (raw format).
1187           net registry setvalue    - Set a new registry value.
1188           net registry increment   - Increment a DWORD registry value under a
1189           lock.
1190           net registry deletevalue - Delete a registry value.
1191           net registry getsd       - Get security descriptor.
1192           net registry getsd_sdd1  - Get security descriptor in sddl format.
1193           net registry setsd_sdd1  - Set security descriptor from sddl format
1194           string.
1195           net registry import      - Import a registration entries (.reg)
1196           file.
1197           net registry export      - Export a registration entries (.reg)
1198           file.
1199           net registry convert     - Convert a registration entries (.reg)
1200           file.
1201           net registry check       - Check and repair a registry database.
1202
1203   REGISTRY ENUMERATE key
1204       Enumerate subkeys and values of key.
1205
1206   REGISTRY ENUMERATE_RECURSIVE key
1207       Enumerate values of key and its subkeys.
1208
1209   REGISTRY CREATEKEY key
1210       Create a new key if not yet existing.
1211
1212   REGISTRY DELETEKEY key
1213       Delete the given key and its values from the registry, if it has no
1214       subkeys.
1215
1216   REGISTRY DELETEKEY_RECURSIVE key
1217       Delete the given key and all of its subkeys and values from the
1218       registry.
1219
1220   REGISTRY GETVALUE key name
1221       Output type and actual value of the value name of the given key.
1222
1223   REGISTRY GETVALUERAW key name
1224       Output the actual value of the value name of the given key.
1225
1226   REGISTRY SETVALUE key name type value ...
1227       Set the value name of an existing key.  type may be one of sz, multi_sz
1228       or dword. In case of multi_sz value may be given multiple times.
1229
1230   REGISTRY INCREMENT key name [inc]
1231       Increment the DWORD value name of key by inc while holding a g_lock.
1232       inc defaults to 1.
1233
1234   REGISTRY DELETEVALUE key name
1235       Delete the value name of the given key.
1236
1237   REGISTRY GETSD key
1238       Get the security descriptor of the given key.
1239
1240   REGISTRY GETSD_SDDL key
1241       Get the security descriptor of the given key as a Security Descriptor
1242       Definition Language (SDDL) string.
1243
1244   REGISTRY SETSD_SDDL keysd
1245       Set the security descriptor of the given key from a Security Descriptor
1246       Definition Language (SDDL) string sd.
1247
1248   REGISTRY IMPORT file [--precheck <check-file>] [opt]
1249       Import a registration entries (.reg) file.
1250
1251       The following options are available:
1252
1253       --precheck check-file
1254           This is a mechanism to check the existence or non-existence of
1255           certain keys or values specified in a precheck file before applying
1256           the import file. The import file will only be applied if the
1257           precheck succeeds.
1258
1259           The check-file follows the normal registry file syntax with the
1260           following semantics:
1261
1262           ·   <value name>=<value> checks whether the value exists and has
1263               the given value.
1264
1265           ·   <value name>=- checks whether the value does not exist.
1266
1267           ·   [key] checks whether the key exists.
1268
1269           ·   [-key] checks whether the key does not exist.
1270
1271
1272   REGISTRY EXPORT keyfile[opt]
1273       Export a key to a registration entries (.reg) file.
1274
1275   REGISTRY CONVERT in out [[inopt] outopt]
1276       Convert a registration entries (.reg) file in.
1277
1278   REGISTRY CHECK [-ravTl] [-o <ODB>] [--wipe] [<DB>]
1279       Check and repair the registry database. If no option is given a read
1280       only check of the database is done. Among others an interactive or
1281       automatic repair mode may be chosen with one of the following options
1282
1283       -r|--repair
1284           Interactive repair mode, ask a lot of questions.
1285
1286       -a|--auto
1287           Noninteractive repair mode, use default answers.
1288
1289       -v|--verbose
1290           Produce more output.
1291
1292       -T|--test
1293           Dry run, show what changes would be made but don´t touch anything.
1294
1295       -l|--lock
1296           Lock the database while doing the check.
1297
1298       --reg-version={1,2,3}
1299           Specify the format of the registry database. If not given it
1300           defaults to the value of the binary or, if an registry.tdb is
1301           explizitly stated at the commandline, to the value found in the
1302           INFO/version record.
1303
1304       [--db] <DB>
1305           Check the specified database.
1306
1307       -o|--output <ODB>
1308           Create a new registry database <ODB> instead of modifying the
1309           input. If <ODB> is already existing --wipe may be used to overwrite
1310           it.
1311
1312       --wipe
1313           Replace the registry database instead of modifying the input or
1314           overwrite an existing output database.
1315
1316   EVENTLOG
1317       Starting with version 3.4.0 net can read, dump, import and export
1318       native win32 eventlog files (usually *.evt). evt files are used by the
1319       native Windows eventviewer tools.
1320
1321       The import and export of evt files can only succeed when eventlog list
1322       is used in smb.conf file. See the smb.conf(5) manpage for details.
1323
1324       The eventlog commands are:
1325           net eventlog dump - Dump a eventlog *.evt file on the screen.
1326           net eventlog import - Import a eventlog *.evt into the samba
1327           internal tdb based representation of eventlogs.
1328           net eventlog export - Export the samba internal tdb based
1329           representation of eventlogs into an eventlog *.evt file.
1330
1331   EVENTLOG DUMP filename
1332       Prints a eventlog *.evt file to standard output.
1333
1334   EVENTLOG IMPORT filename eventlog
1335       Imports a eventlog *.evt file defined by filename into the samba
1336       internal tdb representation of eventlog defined by eventlog.  eventlog
1337       needs to part of the eventlog list defined in smb.conf. See the
1338       smb.conf(5) manpage for details.
1339
1340   EVENTLOG EXPORT filename eventlog
1341       Exports the samba internal tdb representation of eventlog defined by
1342       eventlog to a eventlog *.evt file defined by filename.  eventlog needs
1343       to part of the eventlog list defined in smb.conf. See the smb.conf(5)
1344       manpage for details.
1345
1346   DOM
1347       Starting with version 3.2.0 Samba has support for remote join and
1348       unjoin APIs, both client and server-side. Windows supports remote join
1349       capabilities since Windows 2000.
1350
1351       In order for Samba to be joined or unjoined remotely an account must be
1352       used that is either member of the Domain Admins group, a member of the
1353       local Administrators group or a user that is granted the
1354       SeMachineAccountPrivilege privilege.
1355
1356       The client side support for remote join is implemented in the net dom
1357       commands which are:
1358           net dom join - Join a remote computer into a domain.
1359           net dom unjoin - Unjoin a remote computer from a domain.
1360           net dom renamecomputer - Renames a remote computer joined to a
1361           domain.
1362
1363   DOM JOIN  domain=DOMAIN ou=OU account=ACCOUNT password=PASSWORD reboot
1364       Joins a computer into a domain. This command supports the following
1365       additional parameters:
1366
1367       ·   DOMAIN can be a NetBIOS domain name (also known as short domain
1368           name) or a DNS domain name for Active Directory Domains. As in
1369           Windows, it is also possible to control which Domain Controller to
1370           use. This can be achieved by appending the DC name using the \
1371           separator character. Example: MYDOM\MYDC. The DOMAIN parameter
1372           cannot be NULL.
1373
1374       ·   OU can be set to a RFC 1779 LDAP DN, like
1375           ou=mymachines,cn=Users,dc=example,dc=com in order to create the
1376           machine account in a non-default LDAP container. This optional
1377           parameter is only supported when joining Active Directory Domains.
1378
1379       ·   ACCOUNT defines a domain account that will be used to join the
1380           machine to the domain. This domain account needs to have sufficient
1381           privileges to join machines.
1382
1383       ·   PASSWORD defines the password for the domain account defined with
1384           ACCOUNT.
1385
1386       ·   REBOOT is an optional parameter that can be set to reboot the
1387           remote machine after successful join to the domain.
1388
1389
1390       Note that you also need to use standard net parameters to connect and
1391       authenticate to the remote machine that you want to join. These
1392       additional parameters include: -S computer and -U user.
1393
1394       Example: net dom join -S xp -U XP\\administrator%secret domain=MYDOM
1395       account=MYDOM\\administrator password=topsecret reboot.
1396
1397       This example would connect to a computer named XP as the local
1398       administrator using password secret, and join the computer into a
1399       domain called MYDOM using the MYDOM domain administrator account and
1400       password topsecret. After successful join, the computer would reboot.
1401
1402   DOM UNJOIN account=ACCOUNT password=PASSWORD reboot
1403       Unjoins a computer from a domain. This command supports the following
1404       additional parameters:
1405
1406       ·   ACCOUNT defines a domain account that will be used to unjoin the
1407           machine from the domain. This domain account needs to have
1408           sufficient privileges to unjoin machines.
1409
1410       ·   PASSWORD defines the password for the domain account defined with
1411           ACCOUNT.
1412
1413       ·   REBOOT is an optional parameter that can be set to reboot the
1414           remote machine after successful unjoin from the domain.
1415
1416
1417       Note that you also need to use standard net parameters to connect and
1418       authenticate to the remote machine that you want to unjoin. These
1419       additional parameters include: -S computer and -U user.
1420
1421       Example: net dom unjoin -S xp -U XP\\administrator%secret
1422       account=MYDOM\\administrator password=topsecret reboot.
1423
1424       This example would connect to a computer named XP as the local
1425       administrator using password secret, and unjoin the computer from the
1426       domain using the MYDOM domain administrator account and password
1427       topsecret. After successful unjoin, the computer would reboot.
1428
1429   DOM RENAMECOMPUTER newname=NEWNAME account=ACCOUNT password=PASSWORD reboot
1430       Renames a computer that is joined to a domain. This command supports
1431       the following additional parameters:
1432
1433       ·   NEWNAME defines the new name of the machine in the domain.
1434
1435       ·   ACCOUNT defines a domain account that will be used to rename the
1436           machine in the domain. This domain account needs to have sufficient
1437           privileges to rename machines.
1438
1439       ·   PASSWORD defines the password for the domain account defined with
1440           ACCOUNT.
1441
1442       ·   REBOOT is an optional parameter that can be set to reboot the
1443           remote machine after successful rename in the domain.
1444
1445
1446       Note that you also need to use standard net parameters to connect and
1447       authenticate to the remote machine that you want to rename in the
1448       domain. These additional parameters include: -S computer and -U user.
1449
1450       Example: net dom renamecomputer -S xp -U XP\\administrator%secret
1451       newname=XPNEW account=MYDOM\\administrator password=topsecret reboot.
1452
1453       This example would connect to a computer named XP as the local
1454       administrator using password secret, and rename the joined computer to
1455       XPNEW using the MYDOM domain administrator account and password
1456       topsecret. After successful rename, the computer would reboot.
1457
1458   G_LOCK
1459       Manage global locks.
1460
1461   G_LOCK DO lockname timeout command
1462       Execute a shell command under a global lock. This might be useful to
1463       define the order in which several shell commands will be executed. The
1464       locking information is stored in a file called g_lock.tdb. In setups
1465       with CTDB running, the locking information will be available on all
1466       cluster nodes.
1467
1468       ·   LOCKNAME defines the name of the global lock.
1469
1470       ·   TIMEOUT defines the timeout.
1471
1472       ·   COMMAND defines the shell command to execute.
1473
1474   G_LOCK LOCKS
1475       Print a list of all currently existing locknames.
1476
1477   G_LOCK DUMP lockname
1478       Dump the locking table of a certain global lock.
1479
1480   HELP [COMMAND]
1481       Gives usage information for the specified command.
1482

VERSION

1484       This man page is complete for version 3 of the Samba suite.
1485

AUTHOR

1487       The original Samba software and related utilities were created by
1488       Andrew Tridgell. Samba is now developed by the Samba Team as an Open
1489       Source project similar to the way the Linux kernel is developed.
1490
1491       The net manpage was written by Jelmer Vernooij.
1492
1493
1494
1495Samba 4.2                         06/19/2018                            NET(8)
Impressum