2005-03-04 20:04:56 +03:00
<samba:parameter name= "ldapsam:trusted"
2015-05-01 00:32:45 +03:00
context="G"
type="string"
2005-03-13 01:41:20 +03:00
xmlns:samba="http://www.samba.org/samba/DTD/samba-doc">
2005-03-04 20:04:56 +03:00
<description >
2005-12-26 20:20:51 +03:00
<para >
By default, Samba as a Domain Controller with an LDAP backend needs to use the Unix-style NSS subsystem to
access user and group information. Due to the way Unix stores user information in /etc/passwd and /etc/group
this inevitably leads to inefficiencies. One important question a user needs to know is the list of groups he
is member of. The plain UNIX model involves a complete enumeration of the file /etc/group and its NSS
counterparts in LDAP. UNIX has optimized functions to enumerate group membership. Sadly, other functions that
are used to deal with user and group attributes lack such optimization.
</para>
2005-03-04 20:04:56 +03:00
2005-12-26 20:20:51 +03:00
<para >
2007-01-17 15:59:43 +03:00
To make Samba scale well in large environments, the <smbconfoption name= "ldapsam:trusted" > yes</smbconfoption>
2005-12-26 20:20:51 +03:00
option assumes that the complete user and group database that is relevant to Samba is stored in LDAP with the
standard posixAccount/posixGroup attributes. It further assumes that the Samba auxiliary object classes are
stored together with the POSIX data in the same LDAP object. If these assumptions are met,
2007-01-17 15:59:43 +03:00
<smbconfoption name= "ldapsam:trusted" > yes</smbconfoption> can be activated and Samba can bypass the
NSS system to query user group memberships. Optimized LDAP queries can greatly speed up domain logon and
2005-12-26 20:20:51 +03:00
administration tasks. Depending on the size of the LDAP database a factor of 100 or more for common queries
is easily achieved.
</para>
2005-03-04 20:04:56 +03:00
</description>
<value type= "default" > no</value>
</samba:parameter>