Homedir shares are a type of CIFS shares. In Homedir share mode, a namespace is shared to a specific user as an exclusive directory. The user can only access the exclusive directory named after its user name.
The Create CIFS Homedir Share page is displayed on the right.
Parameter |
Description |
|---|---|
Share Name |
Name used by a user for accessing shared resources.
NOTE:
If you want to use the autohome Homedir share, set the share name to autohome. [Value range]
[Example] share_for_user1 |
Relative Path |
Relative path of the user directory. When a user accesses a Homedir share, the actual directory that the user accesses consists of the share path (consisting of the namespace and dtree) configured in the mapping rule and the relative path configured here. If there is no relative path in the share path and the Auto Create Path function is enabled in the mapping rule, the system automatically creates a relative path. Otherwise, manually create a relative path in the share path to ensure that the directory exists when the share is accessed. [Value range]
[Example] /home_%d/%w |
Table 2 describes related parameters.
Parameter |
Description |
|---|---|
Description |
Description of the CIFS Homedir share.
NOTE:
The description can be left blank or contain up to 255 characters. |
Create Default ACL |
Determine whether to add a default ACL. This function creates a default ACL (full control rights to everyone; applied to the current directory, its subdirectories, and files in them) for a shared CIFS root directory if the directory has no ACL. You can change the default ACL in follow-up operations. To retain the UNIX mode bits, disable this function. |
Notify |
After this function is enabled, a client's modification operations on a directory, such as adding a directory, adding a file, modifying the directory, and modifying a file, can be detected by other clients that are accessing this directory or the parent directory of this directory. Results of the modification operations are displayed after the page is automatically refreshed. |
SMB3 Encryption |
Determine whether to enable SMB3 encryption. After this function is enabled, the system encrypts the share to ensure data security, but performance deteriorates.
NOTICE:
Enabling this function affects SMB3 service performance. Check whether this function needs to be enabled.
NOTE:
After SMB3 encryption is enabled, only SMB3 clients can access shares by default. |
Unencrypted Client Access |
After this function is enabled, clients that do not have encryption capabilities can access the share.
NOTICE:
After this function is enabled, clients of earlier versions (for example, Windows 7) are allowed to access shares where SMB3 encryption is enabled in plaintext. Check whether this function needs to be enabled.
NOTE:
This function takes effect only after the SMB3 encryption function is enabled. |
Oplock |
Opportunistic locking (oplock) is a mechanism used to improve client access efficiency and locally buffer files before they are sent to shared storage. This function is not recommended in the following scenarios:
NOTE:
Oplock for a share takes effect only when both oplock for the account and oplock for the share are enabled. |
Lease |
Lease allows a client to lock a file using a lease key, and the file locking can be canceled by the server.
NOTE:
|
ABE |
Access-based enumeration. Enabling this function hides files and folders that users do not have permissions to access.
NOTE:
SMB2 and SMB3 support the ABE function, but SMB1 does not. |
Show Previous Version |
After the function of displaying previous versions is enabled, a client can display previous versions and supports version rollback. |
The Add User or User Group page is displayed.
The value can be Everyone, Local Windows authentication user, Local Windows authentication user group, AD domain user, or AD domain user group.
change namespace general name=Namespace name unix_permissions=777
change dtree general dtree_name=Dtree name file_system_id=Namespace ID unix_permissions=777
Table 3 describes related permissions.
Permission |
Forbidden |
Read-Only |
Read/Write |
Full Control |
|---|---|---|---|---|
Viewing files and subdirectories |
Xa |
√b |
√ |
√ |
Viewing file contents |
X |
√ |
√ |
√ |
Running executable files |
X |
√ |
√ |
√ |
Adding files or subdirectories |
X |
-c |
√ |
√ |
Modifying file contents |
X |
- |
√ |
√ |
Deleting files and subdirectories |
X |
- |
√ |
√ |
Renaming |
X |
- |
√ |
√ |
Changing ACL permissions of files or directories |
X |
- |
- |
√ |
a: Users do not have the permission. b: Users have the permission. c: The specified permission is not involved. |
||||
The system adds the selected users or user groups to the Permission list.
The Add Mapping Rule page is displayed on the right.
If Security Style of the namespace is UNIX, ensure that the user has the permission to access the relative path of the Homedir share when creating a mapping rule. Otherwise, the user cannot access the Homedir share.
namespace general name=Namespace name unix_permissions=777 command, so that the automatic path creation function takes effect. Otherwise, users matching this rule cannot access the Homedir share.
The system adds the configured mapping rule to the Mapping Rule list.