Difference between revisions of "Terms and Abbreviations"

From SambaWiki
(Add brief Security Descriptor entry)
m (fix broken ACL links)
Line 3: Line 3:
== Access Control Entry (ACE) ==
== Access Control Entry (ACE) ==
Element in an Access Control List ([[Access_Control_List_.28ACL.29|ACL]]).
Element in an Access Control List ([[#Access_Control_List_.28ACL.29|ACL]]).
Line 347: Line 347:
A security descriptor is generally made up of:
A security descriptor is generally made up of:
* User and group owner identifiers.
* User and group owner identifiers.
* Discretionary [[Access_Control_List_.28ACL.29|Access Control List.]]
* Discretionary [[#Access_Control_List_.28ACL.29|Access Control List.]]
* System Access Contorl List, which can be used for auditing access attempts.
* System Access Contorl List, which can be used for auditing access attempts.

Revision as of 15:53, 30 June 2014


Access Control Entry (ACE)

Element in an Access Control List (ACL).

Access Control List (ACL)

Collection of all ACE's that define the permissions of a share, file, directory, etc.

Active Directory (AD)

Directory service developed by Microsoft. Samba version 3 could only be member of an AD as file server, Samba since version 4 can also be Domain Controller of an AD. For a detailed description, see https://en.wikipedia.org/wiki/Active_Directory.

Active Directory Users and Computers (ADUC)

It is an MMC snap-in for managing e. g. user and computer accounts.


Backup Domain Controller (BDC)

In an NT4 domain, the BDC is a computer having a copy of the user and groups database. Changes are always done on the PDC. The Backup Domain Controller is only read-only. Changes are pushed from the PDC via Master-Slave-Replication to the BDC(s). In case of an outage of an PDC, a BDC can be promoted to an PDC.

Active Directory does not have PDCs/BDCs any more.



Distributed File System (DFS)

The main use of DFS, is to create an alternative name space (directory tree view), that hides details of the underlying infrastructure from the users. Technically DFS provides access to a shared directory that contains no files, only junctions, and optionally subdirectories with more junctions.

Junctions are similar to softlinks as known from Unix file systems, but ones that point to shared directories and they can also point to shared directories on other servers.

Domain Name System (DNS)

Hierarchical distributed naming system for computers, services and resources connected to the Internet or private network. It translates easily memorized domain names to the numerical IP addresses. See https://en.wikipedia.org/wiki/Domain_Name_System.


User accounts, computers and other security principals, that are registred and maintained within a central database. In an Active Directory domains can be connected via Trusts in a Tree or Forest.

Domain Controller (DC)

Server with Samba/Microsoft Active Directory services installed. A Domain Controller (DC) is authorative for the domain it is part of. AD DCs are doing multi-master replication.

In an AD, all Domain Controllers are equal, byside the [[#Flexible_Single_Master_Operator_.28FSMO.29|FSMO] roles.

An AD Domain Controller should not to be confused with PDC/BDC!



File Replication Service (FRS)

File Replication Service is used to replicate the SysVol content in Windows Server 2000 and 2003. It was being replaced by Microsoft with DFS-R (Distributed File System Replication) in newer versions of Windows Server. Samba does not support SysVol replication with FRS.


A forest is a group of domains with trust between the domains, that are not a within tree. This is typically created when one company purchases another company, both companies already had domain trees and now a trust is established between them. Forests are often only an intermediate step, later replaced by a tree.

Fully qualified Domain Name (FQDN)

See https://en.wikipedia.org/wiki/Fully_qualified_domain_name.

Flexible Single Master Operator (FSMO)

Please describe.

Functional Level

Please describe.


Global Catalog (GC)

Please describe.

Group Policy Object (GPO)

Please describe.


Please describe.

Globally Unique Identifier (GUID)

Please describe.



Please describe.




Key Distribution Center (KDC)

Please describe.


Please describe.


Lightweight Directory Access Protocol (LDAP)

Please describe.

Lightweight Directory Access Protocol over SSL (LDAPS)

Acronym for LDAP over SSL.

LDAP Data Interchange Format (LDIF)

Please describe.


Microsoft Management Console (MMC)

Graphical interface for managing services and resources under Microsoft Windows. Snap-ins can be used for administering different Windows services, users, etc. An often used snap-in in an Active Directory environment is e. g. ADUC (Active Directory Users and Computers).



Please describe.

Naming Context (NC)

Please describe.


Please describe.

NetLogon Share

Please describe.

Network Time Protocol (NTP)

Please describe.


Object Identifier

Please describe.

Organizational Unit (OU)

Please describe.



Please describe.

Primary Domain Controller (PDC)

Please describe.

PDC Emulator

Please describe.




Please describe.

Relative Identifier (RID)

Please describe.

Read Only Domain Controller (RODC)

Please describe.


Please describe.

Remote Server Administration Tools (RSAT)

Please describe.


Security Account Manager (SAM)

Please describe.


Please describe.

Security Descriptor

A collection of information denoting the ownership, permission and auditing information for a file, folder, or other system entity. A security descriptor is generally made up of:

  • User and group owner identifiers.
  • Discretionary Access Control List.
  • System Access Contorl List, which can be used for auditing access attempts.

Security Principal

Please describe.

Security Identifier (SID)

Please describe.


Please describe.

Service Principal Name (SPN)

Please describe.


Please describe.

SysVol share

Please describe.



A tree is a group of domains with trusts between the domains, that share the same base domain name. This typically is created for separate divisions or for different regional branches of the same company.

Example: manufacturing.samdom.example.com is a subdomain of samdom.example.com



User Principal Name (UPN)

Please describe.



Windows Internet Naming Service (WINS)

Please describe.