By default, the SMB server uses ephemeral identity mapping. Shell special characters, such as the double quote character ("), the asterisk character (*), and the backslash character (\), must be quoted when used as user names and domain names.
You define the names of Oracle Solaris and Windows users and groups by using specific formats.
For Windows groups, use one of the following formats:
wingroup:group-name@domain-name
wingroup:'domain-name\group-name'
For Windows users, use one of the following formats:
winuser:username@domain-name
winuser:'domain-name\username'
For Oracle Solaris groups, use the format unixgroup:group-name.
For Oracle Solaris users, use the format unixuser:username.
Using the wildcard character (*) matches all user names that are not matched by other mappings. Similarly, using the wildcard Windows name (*@*) matches all user names in all domains that are not matched by other mappings.
Using the wildcard on both sides of the mapping makes the user or group name the same for both Windows and Oracle Solaris users. For example, the '*@example.com' == '*' rule ensures that the jp@example.com Windows user name maps to the jp Oracle Solaris user name.
Note that the case of Windows names that appear in idmap name rules and in idmap show commands is ignored. However, because Windows names are not case sensitive but Oracle Solaris names are case sensitive, be careful when creating rule-based mappings that use wildcards for the user or group names.
![]() | Caution - Although Oracle Solaris environments typically use lowercase characters for user names, uppercase characters are permitted. Therefore, using a wildcard to map Windows names to Oracle Solaris user names might not produce the expected results. Rule-based mapping rules that use the unixuser:* or unixgroup:* target map to the Oracle Solaris name as follows:
# idmap add winuser:'*@example.com' unixuser:'*' # idmap add winuser:kerry@example.com unixuser:KerryFor example, to map Oracle Solaris group Sales to Windows group sales@example.com, you must create the following rule: # idmap add wingroup:'*@example.com' unixgroup:'*' # idmap add wingroup:sales@example.com unixgroup:Sales |