Introduction
  
Requirements and Prerequisites
 - Host Platforms
 - Supported Servers
  
Installing and Removing Sharity 3
 - Installation
 - Upgrading to a new Version
 - Removing Sharity 3
  
Working with Sharity 3
 - Configuring
 - Logging in and out
 - Authentication with Kerberos
 - Using the Keychain
 - Browsing Resources
 - /CIFS as a Magic Directory
 - Login and Keychain Access from the Command Line
 - Mounting Shares from the Command Line
 - Accessing ACLs
 - General Information
  
Configuring a Windows PC to share Files
 - Configure the Network
 - Sharing a Directory
 - Name and Browsing Services
  
Tips and Tricks
 - Help for Configuration Options
 - Make a Permanent Mount
 - Default Login for Domain
 - Set up a Default Account
  
Troubleshooting
 - Creating a Debug Log
 - Recovering from a Daemon Crash
 - Debugging Kerberos and AD
  
Unix Home Directories on SMB Shares
 - Overview
 - Sharity and DirectControl
 - Integrating Sharity with Other Software
 - Limitations
  
Release Notes
  
Software License

Sharity 3 Introduction

Sharity is a network file system client. "Client" means that it is used to access file resources (shares) in the network, it does NOT provide network access to your local resources. Sharity implements the SMB (Server Message Block) protocol which is (for instance) used by all versions of Windows to share files over the network. This protocol is also known under the name CIFS (Common Internet File System). Sharity can mount SMB shares in the Unix file system transparently.

Features

  • Access to shares exported by Windows 95, 98, ME, NT, 2000, 2003, XP, Samba, and others.
  • Automatic resource location: Network browsing similar to Windows "Network Neighborhood".
  • Available for Sun Solaris, HP-UX, SGI IRIX, IBM AIX, Linux, FreeBSD, OpenBSD and Mac OS X. Others on request.
  • Secure authentication with NTLM, NTLMv2, NTLMSSP and Kerberos.
  • Supports Microsoft's DFS (Distributed File System).
  • Access to Windows 2000 domains: Active Directory browsing and Kerberos authentication.
  • Tools to read and modify Windows Access Control Lists (ACLs).
  • User interaction with Graphic User Interface (GUI) or command line.
  • Key chain for managing passwords for servers, shares and domains.
  • Large file access: Supports files greater than 4GB.


Copyright © 2004 - 2007 by OBJECTIVE DEVELOPMENT Software GmbHprinter friendly version