Overview of Services for NetWare 5.02 Service Pack 2
Issues That Are Resolved in SP2
Features That Have Changed in SP2
Operating Systems SP2 Supports
New Registry Settings for File Migration Utility (FMU)
New Registry Settings for Microsoft Directory Synchronization Services (MSDSS)
© 2003 Microsoft Corporation. All rights reserved.
Overview of Services for NetWare 5.02 Service Pack 2 |
Back to Top |
The fixes included in Microsoft® Services for NetWare 5.02 Service Pack 2 (SP2) provide additional migration and synchronization options and can improve the stability of synchronization sessions.
The fixes provided in SP2 apply to the following components:
Issues That Are Resolved in SP2 |
Back to Top |
SP2 provides fixes for the following issues:
Known Issues in SP2 |
Back to Top |
The following are known issues with Services for NetWare 5.02 SP2:
Features That Have Changed in Services for Netware SP2 |
Back to Top |
Operating Systems Services for Netware SP2 Supports |
Back to Top |
SP2 supports the following Windows operating systems:
SP2 supports Administrative Tools for the following Windows operating systems:
SP2 supports the following Novell NetWare operating systems:
Installation Instructions |
Back to Top |
Microsoft Directory Synchronization Service (MSDSS) requires the use of Novell's Client for Windows. If you perform a clean installation of either a Windows 2000 Server family operating system or a Windows Server 2003 family operating system, you must download and install Novell's Client for Windows before you install Services for NetWare MSDSS.
To install MSDSS, from a computer running a Windows 2000 Server family operating system, or from a server or domain controller running a Windows Server 2003 family operating system:
Note
To uninstall MSDSS:
To install File and Print Services for NetWare, from a computer running Windows 2000 Server, or from a server or domain controller running a Windows Server 2003 family operating system:
Important
drive:\FPNW
(where drive is the drive letter of the CD-ROM drive), and then click OK.
Note
To perform an upgrade from either Microsoft Windows NT® with File and Print Services for NetWare 4.0 installed or Windows 2000 with File and Print Services for NetWare 5.0 installed:
To install File and Print Services for NetWare Administrative Tools only:
To uninstall File and Print Services for NetWare:
New Registry Settings for File Migration Utility (FMU) |
Back to Top |
New options in File Migration Utility (FMU) are set in the registry as DWORD values in the following key:
The following table provides the value names, default values, and descriptions of the new options in FMU.
Value name | Default value | Description |
---|---|---|
FileACLs | 1 | Determines whether File Migration Utility (FMU) migrates ACLs for each file when they are migrated from NetWare to Windows 2000. If you set the value to 0, you hasten the migration session by causing it to skip the file-level ACL migration. The migrated files then inherit inheritable ACLs from their parent directory. |
DirectoryACLs | 1 | Determines whether FMU migrates ACLs for each directory when it is migrated from NetWare to Windows 2000. If you set the value to 0, you hasten the migration session by causing it to skip the directory-level ACL migration. We do not recommend this practice. |
FilesInheritAlways | 0 | Determines whether the flag, "allow inheritable permissions from
parent to propagate to this object," is set to "on" for all files. If you set the value to 1, you override the effect of the inherited rights
filters on files on the NetWare server.
Note
|
FilesInheritUnlessIRF | 1 | Determines whether the flag, "allow inheritable permissions from parent to propagate to this object," is set to "on" for all files, except when the file on the NetWare server has an inherited rights filter or grant of lesser permissions than a grant closer to the volume root. If both FilesInheritAlways and FilesInheritUnlessIRF are set to 1, FilesInheritUnlessIRF is applied. |
DirectoriesInheritAlways | 0 | Determines whether the flag, "allow inheritable permissions from parent to propagate to this object," is set to "on" for all directories. If you set the value to 1, you override the effect of inherited rights filters on directories on the NetWare server. |
DirectoriesInheritUnlessIRF | 1 | Determines whether the flag, "allow inheritable permissions from parent to propagate to this object," is set to "on" for all directories, except when the directory on the NetWare server has an inherited rights filter or a grant of lesser permissions than a grant closer to the volume root. If both DirectoriesInheritAlways and DirectoriesInheritUnlessIRF are set to 1, DirectoriesInheritUnlessIRF is applied. |
MacFileData | 1 | Determines whether Macintosh files on the NetWare server will have the data fork copied to the destination. If the value is set to 0, Macintosh files are skipped. You can use these options in conjunction with MacFilesOnly to perform two-pass migrations that separate Macintosh files from non-Macintosh files. |
MacFileResource | 1 | Determines whether Macintosh files on the NetWare server
will have the resource fork and Finder data copied to the destination for
use with Services for Macintosh. If you set the value to 0, you do not
copy the resource fork and Finder data.
Note
|
MacFileName | 1 | If you set the value to 1, Macintosh files are renamed on Windows to use the file name from NetWare's Macintosh namespace. Setting the value to 0 ensures that you use the file name from the default namespace (Long or DOS). |
MacFilesOnly | 0 | If you set the value to 1, you cause FMU to skip non-Macintosh files during the migration. This option is useful for the second pass in a two-pass migration to separate Macintosh files in cases where Services for Macintosh are loaded on only selected servers. |
IgnoreNetWareOwner | 0 | Determines whether the "owner" property on migrated files is set to the migrator user or Administrators group. In NetWare, the "owner" property is merely informational, carrying no security significance. In NTFS, the "owner" property has significant security implications. If you set this value to 1, you set the "owner" property, with its security implications, to the Administrators group. |
ReplaceNTFSRootACL | 0 | The default setting merges the existing ACL on the NTFS target root directory with the migrated ACL. The existing access control entries (ACEs) apply to the root directory and any files or subdirectories until an inherited rights filter (IRF) or rights reduction causes the flag, "allow inheritable permissions from parent to propagate to this object," to be cleared. If you set the value to 1, you replace the existing ACL on the target directory with the ACL migrated from NetWare. |
SetMigratorAsSupervisor | 0 | Setting this value to 1 effectively adds the Windows user account used for the migration as a "supervisor" to the root of each volume. This means that the migrating user has Full-Access rights to everything migrated during and after the migration. By treating the user as "supervisor," this ACE survives all IRFs and rights reductions in NetWare. |
ResetArchiveFlag | 0 | Determines whether the archive flag is cleared on files and directories in the NetWare file system as each file is migrated. You can use this option in conjunction with the MigrateOnlyIfArchive option to perform an initial full migration that is followed by subsequent incremental migrations. Set this option to 1 during the initial full migration and during subsequent incremental migrations. |
MigrateOnlyIfArchive | 0 | Determines whether NetWare files that have the archive flag
cleared are migrated. The default value migrates all files regardless of
the setting of the archive bit. When you use this option in combination with the
ResetArchiveFlag option, you can perform an initial full migration (this
option is set to 0 for full migration), followed by subsequent incremental
migrations (this option is set to 1 for incremental synchronization). This migrates only
the files that have changed since the last migration.
Note
|
MigrateACLsOnly | 0 | If you set this value to 1, you can set just the ACLs on files that have been copied from NetWare to Windows 2000 by some external method such as RoboCopy or a backup\restore process. |
MigrateDirsOnly | 0 | Set this value to 1 to migrate only the directory structure and directory-level ACLs. You can then copy the file data into the directory structure by an external method such as RoboCopy or a backup\restore process. Files copied into the directory structure inherit ACLs from the parent directory. |
New Registry Settings for Microsoft Directory Synchronization Services (MSDSS) |
Back to Top |
New options in MSDSS are set in the registry as DWORD values in the following key:
HKLM\System\CurrentControlSet\Services\MSDSS\Parameters
The following table provides the value names, default values, and descriptions of the new options in MSDSS.
Value name | Default value | Description |
---|---|---|
UseMemberAttribute | 0 | Set this value to 1 to migrate group memberships using the "member"
attribute of the group object. If you set the value to 0, you use the
"security equal to me" attribute.
When migrating groups from Novell Directory Services (NDS) to Active Directory, by default MSDSS reads the "security equal to me" attribute and migrates those group members to Active Directory. Some NetWare administration tools (particularly those that operate in Bindery mode) only add members to the "member" attribute. This causes a discrepancy between the group memberships as displayed in NDS and Active Directory after some migrations. If you experience this, set the value to 1 to allow NDS group members that are not marked as "security equal to me" to be migrated to Active Directory. |
SyncEmailAddress |
0 |
In the Help file, the "Mapping Tables" topic lists the "Email Address" attribute in NDS as one that is being synchronized with "mail" attribute in Active Directory. It is actually the "Internet Email Address" attribute in NDS that is synchronized with the "mail" attribute in Active Directory. You can disable the "mail" attribute synchronization by creating the following registry key and setting the DWORD value to 0: |
DebugLogLevel | 0 | To troubleshoot synchronization issues when using the MSDSS tool, you can enable debug logging to capture detailed information about the synchronization process. Changing the data value to 1 enables detailed debug logging. The logging information is placed in the %Systemroot%\System32\Directory Synchronization\Session Logs folder. The log files are labeled as "Session#-#.log". You must stop and start the MSDSS service before this setting will function. |
IgnoreDeletesFromNDS | 0 | This setting prevents the deletion of mapped objects on Active Directory when the object has been deleted on NDS. |
SamRename | 0 | Active Directory and NDS handle logon
names differently. Active Directory provides separate attributes for logon
name (samAccountName) and object naming in the directory hierarchy (that
is, the relative distinguished name. NDS uses the same attribute (that is, CN) for both purposes. The initial release of MSDSS
synchronizes the directory object name (that is, the relative distinguished name maps to the CN),
but does not synchronize the logon names. This update to MSDSS provides an
option for synchronizing logon names between Active Directory and NDS.
Setting the value to 1 enables MSDSS to keep both the samAccountName and relative distinguished name attributes of a user object in Active Directory synchronized with the CN attribute of the corresponding NDS user object. (Note: The session must be a two-way synchronization session in order to synchronize changes in NDS to Active Directory). The following scenarios apply: Creating a new user object in NDS When a new user is created in NDS and synchronized to Active Directory, the samAccountName and relative distinguished name of the new Active Directory user object is set to the CN of the new NDS user, thereby synchronizing the logon names. Renaming the user object in NDS When a user object is renamed in NDS (that is, when the CN attribute is modified), the new object name is copied to both the samAccountName and the relative distinguished name of the Active Directory user object during the next synchronization. This ensures that the logon names match. Creating a new user object in Active Directory When a new user is created in Active Directory it is often created with different values for the relative distinguished name and the samAccountName. Due to internal synchronization processing, this is handled in two steps. First, a new user is created in NDS with the CN set to the Active Directory user's original relative distinguished name. At the same time, the relative distinguished name of the Active Directory object is changed to match the samAccountName. At the next Active Directory-to-NDS synchronization, the rename of the Active Directory object is synchronized to NDS. As a result, both user objects have the samAccountName as their logon name. Renaming the user object in Active Directory When a user object is renamed in Active Directory (that is, when the samAccountName attribute is modified), that change is first copied to the Active Directory user's relative distinguished name attribute. This occurs on the first Active Directory-to-NDS synchronization after the change. Nothing is actually copied to NDS at this point. On the next Active Directory-to-NDS synchronization, the user object's new relative distinguished name is copied to the NDS user's CN attribute. This completes the synchronization of the name change. When the logon name synchronization option is enabled, administrators should avoid changing the relative distinguished name of Active Directory user objects without also changing the samAccountName. If you do not also change the samAccountName, you will not receive errors, but you will not achieve the intended results. When such a change is made, the new relative distinguished name is synchronized to NDS, but at the same time, because the samAccountName and relative distinguished name do not match, the relative distinguished name is changed to match the samAccountName. On the next Active Directory-to-NDS synchronization, the new rename (back to the samAccountName) is synchronized to NDS. This effectively negates the name change. |
Copyright |
Back to Top |
These notes support a release of a software program that bears the name Microsoft Services for NetWare 5.02 Service Pack 2.
Information in this document, including URL and other Internet Web site references, is subject to change without notice and is provided for informational purposes only. The entire risk of the use or results of the use of this document remains with the user, and Microsoft Corporation makes no warranties, either express or implied. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
© 2003 Microsoft Corporation. All rights reserved.
Microsoft,
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.