TSF – Giải pháp IT toàn diện cho doanh nghiệp SMB | HCM

P6 - Configure HomeFolders TrueNas for Domain Users

🚀 TrueNAS P6 – How to Configure HomeFolders for Domain Users (SMB + AD Guide)

Configuring homefolders TrueNAS for domain users is an essential step when integrating TrueNAS with Active Directory in a Windows domain environment.

In this guide, you’ll learn how to properly configure SMB home directories, apply secure ACL permissions, and ensure automatic folder creation for each domain user. This setup guarantees privacy, structured storage, and centralized management.

By the end of this tutorial, your TrueNAS system will be securely integrated with AD and optimized for enterprise-ready home directory deployment.


🧠 Why HomeFolders on TrueNAS Matter

When using Active Directory, each domain user typically requires:

  • 📁 A private home directory

  • 🔐 Secure file permissions

  • 🖥️ Automatic folder mapping upon login

  • 🏢 Centralized storage management

Properly configuring homefolders truenas ensures:

✅ Data isolation between users
✅ Clean ZFS dataset structure
✅ Secure SMB inheritance behavior
✅ Reduced permission conflicts


🛠️ Step 1: Create Dataset Homefolder

Create a dedicated ZFS dataset named:

 
 
Homefolder
 

Set Share Type:

  • SMB

This dataset will serve as the root container for all domain user home directories.

A structured dataset design improves scalability and performance in domain environments.


🔐 Step 2: Assign Permissions to Dataset Homefolder

Correct ACL configuration is critical for secure homefolders truenas deployment.

Apply the following permissions:

  • Group admin → Modify – Inherit

  • Group TSF\sale, TSF\hr, … → Read – No Inherit

  • Group domain admin → Full Control – Inherit

  • Group owner@ – root → Modify – Inherit

These permissions ensure:

  • 👤 Users cannot access other users’ folders

  • 🛡️ Domain Admin maintains full control

  • 🔄 Proper inheritance behavior

Misconfigured ACLs are the most common reason for access denied errors.


🌐 Step 3: Enable SMB Share

Create the SMB share with the following settings:

  • Purpose: No Presets

  • ✅ Tick ABSE

ABSE (Access Based Share Enumeration) ensures users only see folders they have permission to access.

This improves both security and user experience.


🏠 Step 4: Enable Homefolder on AD

Configure the Home Directory path in Active Directory:

 
 
\\192.168.16.182\Homefolder\%username%
 

This enables automatic folder mapping for domain users.

Test with users:

  • sale01

  • hr01

Upon login, TrueNAS will automatically generate:

 
 
\\192.168.16.182\Homefolder\sale01
\\192.168.16.182\Homefolder\hr01
 

This confirms proper homefolders truenas integration.


🔧 Step 5: SSH Configuration for Advanced SMB Control

To optimize folder isolation and resolve common visibility issues, configure SMB via SSH.


Enable SSH Access

  • Enable SSH for admin truenas (if not yet)

  • Re-confirm the root user password


Determine SMB Share ID

Run:

 
 
midclt call sharing.smb.query | jq
 

Identify the ID of the dataset Homefolder.

Example:
Team ID = 2


Apply Advanced SMB Configuration

Run:

 
 
midclt call sharing.smb.update 2 ‘{“auxsmbconf”: “access based share enum = yes\nhide unreadable = yes”}’
 

This enforces:

  • access based share enum = yes

  • hide unreadable = yes

These settings prevent users from seeing folders they cannot access.


Restart SMB Service

 
 
systemctl restart smbd
 

Enter the root password when prompted.

SMB service will restart and apply the new configuration.


⚠️ Fixing Common Access Denied Issues

If users experience permission errors:

✔ Re-check dataset ACL inheritance
✔ Confirm AD group mapping
✔ Ensure SMB is restarted
✔ Validate user login path configuration

Most issues stem from inheritance misconfiguration or missing ABSE settings.


🏢 Best Practices for Enterprise Environments

For production deployments:

  • 📦 Keep home folders inside a dedicated dataset

  • 🔐 Use ABSE + hide unreadable

  • 👥 Apply group-based permissions

  • 📊 Monitor SMB service health

  • 💾 Backup ZFS dataset regularly

Proper configuration of homefolders truenas significantly reduces administrative overhead and improves domain file management.


🎯 Final Result

After completing all steps:

  • Each domain user receives an isolated home directory

  • SMB share visibility is restricted properly

  • ACL inheritance behaves correctly

  • Active Directory integration works seamlessly

Your TrueNAS server is now securely configured for domain-based home directory management.


📌 Conclusion

Deploying homefolders truenas in an Active Directory environment is a foundational step for centralized user storage.

With correct dataset structure, ACL configuration, SMB optimization, and SSH adjustments, you ensure:

🔒 Security
📁 Folder isolation
⚡ Stable performance
🏢 Enterprise-ready deployment

Follow this complete guide carefully to avoid permission conflicts and ensure long-term reliability.

See also related articles

P21 – Effortless WordPress TrueNAS Setup Guide

P21 – Effortless WordPress TrueNAS Setup Guide 🚀 TrueNAS P21 – WordPress TrueNAS Apps Demo Deploy WordPress Easily (No Docker Skills Needed) Deploying WordPress on a NAS no longer requires deep Docker knowledge or complex manual configurations. With WordPress TrueNAS Apps, you can launch a fully functional WordPress instance directly...

Read More

P20 – Essential ZFS Disk Scrubbing Best Practices Guide

P20 – Essential ZFS Disk Scrubbing Best Practices Guide 🚀 TrueNAS – P20: ZFS Disk Scrubbing – Step-by-Step Configuration & Best Practices Maintaining data integrity is one of the most important responsibilities of any storage administrator. Even enterprise-grade disks can develop silent data corruption over time. This is where ZFS...

Read More

P18 – Ultimate MFA TrueNAS Security Setup Guide

P18 – Ultimate MFA TrueNAS Security Setup Guide 🚀 TrueNAS – P18: Secure TrueNAS with MFA (Google Authenticator) – Full Configuration Tutorial Security is critical for any production storage system. A strong password alone is no longer enough. If credentials are leaked, brute-forced, or reused elsewhere, your entire NAS infrastructure...

Read More