Sponsored by:

Opening windows
sambaXP 2026

Samba eXPerience is the annual gathering of the Samba Team and its global ecosystem of developers, users, and vendors — organized by SerNet since 2002.

The 25th international conference dedicated to the open-source software Samba will take place from April 20–21, 2026. Attendees will have the opportunity to meet the Samba Team, discuss requirements and new features, and receive updates on current development projects.

All information regarding room booking, tickets, and the conference venue is now available in the Service section.

Already curious about the program? Please give us a little more time. In the meantime, take a look at our collection or YouTube Channel and find recordings of past events.

Program 2026

Registration & Welcome

Welcome Note

Key Note: A Quarter Century of sambaXP

Stories of battles fought and won: converting the mass one Samba-AD after another

Dennis and Vincent Cardon (Tranquil IT) explore in their talk the evolution of Samba-AD — from the early Samba 4.0.0 alpha releases to its current state.

Over the years, Samba-AD has steadily matured. What once primarily attracted advocates of “free as in speech” and “free as in beer” has become a serious and reliable alternative for professional environments.

As Microsoft continues shifting its focus away from on-premises deployments toward the cloud, a real opportunity emerges for Samba-AD to position itself as the solution of choice for organizations seeking visibility, sustainability, and full control over their on-premises IT.

Through real-world field stories, the speakers will highlight where Samba-AD stands today — and where it aims to go tomorrow.
 

SMB3 Persistent Handles: How They Work and How to Use Them

Recent advances in Samba AD security

Douglas Bagnall (Catalyst IT) presents the latest security and authentication improvements in Samba 4.24.

The new release enhances support for Kerberos PKINIT certificate-based authentication, provides greater control over the use of canonicalized names in Kerberos, and strengthens the auditing of sensitive — though not secret — security attributes.

In just 45 minutes, you will gain a clear and practical understanding of what these changes mean and why they matter.

Lunch Break

New Transports in Samba: QUIC and SMB-Direct Support

Stefan Metzmacher (SerNet) explains in his talk new transports in Samba. 

The Samba file server is evolving beyond traditional TCP-based transport. This talk introduces the latest advancements in Sambas networking stack, including full support for SMB over QUIC, offering secure, firewall-friendly file sharing using modern internet protocols. We’ll also explore the ongoing development of SMB over SMB-Direct (RDMA), aimed at delivering low-latency, high-throughput file access for data center and high-performance environments. Join this deep dive into these transport innovations, their architecture, current status, and whar's next for Samba’s high-performance networking roadmap.
 

How to get rid of NTLM?

NTLM has been a security liability for decades, yet it remains deeply embedded in enterprise environments. Its weaknesses are well documented: relay attacks, pass-the-hash, weak cryptography, you name it.
Microsoft has announced plans to deprecate NTLM, and announced to use IAKerb the successor, that works across heterogeneous environments.

Andreas Schneider and Alexander Bokovoy (both Red hat) present in this talk a concrete approach to eliminating NTLM from SMB authentication using a local Kerberos Key Distribution Center (KDC) combined with the IAKerb extension. They demonstrate how a localkdc can serve as an authentication bridge, enabling Kerberos authentication even in scenarios where traditional KDC infrastructure is unavailable or
impractical.

The talk will cover the architecture of the localkdc, its integration with SSSD and Samba, and show live demonstrations of NTLM-free SMB authentication. Additionally, we explore how this approach enables OAuth 2.0 identity providers to be mapped to local POSIX identities, providing a path toward modern authentication in traditional Unix/Linux environments.

Practical approach to SMB Multichannel in IBM Storage Scale

In this talk Michael Diederich (IBM) will discuss what it took to make SMB Multichannel work with clustered Samba, in combination with virtual IPs managed outside CTDB. 
This includes some basic concepts of SMB Multichannel, how it can be observed on the network, multichannel status for individual clients, samples for different clients and some discussion of why multichannel in a clustered environment can be complicated.

Additionally, some of the performance comparisons with and without Multichannel will be covered.

OpenRSAT: Opening RSAT to a wider world

In this talk, Thomas Prudhomme (Tranquil IT) explains OpenRSAT. 

Microsoft RSAT is the tool of choice for AD admins to do their daily chores. OpenRSAT aims at first to replicate MS-RSAT features and make them cross-platform on Windows, Linux and macOS, and then innovate and make it the tool of choice that we have always dreamed of for AD administration. 

At Tranquil IT they believe there is a future for on premise infrastructure, for Samba-AD, for Linux desktop and for native GUI. When we don't do AD related stuff, we develop WAPT software deployment solution which rely heavily on the mORMot toolbox library for everything, notably AD integration. What is the best way to ensure the full compatibility of the mORMot toolbox: making OpenRSAT the greatest RSAT ever!

Coffee Break

The CTDB Report 2026

Martin Schwenke (DDN) gives an overview of recent improvements and coming attractions in the world of
clustered Samba.

GPOs from source

Kees van Vloten explains how to create GPOs on a Samba-DC from files in a git repo and configure them using samba-tool and shell scripts. 
This talk looks at an example of each of the three file formats a GPO can have: INI, XML and Regpol and their peculiarities. Next is to apply configuration on a GPO, such as RBAC permission-groups, extensionNames, WMI-filters, version numbers and LDAP-links, etc.

Surprise

Social Event

Spitzbub Alm (Hotel Freizeit In)

Welcome Note

Intro to Interop: Introduction to The Microsoft Interoperability Commitment

In this introduction Hagit Galatzer (Microsoft) gives an overview of the interoperability resources and programs that are available to you. This talk will introduce the Open Specifications and highlight its major technology areas – Windows, Office, SharePoint, Exchange, SQL, and Teams, as well as types of content and related resources.

SMB3 Test Suite Overview

In this talk Namikoye Lusweti (Microsoft) gives an in-depth overview of the SMB3 Testsuites architecture, test methodology, and practical guides for testing both server and client SMB3 implementations. The Testsuites were developed by Microsoft’s Interoperability Protocols test team. The presentation will also offer valuable insights and techniques for ensuring accurate SMB3 deployments.
 

Serve yourself! - Winbind improvements for user token acquisition

Coffee Break

SMB3 POSIX Extensions in the Linux client

Enhancing compatibility with applications that rely on Linux and POSIX file semantics is crucial. In this presentation Steven French (Microsoft) explores the current state of SMB3.1.1 POSIX Extensions across various clients and multiple servers focusing on recent significant improvements. 

The session includes a live demonstration of key features enabled by SMB3.1.1 POSIX Extensions, showcasing examples with multiple servers, including Samba and ksmbd, and their impact on common workloads. Additionally, the discussion will cover requests for new features as Linux filesystem syscalls and capabilities continue to evolve.
 

Bridging Object and File: Implementing SMB Access to Ceph RGW via vfs_ceph_rgw

The transition from traditional file storage to object-based architectures often leaves a gap for legacy applications that require POSIX file semantics. In this presentation Vinit Agnihotri (IBM) examines the implementation of SMB over Rados Gateway (RGW), a solution that allows Ceph object storage buckets to be mounted as standard file systems using the Samba file server. By mapping buckets as shares, this integration enables S3 data access without requiring changes to application code, while maintaining support for standard UNIX permissions.

At the core of this stack is librgw, which provides a complete RGW instance and exports C-style APIs for user interaction. We will explore how the vfs_ceph_rgw module facilitates this by instantiating and configuring librgw directly within the Samba environment. This includes a look at how VFS module parameters are used to pass critical Ceph-specific configurations—such as user credentials, access keys, and cluster configuration files—to
the underlying library.

The session will focus on the technical mechanics of this object-to-file; translation and provide a transparent look at the architectural constraints involved. We will discuss the specific limitations inherited from the librgw layer, particularly regarding POSIX operations that do not map naturally to object storage, such as random
writes, directory renaming, and symbolic links. Attendees will gain a clear understanding of the internal architecture, the configuration workflow, and the technical trade-offsnecessary when using Samba as a gateway to Ceph object storage.

Enforcing strong authentication across the trust boundary between FreeIPA and Active Directory

MIT Kerberos implements a concept of authentication indicators (RFC8129) to allow identifying how initial authentication has been performed by a Kerberos principal. Authentication indicators allow to differentiate between use of a smartcard or a simple password-based pre-authentication mechanism, for example. Indicators can be verified by KDC or by a Kerberos service to allow flexible authorization policies.

On Active Directory side there is no way to guarantee that a particular user obtained its initial TGT with the help of a specific pre-authentication method. For this purpose, Microsoft has added an extension called Authentication Mechanism Assertion (AMA) which provides a mapping of a certificate extension OID to a dynamic group ownership in the PAC record.

In this talk Alexander Bokovoy (Red Hat) will describe an ongoing work to make these two mechanisms compatible in FreeIPA-Active Directory environment.  

Taming Async I/O in Samba: Inside vfs_aio_ratelimit

As CephFS-backed SMB deployments grow in scale, operators need a practical way to control per-share I/O behavior. To address this need, Samba introduced vfs_aio_ratelimit, a stackable VFS module that enables share-level rate limiting for asynchronous I/O.

Avan Thakars (IBM) talk first revisits the original motivation, design, and constraints behind introducing vfs_aio_ratelimit. The initial implementation supports read and write IOPS and bandwidth limits at the per-smbd process level, enforcing limits by injecting calculated delays when configured thresholds are exceeded, while preserving Samba’s non-blocking, event-driven I/O model.
The session then focuses on recent and ongoing enhancements. A major improvement is the introduction of burst-aware rate limiting, allowing administrators to specify the maximum burst permitted for read and write operations instead of explicitly configuring maximum delays. This simplifies configuration and provides more natural behavior under bursty workloads.
The talk also covers work in progress toward cluster-wide rate limiting, which is required for consistent enforcement across all nodes in a clustered Samba deployment. This includes local TDB-based persistence of rate limiter state and a planned messaging-based synchronization mechanism for cluster-wide coordination. 

Finally, the talk demonstrates how vfs_aio_ratimit is already integrated into CephFS SMB QoS, where it is actively used by the Ceph SMB manager module. A live demo will show how rate limits are configured and applied using existing Ceph SMB management commands.

Lunch Break

Integrating Samba-AD in real networks from a technical PoV

In the last 15 years, from the early 4.0.0 alphas to 4.24.0, Samba-AD has come a long way from a rough ride to a stable and mature product. It is a real achievement. Kudos to the Samba team. 

Nevertheless AD is never playing alone, and there is a whole ecosystem around. Making Samba-AD a real alternative involves making sure that it plays nicely with everything currently running in the network. 

In this talk, Dennis Cardon (Tranquil IT) will take us to a more technical dive into the meanders of certificate services, identity federation, security audit, authentication issues, and other stuff that keep us busy and stay alert day after day.

Apache managed SSO for web-applications, with or without Kerberos Ticket

In this talk Kees van Vloten shows how to setup the components needed to allow OIDC based SSO on an internal website. We will take a look at the application-group in Samba-AD, the configuration of Keycloak with Samba-AD as a backend and the authentication in Apache of web-applications.

Samba and the AI security tsunami

The current wave of LLM-based tools extends the domain of static analysis beyond code in isolation into the environment and the domain of interactions between components. This has led to a large number of bug reports for high profile  open source projects. Many of these reports are invalid or low value, but there have been some real bugs found.

This talk from Douglas Bagnall (Catalyst IT) is about how Samba is faring, which at the time of writing this abstract might be summarised as OK but a little bit weary.

Changes in the Samba VFS

The Virtual File System is Samba's window to the objects it serves to clients. It has seen a lot of changes in the past, one of the major revisions was moving towards at-based VFS calls to protect against vulnerabilities based on symlink races.  Together with the completion of smb311 unix extensions, symlink handling has changed in Samba: These days all symbolic links are followed and checked in user space by smbd, closing a lot of time-of-check/time-of-use races.

The VFS has also moved away from using path and file names whereever possible. Recent modifications converted the calculation of free disk space and quotas away from path names to file descriptors, which are safe against symlink races.

One recent insight is handling of the current working directory: The VFS right now carries a full-fledged chdir-Call that allows changing smb's current working directory to an arbitrary subdirectory within a share. With the change to use path names as little as possible, this is no longer necessary. Samba only ever changes into the root directory of a share.

A more fundamental change is right now in the planning phase: Given that Samba can open the share root directory as a file descriptor and use that as the dirfd argument to all at-based VFS operations, there is no need to switch smbds current working directory anymore.

All these changes should make life for VFS developers easier.

Coffee Break

The Future of SMB3

The SMB3 protocol has reached 20 years of development. From the 2006 Windows SMB2.02 first release, to 2016. many SMB3.1.1 implementations and today, ten years later still growing, it has achieved many, many groundbreaking capabilities in a filesharing protocol.

The Samba team is even longer into its SMB journey (across all dialects!), and deserves great credit for its high quality, versatile implementations. Many other companies are making similar contributions extending SMB3 far beyond what Microsoft originally presented. 

So Tom Talpey asks the question: who owns the future of SMB3?

Panel Discussion

More & Beyond: Community Side Events

SNIA SMB3 Interoperability Lab EMEA

The SMB3 IO Lab, hosted by SNIA and sponsored by Microsoft, takes place on April 21–23, right after sambaXP. It offers a dedicated space for hands-on interoperability testing, exploring new SMB features, and collaborating with the Windows Protocol team. To participate, select the option during ticket purchase—your contact details will be shared with SNIA for separate registration. This is a unique chance to engage with experts, test your implementation, and network with professionals from around the world. For more information and registration, please visit the SNIA event website.

 Get your ticket @SNIA 

Himmelblau Workshop: Linux Integration with Entra ID & Intune

The Himmelblau Workshop, taking place on April 22, offers a hands-on session on integrating Linux clients—both with and without a graphical user interface—into Entra ID and managing them in Intune. Participants will learn how to set up authentication, multi-factor login, policies, and license management using the current stable version of Himmelblau. No prior experience or personal Entra ID environment is required, as accounts will be provided for the workshop. This is a unique opportunity to explore practical Linux integration with guidance from experts. Click here to register.

Get Your Ticket

Venue

Hotel FREIZEIT IN

Dransfelder Straße 3
37079 Göttingen, Germany

Tel: +49 551 9001-0
Fax: +49 551 9001-100
E-Mail: info@remove-this.freizeit-in.de

Get Direction

Room Booking


 

Contact

sambaXP is organised by SerNet:

SerNet GmbH
Bahnhofsallee 1b
37081 Goettingen
Germany

phone: +49 551 370000-0
email: contact@remove-this.sernet.de

Managing Directors: Reinhild Jung, Oliver Seufer

Datenschutzerklärungdata protection declaration

everything that matters sambaXP:

phone: +49 551 370000-0
e-mail: loc@remove-this.sambaxp.org