It works better with the testing package. Tested assigning ACL to a user, to a group of users, and to a group of users and (sub)groups …but there seem to be some corner cases when comparing these actions:
Allowing write permissions to owning group + read-only ACL to a user of that group = user cannot write
Allowing write permissions to owning group (Domain Users) + read-only ACL to a domain user = user cannot write
Allowing write permissions to owning group (Domain Users) + read-only ACL to a group which holds a domain user as a member = user can write
Other notes (just for the record):
ACL entries without assignments are removed from the list.
Subdirectories retain previous permissions (unless reset permissions button is used).
The issue is solved but i still have some concerns about the use of ACLs.
Basically ACLs should be used only to handle very special cases, but I see that many Windows system administrators are used to always set the ACL over shared folder.
I was wondering: should we add a clarification inside the administrator manual with a usage scenario?