- Timestamp:
- Nov 24, 2016, 1:14:11 PM (9 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
vendor/current/docs-xml/Samba3-ByExample/SBE-AddingUNIXClients.xml
r414 r988 307 307 <indexterm><primary>Domain Controller</primary></indexterm> 308 308 The domain member server and the domain member client are at the center of focus in this chapter. 309 Configuration of Samba -3 domain controller is covered in earlier chapters, so if your309 Configuration of Samba domain controller is covered in earlier chapters, so if your 310 310 interest is in domain controller configuration, you will not find that here. You will find good 311 311 oil that helps you to add domain member servers and clients. … … 675 675 <smbconfoption name="idmap gid">10000-20000</smbconfoption> 676 676 <smbconfoption name="winbind trusted domains only">Yes</smbconfoption> 677 <smbconfoption name="printer admin">root</smbconfoption>678 677 <smbconfoption name="printing">cups</smbconfoption> 679 678 … … 949 948 <smbconfoption name="template shell">/bin/bash</smbconfoption> 950 949 <smbconfoption name="winbind separator">+</smbconfoption> 951 <smbconfoption name="printer admin">root</smbconfoption>952 950 <smbconfoption name="hosts allow">192.168.2., 192.168.3., 127.</smbconfoption> 953 951 <smbconfoption name="printing">cups</smbconfoption> … … 1042 1040 <smbconfoption name="printcap name">CUPS</smbconfoption> 1043 1041 <smbconfoption name="wins server">192.168.2.1</smbconfoption> 1044 <smbconfoption name="printer admin">root</smbconfoption>1045 1042 <smbconfoption name="hosts allow">192.168.2., 192.168.3., 127.</smbconfoption> 1046 1043 <smbconfoption name="printing">cups</smbconfoption> … … 1075 1072 <indexterm><primary>Kerberos</primary></indexterm> 1076 1073 <indexterm><primary>Domain Member</primary><secondary>server</secondary></indexterm> 1077 One of the much-sought-after features new to Samba -3is the ability to join an Active Directory1074 One of the much-sought-after features new to Samba is the ability to join an Active Directory 1078 1075 domain using Kerberos protocols. This makes it possible to operate an entire Windows network 1079 1076 without the need to run NetBIOS over TCP/IP and permits more secure networking in general. An 1080 1077 exhaustively complete discussion of the protocols is not possible in this book; perhaps a 1081 later book may explore the intricacies of the NetBIOS-less operation that Samba -3can participate1082 in. For now, we simply focus on how a Samba -3server can be made a domain member server.1078 later book may explore the intricacies of the NetBIOS-less operation that Samba can participate 1079 in. For now, we simply focus on how a Samba server can be made a domain member server. 1083 1080 </para> 1084 1081 … … 1088 1085 <indexterm><primary>Identity resolution</primary></indexterm> 1089 1086 <indexterm><primary>Kerberos</primary></indexterm> 1090 The diagram in <link linkend="ch9-adsdc"/> demonstrates how Samba -3interfaces with1087 The diagram in <link linkend="ch9-adsdc"/> demonstrates how Samba interfaces with 1091 1088 Microsoft Active Directory components. It should be noted that if Microsoft Windows Services 1092 1089 for UNIX (SFU) has been installed and correctly configured, it is possible to use client LDAP 1093 for identity resolution just as can be done with Samba -3when using an LDAP passdb backend.1090 for identity resolution just as can be done with Samba when using an LDAP passdb backend. 1094 1091 The UNIX tool that you need for this, as in the case of LDAP on UNIX/Linux, is the PADL 1095 1092 Software nss_ldap tool-set. Compared with use of winbind and Kerberos, the use of 1096 1093 LDAP-based identity resolution is a little less secure. In view of the fact that this solution 1097 1094 requires additional software to be installed on the Windows 200x ADS domain controllers, 1098 and that means more management overhead, it is likely that most Samba -3ADS client sites1095 and that means more management overhead, it is likely that most Samba ADS client sites 1099 1096 may elect to use winbind. 1100 1097 </para> 1101 1098 1102 1099 <para> 1103 Do not attempt to use this procedure if you are not 100 percent certain that the build of Samba -31100 Do not attempt to use this procedure if you are not 100 percent certain that the build of Samba 1104 1101 you are using has been compiled and linked with all the tools necessary for this to work. 1105 Given the importance of this step, you must first validate that the Samba -3message block1102 Given the importance of this step, you must first validate that the Samba message block 1106 1103 daemon (<command>smbd</command>) has the necessary features. 1107 1104 </para> … … 1127 1124 <step><para> 1128 1125 <indexterm><primary>smbd</primary></indexterm> 1129 Before you try to use Samba -3, you want to know for certain that your executables have1126 Before you try to use Samba, you want to know for certain that your executables have 1130 1127 support for Kerberos and for LDAP. Execute the following to identify whether or 1131 1128 not this build is perhaps suitable for use: … … 1205 1202 <indexterm><primary>validated</primary></indexterm> 1206 1203 The next step is to identify which version of the Kerberos libraries have been used. 1207 In order to permit Samba -3to interoperate with Windows 2003 Active Directory, it is1204 In order to permit Samba to interoperate with Windows 2003 Active Directory, it is 1208 1205 essential that it has been linked with either MIT Kerberos version 1.3.1 or later, 1209 1206 or that it has been linked with Heimdal Kerberos 0.6 plus specific patches. You may … … 1224 1221 1225 1222 <para> 1226 From this point on, you are certain that the Samba -3build you are using has the1227 necessary capabilities. You can now configure Samba -3 and the NSS.1223 From this point on, you are certain that the Samba build you are using has the 1224 necessary capabilities. You can now configure Samba and the NSS. 1228 1225 </para></step> 1229 1226 … … 1275 1272 Joined 'FRAN' to realm 'LONDON.ABMAS.BIZ' 1276 1273 </screen> 1277 You have successfully made your Samba -3server a member of the ADS domain1274 You have successfully made your Samba server a member of the ADS domain 1278 1275 using Kerberos protocols. 1279 1276 </para> … … 1424 1421 <indexterm><primary>Active Directory</primary><secondary>server</secondary></indexterm> 1425 1422 <indexterm><primary>Kerberos</primary></indexterm> 1426 You may now perform final verification that communications between Samba -3winbind and1423 You may now perform final verification that communications between Samba winbind and 1427 1424 the Active Directory server is using Kerberos protocols. Execute the following: 1428 1425 <screen> … … 1520 1517 -------------- End Of Security Descriptor 1521 1518 </programlisting> 1522 And now you have conclusive proof that your Samba -3ADS domain member server1519 And now you have conclusive proof that your Samba ADS domain member server 1523 1520 called <constant>FRAN</constant> is able to communicate fully with the ADS 1524 1521 domain controllers. … … 1529 1526 1530 1527 <para> 1531 Your Samba -3ADS domain member server is ready for use. During training sessions,1528 Your Samba ADS domain member server is ready for use. During training sessions, 1532 1529 you may be asked what is inside the <filename>winbindd_cache.tdb and winbindd_idmap.tdb</filename> 1533 1530 files. Since curiosity just took hold of you, execute the following: … … 1724 1721 <smbconfoption name="winbind enum groups">No</smbconfoption> 1725 1722 <smbconfoption name="winbind nested groups">Yes</smbconfoption> 1726 <smbconfoption name="printer admin">"KPAK\Domain Admins"</smbconfoption>1727 1723 </smbconfblock> 1728 1724 </example> … … 1818 1814 <indexterm><primary>ADAM</primary></indexterm> 1819 1815 <indexterm><primary>ADS</primary></indexterm> 1820 The storage of IDMAP information in LDAP can be used with both NT4/Samba- 3-style domains as well as1816 The storage of IDMAP information in LDAP can be used with both NT4/Samba-style domains as well as 1821 1817 with ADS domains. OpenLDAP is a commonly used LDAP server for this purpose, although any standards-compliant 1822 1818 LDAP server can be used. It is therefore possible to deploy this IDMAP configuration using … … 1852 1848 <para> 1853 1849 <indexterm><primary>realm</primary></indexterm> 1854 In the case of an NT4 or Samba- 3-style domain the <parameter>realm</parameter> is not used, and the1850 In the case of an NT4 or Samba-style domain the <parameter>realm</parameter> is not used, and the 1855 1851 command used to join the domain is <command>net rpc join</command>. The above example also demonstrates 1856 1852 advanced error reporting techniques that are documented in the chapter called "Reporting Bugs" in 1857 <quote>The Official Samba -3HOWTO and Reference Guide, Second Edition</quote> (TOSHARG2).1853 <quote>The Official Samba HOWTO and Reference Guide, Second Edition</quote> (TOSHARG2). 1858 1854 </para> 1859 1855 … … 2195 2191 systems logons (SSO), providing user and group accounts are stored in an LDAP directory. This 2196 2192 provides logon services for UNIX/Linux users, while Windows users obtain their sign-on 2197 support via Samba -3.2193 support via Samba. 2198 2194 </para> 2199 2195 … … 2223 2219 <para> 2224 2220 The following steps provide a Linux system that users can log onto using 2225 Windows NT4 (or Samba -3) domain network credentials:2221 Windows NT4 (or Samba) domain network credentials: 2226 2222 </para> 2227 2223 … … 2756 2752 2757 2753 <para> 2758 Is proper DNS operation necessary for Samba -3plus LDAP? If so, what must I put into2754 Is proper DNS operation necessary for Samba plus LDAP? If so, what must I put into 2759 2755 my DNS configuration? 2760 2756 </para> … … 2818 2814 <para> 2819 2815 Our Windows 2003 Server Active Directory domain runs with NetBIOS disabled. Can we 2820 use Samba -3with that configuration?2816 use Samba with that configuration? 2821 2817 </para> 2822 2818 … … 2856 2852 <primary>authentication</primary> 2857 2853 </indexterm> 2858 No. This is not okay. It means that your Samba -3client has joined the ADS domain as2859 a Windows NT4 client, and Samba -3will not be using Kerberos-based authentication.2854 No. This is not okay. It means that your Samba client has joined the ADS domain as 2855 a Windows NT4 client, and Samba will not be using Kerberos-based authentication. 2860 2856 </para> 2861 2857
Note:
See TracChangeset
for help on using the changeset viewer.