Ignore:
Timestamp:
Nov 24, 2016, 1:14:11 PM (9 years ago)
Author:
Silvan Scherrer
Message:

Samba Server: update vendor to version 4.4.3

File:
1 edited

Legend:

Unmodified
Added
Removed
  • vendor/current/docs-xml/Samba3-ByExample/SBE-MakingHappyUsers.xml

    r746 r988  
    364364        The implementation of Samba BDCs necessitates the installation and configuration of LDAP.
    365365        For this site, you use OpenLDAP, the open source software LDAP server platform. Commercial
    366         LDAP servers in current use with Samba-3 include:
     366        LDAP servers in current use with Samba include:
    367367        </para>
    368368
     
    396396        offerings, it requires that you manually edit the server configuration files and manually
    397397        initialize the LDAP directory database. OpenLDAP itself has only command-line tools to
    398         help you to get OpenLDAP and Samba-3 running as required, albeit with some learning curve challenges.
     398        help you to get OpenLDAP and Samba running as required, albeit with some learning curve challenges.
    399399        </para>
    400400
     
    448448        tools and the creation of shell and Perl scripts a bit
    449449        challenging. OpenLDAP can be easily customized, though it includes
    450         many ready-to-use schemas. Samba-3 provides an OpenLDAP schema file
     450        many ready-to-use schemas. Samba provides an OpenLDAP schema file
    451451        that is required for use as a passdb backend.
    452452        </para>
     
    454454        <para>
    455455        <indexterm><primary>interoperability</primary></indexterm>
    456         For those who are willing to brave the process of installing and configuring LDAP and Samba-3 interoperability,
     456        For those who are willing to brave the process of installing and configuring LDAP and Samba interoperability,
    457457        there are a few nice Web-based tools that may help you to manage your users and groups more effectively.
    458458        The Web-based tools you might like to consider include the
     
    520520        server for UNIX system accounts as well as for Samba. From the OpenLDAP perspective, UNIX system
    521521        accounts are stored POSIX schema extensions. Samba provides its own schema to permit storage of account
    522         attributes Samba needs. Samba-3 can use the LDAP backend to store:
     522        attributes Samba needs. Samba can use the LDAP backend to store:
    523523        </para>
    524524       
     
    540540        <indexterm><primary>UID</primary></indexterm>
    541541        <indexterm><primary>nss_ldap</primary></indexterm>
    542         The use of LDAP with Samba-3 makes it necessary to store UNIX accounts as well as Windows Networking
     542        The use of LDAP with Samba makes it necessary to store UNIX accounts as well as Windows Networking
    543543        accounts in the LDAP backend. This implies the need to use the
    544544        <ulink url="http://www.padl.com/Contents/OpenSourceSoftware.html">PADL LDAP tools</ulink>. The resolution
     
    858858
    859859                <para>
    860                 This book is about Samba-3, so you can confine the printing style to just the smart
     860                This book is about Samba, so you can confine the printing style to just the smart
    861861                style of installation. Those interested in further information regarding intelligent
    862862                printing should review documentation on the Easy Software Products Web site.
     
    12501250
    12511251        <itemizedlist>
    1252                 <listitem><para>Samba-3 PDC Server Configuration</para>
     1252                <listitem><para>Samba PDC Server Configuration</para>
    12531253                        <orderedlist>
    12541254                                <listitem><para>DHCP and DNS servers</para></listitem>
    12551255                                <listitem><para>OpenLDAP server</para></listitem>
    12561256                                <listitem><para>PAM and NSS client tools</para></listitem>
    1257                                 <listitem><para>Samba-3 PDC</para></listitem>
     1257                                <listitem><para>Samba PDC</para></listitem>
    12581258                                <listitem><para>Idealx smbldap scripts</para></listitem>
    12591259                                <listitem><para>LDAP initialization</para></listitem>
     
    12661266                        </orderedlist>
    12671267                </listitem>
    1268                 <listitem><para>Samba-3 BDC Server Configuration</para>
     1268                <listitem><para>Samba BDC Server Configuration</para>
    12691269                        <orderedlist>
    12701270                                <listitem><para>DHCP and DNS servers</para></listitem>
     
    13841384
    13851385        <para>
    1386         Samba-3 and OpenLDAP will have a degree of interdependence that is unavoidable. The method
    1387         for bootstrapping the LDAP and Samba-3 configuration is relatively straightforward. If you
     1386        Samba and OpenLDAP will have a degree of interdependence that is unavoidable. The method
     1387        for bootstrapping the LDAP and Samba configuration is relatively straightforward. If you
    13881388        follow these guidelines, the resulting system should work fine.
    13891389        </para>
     
    17821782                <indexterm><primary>secrets.tdb</primary></indexterm>
    17831783                <indexterm><primary>smbpasswd</primary></indexterm>
    1784                 Samba-3 communicates with the LDAP server. The password that it uses to
     1784                Samba communicates with the LDAP server. The password that it uses to
    17851785                authenticate to the LDAP server must be stored in the <filename>secrets.tdb</filename>
    17861786                file. Execute the following to create the new <filename>secrets.tdb</filename> files
     
    17981798                <indexterm><primary>smbd</primary></indexterm>
    17991799                <indexterm><primary>net</primary><secondary>getlocalsid</secondary></indexterm>
    1800                 Samba-3 generates a Windows Security Identifier (SID) only when <command>smbd</command>
     1800                Samba generates a Windows Security Identifier (SID) only when <command>smbd</command>
    18011801                has been started. For this reason, you start Samba. After a few seconds delay,
    18021802                execute:
     
    18571857
    18581858        <para>
    1859         Your Samba-3 PDC is now ready to communicate with the LDAP password backend. Let's get on with
     1859        Your Samba PDC is now ready to communicate with the LDAP password backend. Let's get on with
    18601860        configuration of the LDAP server.
    18611861        </para>
     
    19261926        <para>
    19271927        <indexterm><primary>Idealx</primary><secondary>smbldap-tools</secondary></indexterm>
    1928         The Idealx scripts, or equivalent, are necessary to permit Samba-3 to manage accounts
     1928        The Idealx scripts, or equivalent, are necessary to permit Samba to manage accounts
    19291929        on the LDAP server. You have chosen the Idealx scripts because they are the best-known
    19301930        LDAP configuration scripts. The use of these scripts will help avoid the necessity
     
    22332233
    22342234        <para>
    2235         At this time, Samba-3 requires that on a PDC all UNIX (POSIX) group accounts that are
     2235        At this time, Samba requires that on a PDC all UNIX (POSIX) group accounts that are
    22362236        mapped (linked) to Windows domain group accounts must be in the LDAP database. It does not
    22372237        hurt to have UNIX user and group accounts in both the system files as well as in the LDAP
     
    22962296        <indexterm><primary>directory</primary><secondary>Computers container</secondary></indexterm>
    22972297        In the following examples, as the LDAP database is initialized, we do create a container
    2298         for Computer (machine) accounts. In the Samba-3 &smb.conf; files, specific use is made
     2298        for Computer (machine) accounts. In the Samba &smb.conf; files, specific use is made
    22992299        of the People container, not the Computers container, for domain member accounts. This is not a
    23002300        mistake; it is a deliberate action that is necessitated by the fact that the resolution of
     
    26732673                <indexterm><primary>ldapsam</primary></indexterm>
    26742674                <indexterm><primary>pdbedit</primary></indexterm>
    2675                 The final validation step involves making certain that Samba-3 can obtain the user
     2675                The final validation step involves making certain that Samba can obtain the user
    26762676                accounts from the LDAP ldapsam passwd backend. Execute the following command as shown:
    26772677<screen>
     
    27582758                <step><para>
    27592759                The server you have so carefully built is now ready for another important step. You
    2760                 start the Samba-3 server and validate its operation. Execute the following to render all
     2760                start the Samba server and validate its operation. Execute the following to render all
    27612761                the processes needed fully operative so that, on system reboot, they are automatically
    27622762                started:
     
    28012801                <step><para>
    28022802                <indexterm><primary>smbclient</primary></indexterm>
    2803                 You may now check Samba-3 operation as follows:
     2803                You may now check Samba operation as follows:
    28042804<screen>
    28052805&rootprompt; smbclient -L massive -U%
     
    28592859        <para>
    28602860        <indexterm><primary>CUPS</primary></indexterm>
    2861         The configuration for Samba-3 to enable CUPS raw-print-through printing has already been
     2861        The configuration for Samba to enable CUPS raw-print-through printing has already been
    28622862        taken care of in the &smb.conf; file. The only preparation needed for <constant>smart</constant>
    2863         printing to be possible involves creation of the directories in which Samba-3 stores
     2863        printing to be possible involves creation of the directories in which Samba stores
    28642864        Windows printing driver files.
    28652865        </para>
     
    29652965
    29662966<sect1 id="sbehap-bldg1">
    2967         <title>Samba-3 BDC Configuration</title>
     2967        <title>Samba BDC Configuration</title>
    29682968
    29692969        <procedure>
     
    30553055                <step><para>
    30563056                <indexterm><primary>smbpasswd</primary></indexterm>
    3057                 You must now set the LDAP administrative password into the Samba-3 <filename>secrets.tdb</filename>
     3057                You must now set the LDAP administrative password into the Samba <filename>secrets.tdb</filename>
    30583058                file by executing this command:
    30593059<screen>
     
    30663066                Now you must obtain the domain SID from the PDC and store it into the
    30673067                <filename>secrets.tdb</filename> file also. This step is not necessary with an LDAP
    3068                 passdb backend because Samba-3 obtains the domain SID from the
     3068                passdb backend because Samba obtains the domain SID from the
    30693069                sambaDomain object it automatically stores in the LDAP backend. It does not hurt to
    30703070                add the SID to the <filename>secrets.tdb</filename>, and if you wish to do so, this
     
    30753075                           for Domain MEGANET2 in secrets.tdb
    30763076</screen>
    3077                 When configuring a Samba-3 BDC that has an LDAP backend, there is no need to take
     3077                When configuring a Samba BDC that has an LDAP backend, there is no need to take
    30783078                any special action to join it to the domain. However, winbind communicates with the
    30793079                domain controller that is running on the localhost and must be able to authenticate,
     
    30953095                        <primary>pdbedit</primary>
    30963096                </indexterm>
    3097                 Verify that user and group account resolution works via Samba-3 tools as follows:
     3097                Verify that user and group account resolution works via Samba tools as follows:
    30983098<screen>
    30993099&rootprompt; pdbedit -L
     
    31243124                <step><para>
    31253125                The server you have so carefully built is now ready for another important step. Now
    3126                 start the Samba-3 server and validate its operation. Execute the following to render all
     3126                start the Samba server and validate its operation. Execute the following to render all
    31273127                the processes needed fully operative so that, upon system reboot, they are automatically
    31283128                started:
     
    31373137&rootprompt; rcwinbind start
    31383138</screen>
    3139                 Samba-3 should now be running and is ready for a quick test. But not quite yet!
     3139                Samba should now be running and is ready for a quick test. But not quite yet!
    31403140                </para></step>
    31413141
Note: See TracChangeset for help on using the changeset viewer.