Changeset 988 for vendor/current/docs-xml/Samba3-HOWTO/TOSHARG-IDMAP.xml
- Timestamp:
- Nov 24, 2016, 1:14:11 PM (9 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
vendor/current/docs-xml/Samba3-HOWTO/TOSHARG-IDMAP.xml
r414 r988 18 18 The Microsoft Windows operating system has a number of features that impose specific challenges 19 19 to interoperability with the operating systems on which Samba is implemented. This chapter deals 20 explicitly with the mechanisms Samba -3(version 3.0.8 and later) uses to overcome one of the20 explicitly with the mechanisms Samba (version 3.0.8 and later) uses to overcome one of the 21 21 key challenges in the integration of Samba servers into an MS Windows networking environment. 22 22 This chapter deals with identity mapping (IDMAP) of Windows security identifiers (SIDs) … … 121 121 <indexterm><primary>SID</primary></indexterm> 122 122 <indexterm><primary>Active Directory</primary></indexterm> 123 Samba -3can act as a Windows NT4 PDC or BDC, thereby providing domain control protocols that124 are compatible with Windows NT4. Samba -3file and print sharing protocols are compatible with123 Samba can act as a Windows NT4 PDC or BDC, thereby providing domain control protocols that 124 are compatible with Windows NT4. Samba file and print sharing protocols are compatible with 125 125 all versions of MS Windows products. Windows NT4, as with MS Active Directory, 126 126 extensively makes use of Windows SIDs. … … 131 131 <indexterm><primary>UID</primary></indexterm> 132 132 <indexterm><primary>GID</primary></indexterm> 133 Samba -3domain member servers and clients must interact correctly with MS Windows SIDs. Incoming133 Samba domain member servers and clients must interact correctly with MS Windows SIDs. Incoming 134 134 Windows SIDs must be translated to local UNIX UIDs and GIDs. Outgoing information from the Samba 135 135 server must provide to MS Windows clients and servers appropriate SIDs. … … 236 236 is an appliance like file server on which no local accounts are configured and 237 237 winbind is used to obtain account credentials from the domain controllers for the 238 domain. The domain control can be provided by Samba -3, MS Windows NT4, or MS Windows238 domain. The domain control can be provided by Samba, MS Windows NT4, or MS Windows 239 239 Active Directory. 240 240 </para> … … 453 453 <para> 454 454 IDMAP information can be written directly to the LDAP server so long as all domain controllers 455 have access to the master (writable) LDAP server. Samba -3at this time does not handle LDAP redirects455 have access to the master (writable) LDAP server. Samba at this time does not handle LDAP redirects 456 456 in the IDMAP backend. This means that it is is unsafe to use a slave (replicate) LDAP server with 457 457 the IDMAP facility. … … 596 596 <smbconfoption name="winbind use default domain">Yes</smbconfoption> 597 597 <smbconfoption name="winbind nested groups">Yes</smbconfoption> 598 <smbconfoption name="printer admin">"BUTTERNET\Domain Admins"</smbconfoption>599 598 </smbconfblock> 600 599 </example> … … 729 728 <smbconfoption name="winbind enum groups">No</smbconfoption> 730 729 <smbconfoption name="winbind nested groups">Yes</smbconfoption> 731 <smbconfoption name="printer admin">"Domain Admins"</smbconfoption>732 730 </smbconfblock> 733 731 </example> … … 822 820 <indexterm><primary>ADAM</primary></indexterm> 823 821 <indexterm><primary>ADS</primary></indexterm> 824 The storage of IDMAP information in LDAP can be used with both NT4/Samba- 3-style domains and822 The storage of IDMAP information in LDAP can be used with both NT4/Samba-style domains and 825 823 ADS domains. OpenLDAP is a commonly used LDAP server for this purpose, although any 826 824 standards-complying LDAP server can be used. It is therefore possible to deploy this IDMAP … … 858 856 <para> 859 857 <indexterm><primary>realm</primary></indexterm> 860 In the case of an NT4 or Samba- 3-style domain the <parameter>realm</parameter> is not used, and the858 In the case of an NT4 or Samba-style domain the <parameter>realm</parameter> is not used, and the 861 859 command used to join the domain is <command>net rpc join</command>. The above example also demonstrates 862 860 advanced error-reporting techniques that are documented in <link linkend="dbglvl">Reporting Bugs</link>.
Note:
See TracChangeset
for help on using the changeset viewer.
