Ignore:
Timestamp:
Nov 24, 2016, 1:14:11 PM (9 years ago)
Author:
Silvan Scherrer
Message:

Samba Server: update vendor to version 4.4.3

File:
1 edited

Legend:

Unmodified
Added
Removed
  • vendor/current/docs-xml/Samba3-HOWTO/TOSHARG-PDC.xml

    r414 r988  
    145145
    146146<para>
    147 The following functionalities are new to the Samba-3 release:
     147The following functionalities are an overview of some of the features
     148in the Samba-4 release:
    148149</para>
    149150
     
    151152        <listitem><para>
    152153        <indexterm><primary>account</primary><secondary>backend</secondary></indexterm>
    153         Samba-3 supports the use of a choice of backends that may be used in which user, group and machine
    154         accounts may be stored. Multiple passwd backends can be used in combination, either as additive backend
    155         data sets, or as fail-over data sets.
     154        Samba-4 supports the use of a choice of backends that may be used in which user, group and machine
     155        accounts may be stored, but only when acting as a classic
     156        (NT4) domain controller,
     157        but not when it is acting as an Active Directory Domain Controller.
    156158        </para>
    157159
     
    163165        <indexterm><primary>reliability</primary></indexterm>
    164166        An LDAP passdb backend confers the benefit that the account backend can be distributed and replicated,
    165         which is of great value because it confers scalability and provides a high degree of reliability.
     167        which is of great value because it confers scalability and
     168        provides a high degree of reliability.  This may be used when
     169        Samba-4 is acting as an classic (NT4-like) domain controller,
     170        but not when it is acting as an Active Directory Domain Controller.
    166171        </para></listitem>
    167172
     
    170175        <indexterm><primary>trust account</primary><secondary>interdomain</secondary></indexterm>
    171176        <indexterm><primary>interoperability</primary></indexterm>
    172         Windows NT4 domain trusts. Samba-3 supports workstation and server (machine) trust accounts. It also
     177        Windows NT4 domain trusts. Samba-4 supports workstation and server (machine) trust accounts. It also
    173178        supports Windows NT4 style interdomain trust accounts, which further assists in network scalability
    174         and interoperability.
     179        and interoperability, but only when itself is an classic
     180        (NT4-like) domain controller.
    175181        </para></listitem>
    176182       
     
    183189        <indexterm><primary>network</primary><secondary>browsing</secondary></indexterm>
    184190        Operation without NetBIOS over TCP/IP, rather using the raw SMB over TCP/IP. Note, this is feasible
    185         only when operating as a Microsoft active directory domain member server. When acting as a Samba domain
     191        only when operating as a Microsoft active directory domain
     192        member server. When acting as a Samba classic (NT4-like) domain
    186193        controller the use of NetBIOS is necessary to provide network browsing support.
    187194        </para></listitem>
     
    191198        <indexterm><primary>TCP port</primary></indexterm>
    192199        <indexterm><primary>session services</primary></indexterm>
    193         Samba-3 provides NetBIOS name services (WINS), NetBIOS over TCP/IP (TCP port 139) session services, SMB over
     200        Samba-4 provides NetBIOS name services (WINS), NetBIOS over TCP/IP (TCP port 139) session services, SMB over
    194201        TCP/IP (TCP port 445) session services, and Microsoft compatible ONC DCE RPC services (TCP port 135)
    195202        services.
    196203        </para></listitem>
    197204
     205
    198206        <listitem><para>
    199         <indexterm><primary>Nexus.exe</primary></indexterm>
    200         Management of users and groups via the User Manager for Domains. This can be done on any MS Windows client
    201         using the <filename>Nexus.exe</filename> toolkit for Windows 9x/Me, or using the SRVTOOLS.EXE package for MS
    202         Windows NT4/200x/XP platforms. These packages are available from Microsoft's Web site.
     207        <indexterm><primary>kerberos</primary></indexterm>
     208        <indexterm><primary>active directory</primary></indexterm>
     209        Acting as a Windows 2000 active directory domain controller
     210        (i.e., Kerberos and Active Directory).
    203211        </para></listitem>
    204212
    205213        <listitem><para>
    206         Implements full Unicode support. This simplifies cross-locale internationalization support. It also opens up
    207         the use of protocols that Samba-2.2.x had but could not use due to the need to fully support Unicode.
     214        <indexterm><primary>MMC</primary></indexterm>
     215        <indexterm><primary>SVRTOOLS.EXE</primary></indexterm>
     216        <indexterm><primary>Microsoft management console</primary><see>MMC</see></indexterm>
     217        The Windows 200x/XP Microsoft Management Console (MMC) can be
     218        used to manage a Samba-4 server, when it is an Active
     219        Directory Domain Controller.  When acting as a classic (NT4)
     220        domain controller, you
     221        can use only the MS Windows NT4 Domain Server Manager and the MS Windows NT4 Domain User Manager. Both are
     222        part of the SVRTOOLS.EXE package mentioned later.
    208223        </para></listitem>
    209224</itemizedlist>
    210225
    211226<para>
    212 The following functionalities are not provided by Samba-3:
     227The following functionalities are not provided by Samba-4:
    213228</para>
    214229
     
    218233        <indexterm><primary>replication</primary></indexterm>
    219234        SAM replication with Windows NT4 domain controllers (i.e., a Samba PDC and a Windows NT BDC, or vice versa).
    220         This means Samba cannot operate as a BDC when the PDC is Microsoft-based Windows NT PDC. Samba-3 can not
     235        This means Samba cannot operate as a BDC when the PDC is Microsoft-based Windows NT PDC. Samba-4 can not
    221236        participate in replication of account data to Windows PDCs and BDCs.
    222237        </para></listitem>
    223238       
    224         <listitem><para>
    225         <indexterm><primary>kerberos</primary></indexterm>
    226         <indexterm><primary>active directory</primary></indexterm>
    227         Acting as a Windows 2000 active directory domain controller (i.e., Kerberos and Active Directory). In point of
    228         fact, Samba-3 does have some Active Directory domain control ability that is at this time purely experimental.
    229         Active directory domain control is one of the features that is being developed in Samba-4, the next
    230         generation Samba release. At this time there are no plans to enable active directory domain control
    231         support during the Samba-3 series life-cycle.
    232         </para></listitem>
    233 
    234         <listitem><para>
    235         <indexterm><primary>MMC</primary></indexterm>
    236         <indexterm><primary>SVRTOOLS.EXE</primary></indexterm>
    237         <indexterm><primary>Microsoft management console</primary><see>MMC</see></indexterm>
    238         The Windows 200x/XP Microsoft Management Console (MMC) cannot be used to manage a Samba-3 server. For this you
    239         can use only the MS Windows NT4 Domain Server Manager and the MS Windows NT4 Domain User Manager. Both are
    240         part of the SVRTOOLS.EXE package mentioned later.
    241         </para></listitem>
    242239</itemizedlist>
    243240
    244241<para>
    245 <indexterm><primary>Windows XP Home edition</primary></indexterm>
    246 <indexterm><primary>LanMan</primary></indexterm>
    247 Windows 9x/Me/XP Home clients are not true members of a domain for reasons outlined in this chapter. The
    248 protocol for support of Windows 9x/Me-style network (domain) logons is completely different from NT4/Windows
    249 200x-type domain logons and has been officially supported for some time. These clients use the old LanMan
    250 network logon facilities that are supported in Samba since approximately the Samba-1.9.15 series.
    251 </para>
    252 
    253 <para>
    254242<indexterm><primary>group</primary><secondary>mapping</secondary></indexterm>
    255 Samba-3 implements group mapping between Windows NT groups and UNIX groups (this is really quite complicated
     243Samba implements group mapping between Windows NT groups and UNIX groups (this is really quite complicated
    256244to explain in a short space). This is discussed more fully in <link linkend="groupmapping">Group Mapping: MS
    257245Windows and UNIX</link>.
     
    262250<indexterm><primary>trust account</primary><secondary>machine</secondary></indexterm>
    263251<indexterm><primary>machine account</primary></indexterm>
    264 Samba-3, like an MS Windows NT4 PDC or a Windows 200x Active Directory, needs to store user and Machine Trust
     252Samba-4, like an MS Windows NT4 PDC or a Windows 200x Active Directory, needs to store user and Machine Trust
    265253Account information in a suitable backend data-store.  Refer to <link linkend="machine-trust-accounts">MS
    266 Windows Workstation/Server Machine Trust Accounts</link>. With Samba-3 there can be multiple backends for
    267 this. A complete discussion of account database backends can be found in <link linkend="passdb">Account
     254Windows Workstation/Server Machine Trust Accounts</link>. A complete discussion of account database backends can be found in <link linkend="passdb">Account
    268255Information Databases</link>.
    269256</para>
     
    323310system. It is often assumed that such a centralized system will use a single authentication infrastructure
    324311that can be used by all information systems. The Microsoft Windows NT4 security domain architecture and the
    325 Micrsoft active directory service are often put forward as the ideal foundation for such a system. It is
     312Microsoft active directory service are often put forward as the ideal foundation for such a system. It is
    326313conceptually simple to install an external authentication agent on each of the disparate infromation systems
    327314that can then use the Microsoft (NT4 domain or ads service) for user authentication and access control. The
     
    426413Primary domain control, if it is to be scalable to meet the needs of large sites, must therefore be capable of
    427414using LDAP. The rapid adoption of OpenLDAP, and Samba configurations that use it, is ample proof that the era
    428 of the directory has started. Samba-3 does not demand the use of LDAP, but the demand for a mechanism by which
     415of the directory has started. Samba does not demand the use of LDAP, but the demand for a mechanism by which
    429416user and group identity information can be distributed makes it an an unavoidable option.
    430417</para>
     
    434421<indexterm><primary>LDAP</primary></indexterm>
    435422<indexterm><primary>e-Directory</primary></indexterm>
    436 At this time, the use of Samba based BDCs, necessitates the use of LDAP. The most commonly used LDAP
     423At this time, the use of Samba based BDCs, necessitates the use of
     424either the Samba-4 Active Directory Domain controller or, for classic
     425(NT4-like)domains an LDAP backend. The most commonly used LDAP
    437426implementation used by Samba sites is OpenLDAP. It is possible to use any standards compliant LDAP server.
    438427Those known to work includes those manufactured by: IBM, CA, Novell (e-Directory), and others.
     
    477466<indexterm><primary>authenticatior</primary></indexterm>
    478467<indexterm><primary>synchronization</primary></indexterm>
     468<indexterm><primary>FSMO</primary></indexterm>
     469<indexterm><primary>Flexible Single Master Operator</primary><see>FSMO</see></indexterm>
    479470<indexterm><primary>Security Account Manager</primary><see>SAM</see></indexterm>
    480471In the case of MS Windows NT4-style domains, it is the PDC that initiates a new domain control database.
    481472This forms a part of the Windows registry called the Security Account Manager (SAM). It plays a key
    482473part in NT4-type domain user authentication and in synchronization of the domain authentication
    483 database with BDCs.
    484 </para>
    485 
    486 <para>
    487 <indexterm><primary>domain</primary><secondary>controller</secondary><tertiary>hierarchy</tertiary></indexterm>
    488 <indexterm><primary>LDAP</primary></indexterm>
    489 <indexterm><primary>account</primary><secondary>backend</secondary></indexterm>
    490 <indexterm><primary>machine account</primary></indexterm>
    491 With MS Windows 200x Server-based Active Directory domains, one domain controller initiates a potential
    492 hierarchy of domain controllers, each with its own area of delegated control. The master domain
    493 controller has the ability to override any downstream controller, but a downline controller has
    494 control only over its downline. With Samba-3, this functionality can be implemented using an
    495 LDAP-based user and machine account backend.
     474database with BDCs.  With Active Directory domains, while some servers
     475may be a Flexible Single Master Operator (FSMO) role owner (and
     476therefore hold the monopoly for certain operations), it is in general
     477a distributed, multi-master replicated directory.
    496478</para>
    497479
     
    499481<indexterm><primary>backend database</primary></indexterm>
    500482<indexterm><primary>registry</primary></indexterm>
    501 New to Samba-3 is the ability to use a backend database that holds the same type of data as the NT4-style SAM
    502 database (one of the registry files)<footnote><para>See also <link linkend="passdb">Account Information
     483Samba-4 can use a backend database that holds the same type of data as the NT4-style SAM
     484database (one of the registry files).  For BDC/BDC operations in a
     485classic domain, this functionality can be implemented using an
     486LDAP-based user and machine account backend.  The Samba-4 Active
     487Directory Domain controller implements the required storage internally.<footnote><para>See also <link linkend="passdb">Account Information
    503488Databases</link>.</para></footnote>
    504489</para>
     
    527512<indexterm><primary>demote</primary></indexterm>
    528513A Windows NT4 BDC can be promoted to a PDC. If the PDC is online at the time that a BDC is promoted to PDC,
    529 the previous PDC is automatically demoted to a BDC. With Samba-3, this is not an automatic operation; the PDC
     514the previous PDC is automatically demoted to a BDC. With Samba, this is not an automatic operation; the PDC
    530515and BDC must be manually configured, and other appropriate changes also need to be made.
    531516</para>
     
    548533</itemizedlist>
    549534
    550 <note><para>
    551 <indexterm><primary>promote</primary></indexterm>
    552 Algin Technology LLC provide a commercial tool that makes it possible to promote a Windows NT4 standalone
    553 server to a PDC or a BDC, and also permits this process to be reversed. Refer to the <ulink
    554 url="http://utools.com/UPromote.asp">Algin</ulink> web site for further information.
    555 </para></note>
    556 
    557535<para>
    558536<indexterm><primary>domain</primary><secondary>control</secondary><tertiary>role</tertiary></indexterm>
    559537<indexterm><primary>native member</primary></indexterm>
    560 Samba-3 servers can readily be converted to and from domain controller roles through simple changes to the
    561 &smb.conf; file. Samba-3 is capable of acting fully as a native member of a Windows 200x server Active
     538Samba servers can readily be converted to and from domain controller roles through simple changes to the
     539&smb.conf; file. Samba is capable of acting fully as a native member of a Windows 200x server Active
    562540Directory domain.
    563541</para>
     
    573551<indexterm><primary>replication</primary><secondary>SAM</secondary></indexterm>
    574552<indexterm><primary>SAM</primary><secondary>replication</secondary></indexterm>
    575 New to Samba-3 is the ability to function fully as an MS Windows NT4-style domain controller,
    576 excluding the SAM replication components. However, please be aware that Samba-3 also supports the
     553New to Samba is the ability to function fully as an MS Windows NT4-style domain controller,
     554excluding the SAM replication components. However, please be aware that Samba also supports the
    577555MS Windows 200x domain control protocols.
    578556</para>
    579 
    580 <para>
    581 <indexterm><primary>ADS</primary></indexterm>
    582 At this time any appearance that Samba-3 is capable of acting as a <emphasis>domain controller</emphasis> in
    583 native ADS mode is limited and experimental in nature.  This functionality should not be used until the Samba
    584 Team offers formal support for it.  At such a time, the documentation will be revised to duly reflect all
    585 configuration and management requirements. Samba can act as a NT4-style domain controller in a Windows 2000/XP
    586 environment. However, there are certain compromises:
    587 </para>
    588 
    589 <itemizedlist>
    590         <listitem><para>No machine policy files.</para></listitem>
    591         <listitem><para>No Group Policy Objects.</para></listitem>
    592         <listitem><para>No synchronously executed Active Directory logon scripts.</para></listitem>
    593         <listitem><para>Can't use Active Directory management tools to manage users and machines.</para></listitem>
    594         <listitem><para>Registry changes tattoo the main registry, while with Active Directory they do not leave
    595                 permanent changes in effect.</para></listitem>
    596         <listitem><para>Without Active Directory you cannot perform the function of exporting specific
    597                 applications to specific users or groups.</para></listitem>
    598 </itemizedlist>
    599557
    600558</sect2>
     
    647605
    648606<para>
    649 The following are necessary for configuring Samba-3 as an MS Windows NT4-style PDC for MS Windows
     607The following are necessary for configuring Samba as an MS Windows NT4-style PDC for MS Windows
    650608NT4/200x/XP clients:
    651609</para>
     
    663621</itemizedlist>
    664622
    665 <para>
    666 The following provisions are required to serve MS Windows 9x/Me clients:
    667 </para>
    668 
    669 <itemizedlist>
    670         <listitem><para>Configuration of basic TCP/IP and MS Windows networking.</para></listitem>
    671         <listitem><para>Correct designation of the server role (<smbconfoption name="security">user</smbconfoption>).</para></listitem>
    672         <listitem><para>Network logon configuration (since Windows 9x/Me/XP Home are not technically domain
    673         members, they do not really participate in  the security aspects of Domain logons as such).</para></listitem>
    674         <listitem><para>Roaming profile configuration.</para></listitem>
    675         <listitem><para>Configuration of system policy handling.</para></listitem>
    676         <listitem><para>Installation of the network driver <quote>Client for MS Windows Networks</quote> and configuration
    677         to log onto the domain.</para></listitem>
    678         <listitem><para>Placing Windows 9x/Me clients in user-level security &smbmdash; if it is desired to allow
    679         all client-share access to be controlled according to domain user/group identities.</para></listitem>
    680         <listitem><para>Adding and managing domain user accounts.</para></listitem>
    681 </itemizedlist>
    682 
    683623<note><para>
    684624<indexterm><primary>roaming profiles</primary></indexterm>
     
    727667It is rather easy to configure Samba to provide these. Each Samba domain controller must provide the NETLOGON
    728668service that Samba calls the <smbconfoption name="domain logons"/> functionality (after the name of the
    729 parameter in the &smb.conf; file). Additionally, one server in a Samba-3 domain must advertise itself as the
     669parameter in the &smb.conf; file). Additionally, one server in a Samba domain must advertise itself as the
    730670domain master browser.<footnote><para>See <link linkend="NetworkBrowsing">Network
    731671Browsing</link>.</para></footnote> This causes the PDC to claim a domain-specific NetBIOS name that identifies
     
    755695<smbconfoption name="workgroup"><replaceable>&example.workgroup;</replaceable></smbconfoption>
    756696<smbconfoption name="passdb backend">tdbsam</smbconfoption>
    757 <smbconfoption name="os level">33</smbconfoption>
    758 <smbconfoption name="preferred master">auto</smbconfoption>
    759 <smbconfoption name="domain master">yes</smbconfoption>
    760 <smbconfoption name="local master">yes</smbconfoption>
    761697<smbconfoption name="security">user</smbconfoption>
    762698<smbconfoption name="domain logons">yes</smbconfoption>
     
    810746        <varlistentry><term>Domain Control Parameters </term>
    811747                <listitem><para>
    812                 <indexterm><primary>os level</primary></indexterm>
    813                 <indexterm><primary>preferred master</primary></indexterm>
    814                 <indexterm><primary>domain master</primary></indexterm>
    815748                <indexterm><primary>network</primary><secondary>logon</secondary></indexterm>
    816                 The parameters <emphasis>os level, preferred master, domain master, security,
    817                 encrypt passwords</emphasis>, and <emphasis>domain logons</emphasis> play a central role in assuring domain
     749                The parameters <emphasis>domain logons</emphasis>
     750                parameter is the key parameter indicating domain
    818751                control and network logon support.
    819                 </para>
    820 
    821                 <para>
    822                 <indexterm><primary>DMB</primary></indexterm>
    823                 <indexterm><primary>encryped password</primary></indexterm>
    824                 The <emphasis>os level</emphasis> must be set at or above a value of 32. A domain controller
    825                 must be the DMB, must be set in <emphasis>user</emphasis> mode security,
    826                 must support Microsoft-compatible encrypted passwords, and must provide the network logon
    827                 service (domain logons). Encrypted passwords must be enabled. For more details on how
    828                 to do this, refer to <link linkend="passdb">Account Information Databases</link>.
    829752                </para></listitem>
    830753        </varlistentry>
     
    867790                This share is used to store user desktop profiles. Each user must have a directory at the root
    868791                of this share. This directory must be write-enabled for the user and must be globally read-enabled.
    869                 Samba-3 has a VFS module called <quote>fake_permissions</quote> that may be installed on this share. This will
     792                Samba has a VFS module called <quote>fake_permissions</quote> that may be installed on this share. This will
    870793                allow a Samba administrator to make the directory read-only to everyone. Of course this is useful
    871794                only after the profile has been properly created.
     
    884807<smbconfoption name="workgroup">&example.workgroup;</smbconfoption>
    885808<smbconfoption name="domain logons">Yes</smbconfoption>
    886 <smbconfoption name="domain master">Yes</smbconfoption>
    887809<smbconfoption name="security">User</smbconfoption>
    888810</smbconfblock>
     
    901823<para>
    902824<indexterm><primary>active directory</primary></indexterm>
    903 Samba-3 is not, and cannot act as, an Active Directory server. It cannot truly function as an Active Directory
    904 PDC. The protocols for some of the functionality of Active Directory domain controllers has been partially
    905 implemented on an experimental only basis. Please do not expect Samba-3 to support these protocols. Do not
    906 depend on any such functionality either now or in the future. The Samba Team may remove these experimental
    907 features or may change their behavior. This is mentioned for the benefit of those who have discovered secret
    908 capabilities in Samba-3 and who have asked when this functionality will be completed. The answer is maybe
    909 someday or maybe never!
     825Samba-4 is also available as an Active Directory server. It can truly function as an Active Directory
     826PDC. The protocols for some of the functionality of Active Directory
     827domain controllers has been implemented.
    910828</para>
    911829
     
    913831<indexterm><primary>domain controllers</primary></indexterm>
    914832<indexterm><primary>active directory</primary></indexterm>
    915 To be sure, Samba-3 is designed to provide most of the functionality that Microsoft Windows NT4-style
    916 domain controllers have. Samba-3 does not have all the capabilities of Windows NT4, but it does have
    917 a number of features that Windows NT4 domain controllers do not have. In short, Samba-3 is not NT4 and it
    918 is not Windows Server 200x: it is not an Active Directory server. We hope this is plain and simple
    919 enough for all to understand.
     833<indexterm><primary>classic domain support</primary></indexterm>
     834To be sure, Samba-4 is also designed to provide most of the functionality that Microsoft Windows NT4-style
     835domain controllers have. Samba-4 does not have all the capabilities of Windows NT4, but it does have
     836a number of features that Windows NT4 domain controllers do not
     837have. We call it a <emphasis>classic domain</emphasis> controller for
     838this reason, as in short, Samba-4 when acting in this mode is not NT4,
     839and the Active Directory Domain Control aspect is a distinct capability.
    920840</para>
    921841
     
    937857<indexterm><primary>domain logon</primary></indexterm>
    938858All domain controllers must run the netlogon service (<emphasis>domain logons</emphasis>
    939 in Samba). One domain controller must be configured with <smbconfoption name="domain master">Yes</smbconfoption>
     859in Samba). One domain controller must be configured without the
     860<smbconfoption name="domain master"></smbconfoption> parameter
    940861(the PDC); on all BDCs set the parameter <smbconfoption name="domain master">No</smbconfoption>.
    941862</para>
     
    949870<smbconfsection name="[global]"/>
    950871<smbconfoption name="domain logons">Yes</smbconfoption>
    951 <smbconfoption name="domain master">(Yes on PDC, No on BDCs)</smbconfoption>
     872<smbconfoption name="domain master">(omit on PDC, No on BDCs)</smbconfoption>
    952873
    953874<smbconfsection name="[netlogon]"/>
     
    961882</sect3>
    962883<sect3>
    963 <title>The Special Case of MS Windows XP Home Edition</title>
    964 
    965 <para>
    966 <indexterm><primary>Windows XP Home edition</primary></indexterm>
    967 To be completely clear: If you want MS Windows XP Home Edition to integrate with your
     884<title>The Special Case of MS Windows Home Editions</title>
     885
     886<para>
     887<indexterm><primary>Windows Home editions</primary></indexterm>
     888To be completely clear: If you want MS Windows Home Editions to integrate with your
    968889MS Windows NT4 or Active Directory domain security, understand it cannot be done.
    969 The only option is to purchase the upgrade from MS Windows XP Home Edition to
    970 MS Windows XP Professional.
     890The only option is to purchase the upgrade from MS Windows Home Edition to
     891a MS Windows Professional edition.
    971892</para>
    972893
    973894<note><para>
    974 MS Windows XP Home Edition does not have the ability to join any type of domain
    975 security facility. Unlike MS Windows 9x/Me, MS Windows XP Home Edition also completely
    976 lacks the ability to log onto a network.
     895MS Windows Home Editions do not have the ability to join any type of domain
     896security facility. Unlike MS Windows 9x/Me, MS Windows Home Edition
     897deliberatly lacks the ability to log onto a network.
    977898</para></note>
    978899
     
    986907</sect3>
    987908
    988 <sect3>
    989 <title>The Special Case of Windows 9x/Me</title>
    990 
    991 <para>
    992 <indexterm><primary>domain</primary></indexterm>
    993 <indexterm><primary>workgroup</primary></indexterm>
    994 <indexterm><primary>authentication</primary></indexterm>
    995 <indexterm><primary>browsing</primary></indexterm>
    996 <indexterm><primary>rights</primary></indexterm>
    997 A domain and a workgroup are exactly the same in terms of network
    998 browsing. The difference is that a distributable authentication
    999 database is associated with a domain, for secure login access to a
    1000 network. Also, different access rights can be granted to users if they
    1001 successfully authenticate against a domain logon server. Samba-3 does this
    1002 now in the same way as MS Windows NT/200x.
    1003 </para>
    1004 
    1005 <para>
    1006 <indexterm><primary>browsing</primary></indexterm>
    1007 The SMB client logging on to a domain has an expectation that every other
    1008 server in the domain should accept the same authentication information.
    1009 Network browsing functionality of domains and workgroups is identical and
    1010 is explained in this documentation under the browsing discussions.
    1011 It should be noted that browsing is totally orthogonal to logon support.
    1012 </para>
    1013 
    1014 <para>
    1015 <indexterm><primary>single-logon</primary></indexterm>
    1016 <indexterm><primary>domain logons</primary></indexterm>
    1017 <indexterm><primary>network logon</primary></indexterm>
    1018 Issues related to the single-logon network model are discussed in this
    1019 section. Samba supports domain logons, network logon scripts, and user
    1020 profiles for MS Windows for Workgroups and MS Windows 9x/Me clients,
    1021 which are the focus of this section.
    1022 </para>
    1023 
    1024 <para>
    1025 <indexterm><primary>broadcast request</primary></indexterm>
    1026 When an SMB client in a domain wishes to log on, it broadcasts requests for a logon server. The first one to
    1027 reply gets the job and validates its password using whatever mechanism the Samba administrator has installed.
    1028 It is possible (but ill advised) to create a domain where the user database is not shared between servers;
    1029 that is, they are effectively workgroup servers advertising themselves as participating in a domain. This
    1030 demonstrates how authentication is quite different from but closely involved with domains.
    1031 </para>
    1032 
    1033 <para>
    1034 Using these features, you can make your clients verify their logon via
    1035 the Samba server, make clients run a batch file when they log on to
    1036 the network and download their preferences, desktop, and start menu.
    1037 </para>
    1038 
    1039 <para><emphasis>
    1040 MS Windows XP Home edition is not able to join a domain and does not permit the use of domain logons.
    1041 </emphasis></para>
    1042 
    1043 <para>
    1044 Before launching into the configuration instructions, it is worthwhile to look at how a Windows 9x/Me client
    1045 performs a logon:
    1046 </para>
    1047 
    1048 <orderedlist>
    1049 <listitem>
    1050         <para>
    1051         <indexterm><primary>DOMAIN&lt;1C&gt;</primary></indexterm>
    1052         <indexterm><primary>logon server</primary></indexterm>
    1053         The client broadcasts (to the IP broadcast address of the subnet it is in)
    1054         a NetLogon request. This is sent to the NetBIOS name DOMAIN&lt;1C&gt; at the
    1055         NetBIOS layer. The client chooses the first response it receives, which
    1056         contains the NetBIOS name of the logon server to use in the format of
    1057         <filename>\\SERVER</filename>. The <literal>1C</literal> name is the name
    1058         type that is registered by domain controllers (SMB/CIFS servers that provide
    1059         the netlogon service).
    1060         </para>
    1061 </listitem>
    1062 
    1063 <listitem>
    1064         <para>
    1065         <indexterm><primary>IPC$</primary></indexterm>
    1066         <indexterm><primary>SMBsessetupX</primary></indexterm>
    1067         <indexterm><primary>SMBtconX</primary></indexterm>
    1068         The client connects to that server, logs on (does an SMBsessetupX) and
    1069         then connects to the IPC$ share (using an SMBtconX).
    1070         </para>
    1071 </listitem>
    1072 
    1073 <listitem>
    1074         <para>
    1075         <indexterm><primary>NetWkstaUserLogon</primary></indexterm>
    1076         The client does a NetWkstaUserLogon request, which retrieves the name
    1077         of the user's logon script.
    1078         </para>
    1079 </listitem>
    1080 
    1081 <listitem>
    1082         <para>
    1083         The client then connects to the NetLogon share and searches for said script.   
    1084         If it is found and can be read, it is retrieved and executed by the client.
    1085         After this, the client disconnects from the NetLogon share.
    1086         </para>
    1087 </listitem>
    1088 
    1089 <listitem>
    1090         <para>
    1091         <indexterm><primary>NetUserGetInfo</primary></indexterm>
    1092         <indexterm><primary>profile</primary></indexterm>
    1093         The client sends a NetUserGetInfo request to the server to retrieve
    1094         the user's home share, which is used to search for profiles. Since the
    1095         response to the NetUserGetInfo request does not contain much more than 
    1096         the user's home share, profiles for Windows 9x clients must reside in the user
    1097         home directory.
    1098         </para>
    1099 </listitem>
    1100 
    1101 <listitem>
    1102         <para>
    1103         <indexterm><primary>profiles</primary></indexterm>
    1104         The client connects to the user's home share and searches for the
    1105         user's profile. As it turns out, you can specify the user's home share as
    1106         a share name and path. For example, <filename>\\server\fred\.winprofile</filename>.
    1107         If the profiles are found, they are implemented.
    1108         </para>
    1109 </listitem>
    1110 
    1111 <listitem>
    1112         <para>
    1113         <indexterm><primary>CONFIG.POL</primary></indexterm>
    1114         The client then disconnects from the user's home share and reconnects to
    1115         the NetLogon share and looks for <filename>CONFIG.POL</filename>, the policies file. If this is
    1116         found, it is read and implemented.
    1117         </para>
    1118 </listitem>
    1119 </orderedlist>
    1120 
    1121 <para>
    1122 The main difference between a PDC and a Windows 9x/Me logon server configuration is:
    1123 </para>
    1124 
    1125 <itemizedlist>
    1126 <listitem><para>
    1127         <indexterm><primary>password</primary><secondary>plaintext</secondary></indexterm>
    1128         <indexterm><primary>plaintext password</primary></indexterm>
    1129         Password encryption is not required for a Windows 9x/Me logon server. But note
    1130         that beginning with MS Windows 98 the default setting is that plaintext
    1131         password support is disabled. It can be re-enabled with the registry
    1132         changes that are documented in <link linkend="PolicyMgmt">System and Account Policies</link>.
    1133         </para></listitem>
    1134 
    1135         <listitem><para>
    1136         <indexterm><primary>machine trust account</primary></indexterm>
    1137         Windows 9x/Me clients do not require and do not use Machine Trust Accounts.
    1138         </para></listitem>
    1139 </itemizedlist>
    1140 
    1141 <para>
    1142 <indexterm><primary>network logon services</primary></indexterm>
    1143 A Samba PDC will act as a Windows 9x/Me logon server; after all, it does provide the
    1144 network logon services that MS Windows 9x/Me expect to find.
    1145 </para>
    1146 
    1147 <note><para>
    1148 <indexterm><primary>sniffer</primary></indexterm>
    1149 Use of plaintext passwords is strongly discouraged. Where used they are easily detected
    1150 using a sniffer tool to examine network traffic.
    1151 </para></note>
    1152 
    1153 </sect3>
    1154909</sect2>
    1155910
     
    13381093that the account name is the machine NetBIOS name with a <quote>$</quote> appended to it (i.e.,
    13391094computer_name$). There must be an entry in both the POSIX UNIX system account backend as well as in the
    1340 SambaSAMAccount backend. The default backend for Samba-3 (i.e., the parameter <parameter>passdb
     1095SambaSAMAccount backend. The default backend for Samba (i.e., the parameter <parameter>passdb
    13411096backend</parameter> is not specified in the &smb.conf; file, or if specified is set to
    13421097<literal>smbpasswd</literal>, are respectively the <filename>/etc/passwd</filename> and
     
    13851140effect that the domain controller cannot be found; the other claims that the account does not
    13861141exist in the domain or that the password is incorrect. This may be due to incompatible
    1387 settings between the Windows client and the Samba-3 server for <emphasis>schannel</emphasis>
     1142settings between the Windows client and the Samba server for <emphasis>schannel</emphasis>
    13881143(secure channel) settings or <emphasis>smb signing</emphasis> settings. Check your Samba
    13891144settings for <emphasis>client schannel</emphasis>, <emphasis>server schannel</emphasis>,
     
    14011156
    14021157<para>
    1403 It is important that these be set consistently with the Samba-3 server settings.
     1158It is important that these be set consistently with the Samba server settings.
    14041159</para>
    14051160
Note: See TracChangeset for help on using the changeset viewer.