Linux/Unix Active Directory Authentication Integration Using Samba Winbind
|
|
|
- Clementine Conley
- 10 years ago
- Views:
Transcription
1 Linux/Unix Active Directory Authentication Integration Using Samba Winbind March 8, 2006 Prepared By: Edwin Gnichtel
2 Table of Contents INTRODUCTION... 3 HOW WINBIND WORKS... 4 Name Service Switch (NSS)... 4 Pluggable Authentication Modules (PAM)... 5 Kerberos... 6 User and Group Mappings (IDMAP)... 6 Winbind IDMAP Options... 6 Local TDB Database... 6 OpenLDAP as an IDMAP Backend... 7 Active Directory Application Partition as an IDMAP Backend... 7 CONFIGURING WINBIND SUPPORTING COMPONENTS... 8 Configuring Kerberos... 8 Configuring the Name Service Switch... 9 Configuring the PAM Subsystem... 9 CONFIGURING WINBIND Samba Winbind Standard (local IDMAP) Configuration Winbind using LDAP IDMAP Back-End Configuring OpenLDAP to support Winbind IDMAP Winbind IDMAP LDAP configuration Winbind using an Active Directory Application Partition for IDMAP Back-End Configuring Windows Server 2003 Active Directory to support Winbind IDMAP Winbind IDMAP LDAP configuration for AD Application Partitions APPENDIX A. ADDITIONAL RESOURCES APPENDIX B. ACTIVE DIRECTORY SCHEMA EXTENSIONS APPENDIX C. ACKNOWLEDGEMENTS Page 2
3 Introduction Samba is a set of Unix/Linux native components designed to provide Microsoft Windows authentication, file and print services. Samba, combined with its sub components, allows a Unix/Linux system to act much like a Windows Server, including the ability to natively join a Windows Active Directory domain, provide legacy NT 4 style domain services and fully integrated SMB file and printer sharing. This document provides information for configuring the Winbind component of Samba, including the necessary supporting subcomponents used by Winbind. Winbind is a Unix/Linux daemon (service) that provides unified authentication against Windows Server security providers (Domain Controllers). Winbind can be configured to authenticate against either legacy Windows NT SAM domains or against Microsoft Windows Server Active Directory. This document will address AD based authentication only. Page 3
4 How Winbind Works Winbind provides a Unix native view of Active Directory domain accounts and groups through a set of modules that leverage standard Unix components. Specifically, Winbind Name Services Switch (NSS) support and Pluggable Authentication Modules are used to pass requests to the Winbind Daemon which in turn queries the Active Directory (and supporting services, such as LDAP and Kerberos) to obtain the requested information, parse the information and reply to the calling components with the appropriate data. As Winbind interacts with several layers of Unix type authentication subsystem components it is necessary to briefly discuss each of these components. Name Service Switch (NSS) The Name Service Switch, or NSS, is a feature that is present in many UNIX operating systems. It allows system information such as hostnames, mail aliases and user information to be resolved from different sources. For example, a standalone UNIX workstation may resolve system information from a series of flat files stored on the local filesystem. A networked workstation may first attempt to resolve system information from local files, and then consult an NIS database for user information or a DNS server for hostname information. The NSS application programming interface allows Winbind to present itself as a source of system information when resolving UNIX usernames and groups. Winbind uses this interface, and information obtained from a Windows server using MSRPC and LDAP calls (to AD) to provide a new source of account enumeration. Using standard UNIX library calls, one can enumerate the users and groups on a UNIX machine running Winbind and see all users and groups in an AD domain plus any trusted domains as though they were local Unix users and groups. The primary control file for NSS is /etc/nsswitch.conf. When a UNIX application makes a request to do a lookup, the C library looks in /etc/nsswitch.conf for a line that matches the service type being requested, for example the passwd service type is used when user or group names are looked up. This config line specifies which implementations of that service should be tried and in what order. If the passwd config line is: passwd: files example then the C library will first load a module called /lib/libnss_files.so followed by the module /lib/libnss_example.so. The C library will dynamically load each of these modules in turn and call resolver functions within the modules to try to resolve the request. Once the request is resolved, the C library returns the result to the application. This NSS interface provides an easy way for Winbind to hook into the operating system. All that needs to be done is to put libnss_winbind.so in /lib/ then add winbind into Page 4
5 /etc/nsswitch.conf at the appropriate place. The C library will then call Winbind to resolve user and group names. Pluggable Authentication Modules (PAM) Pluggable Authentication Modules, also known as PAM, is a system for abstracting authentication and authorization technologies. With a PAM module it is possible to specify different authentication methods for different system applications without having to recompile these applications. PAM is also useful for implementing a particular policy for authorization. For example, a system administrator may only allow console logins from users stored in the local password file but only allow users resolved from a NIS database to log in over the network. Winbind uses the authentication management and password management PAM interface to integrate Windows Server AD users into a UNIX system. This allows Windows Server AD users to log in to a UNIX machine and be authenticated against a suitable Domain Controller. These users can also change their passwords and have this change take effect directly on the Domain Controller. PAM is configured by providing control files in the directory /etc/pam.d/ for each of the services that require authentication. When an authentication request is made by an application, the PAM code in the C library looks up this control file to determine what modules to load to do the authentication check and in what order. This interface makes adding a new authentication service for Winbind very easy. All that needs to be done is that the pam_winbind.so module is copied to /lib/security/ and the PAM control files for relevant services are updated to allow authentication via Winbind. Page 5
6 Kerberos Kerberos is a network authentication protocol designed to provide strong authentication for client/server applications by using secret-key cryptography. Kerberos is the core authentication protocol used by all native Active Directory clients including Samba Winbind. User and Group Mappings (IDMAP) When a user or group is created under Windows NT/200x it is allocated a numerical relative identifier (RID). This is slightly different from UNIX which has a range of numbers that are used to identify users, and the same range in which to identify groups. It is Winbind's job to convert RIDs to UNIX ID numbers and vice versa. When Winbind is configured, it is given part of the UNIX user ID space and a part of the UNIX group ID space in which to store Windows users and groups. If a Windows user is resolved for the first time, it is allocated the next UNIX ID from the range. The same process applies for Windows groups. Over time, Winbind will have mapped all Windows users and groups, in a given domain or forest, to UNIX user IDs and group IDs. The results of this mapping are stored persistently in an ID mapping database held in either a locally (host) stored TDB engine database or in a specified LDAP backend. This ensures that RIDs are mapped to UNIX IDs in a consistent way. Winbind IDMAP Options There are several options for configuring IDMAP information storage; local TDB Database, OpenLDAP based ldap store or Windows Server 2003 AD Application Partition (additional IDMAP and ldap options exist, but are not covered in this document). Local TDB Database The easiest IDMAP configuration is to use the default TDB database, which is locally stored on the host running Winbind. This configuration, however, has one significant draw-back: each host running Winbind will store IDMAP information in a unique sequence, preventing common UID and GID mappings between multiple hosts running Winbind. This option is the preferred solution for large numbers of client Unix/Linux hosts that will never need common UID/GID to AD RID mappings. This solution works well for desktop Linux hosts that simply need access to AD for authentication purposes and will not be interacting with NFS based file sharing or will not be presenting Samba file and print shares. Page 6
7 OpenLDAP as an IDMAP Backend OpenLDAP (slapd) is a GNU Open-Source LDAP version 3 compliant stand-alone directory service. Winbind can be configured to store IDMAP data in any LDAP V3 compliant directory server, however OpenLDAP is the most supported solution from an official Samba project standpoint. If Winbind is to be used in conjunction with other Unix services, such as NFS, or common UID/GID to Windows AD RID mappings are desirable or necessary, it is recommended that an OpenLDAP server be configured to host IDMAP data. Active Directory Application Partition as an IDMAP Backend Windows Server 2003 Active Directory supports independent, manually configurable naming contexts, also referred to as Application Partitions. An application directory partition can contain a hierarchy of any type of objects, except security principals (AD Users, Groups and Computer account objects), and can be configured to replicate to any set of domain controllers in the forest. Unlike a domain partition (AD Domain), an application directory partition is not required to replicate to all domain controllers in a domain and the partition can replicate to domain controllers in different domains in the same forest. By extending the AD Schema with the necessary NIS/Posix Account and Samba schema extensions, and creating an AD application partition, it is possible to unobtrusively store Winbind IDMAP data entries in the AD using one or more Domain controllers as IDMAP ldap backend servers. It is also possible to replicate this information in a simple and controlled manner to a subset of AD Domain Controllers located within either the same domain or in different domains in the same forest. Note: Currently, AD Application Partition support as an IDMAP backend for Samba Winbind is still experimental and should not be implemented as a production solution without careful environment specific testing. For more information on AD Application Partitions please see: Page 7
8 Configuring Winbind Supporting Components Most modern distributions of Unix type operating systems have pre-compiled packages for installing the core Samba components. It is necessary to verify that the latest installed versions of MIT Kerberos, PAM and the latest supporting libraries for NSS are installed on the host. Installation of Samba and its supporting components is beyond the scope of this document due to the nuances of each supported platform. However, due to the popularity of Samba, installation documentation for the various flavors of Unix and Linux are well documented and most current releases of Unix / Linux have Samba, and its supporting components, as available options during installation (Appendix A. contains a list of sites for further information on each of the mentioned components). The following sections describe how to configure Samba Winbind and supporting components. Configuring Kerberos To configure Kerberos it is necessary to edit the krb5.conf configuration file. This file is usually located in the /etc directory. Edit the file as shown below (figure 1.) to include your AD fully qualified domain name (FQDN) as the realm under the libdefaults section and make sure to set DNS lookups for realm and KDC to true as this will allow DNS to be used to resolve both services. Also edit the domain realm section, replacing the place holder entries with the AD domain name mapping (the first entry with a period preceding the domain name is not a typo). Note: An AD domain is also a Kerberos realm and the names are used interchangeably in this document. [logging] default = FILE:/var/log/krb5libs.log kdc = FILE:/var/log/krb5kdc.log admin_server = FILE:/var/log/kadmind.log [libdefaults] default_realm = xxx.addomainname.com dns_lookup_realm = true dns_lookup_kdc = true [realms] EXAMPLE.COM = { kdc = kerberos.example.com:88 admin_server = kerberos.example.com:749 default_domain = example.com } [domain_realm].xxx.domainname.com = XXX.DOMAINNAME.COM Page 8
9 xxx.domainname.com = XXX.DOMAINNAME.COM [kdc] profile = /var/kerberos/krb5kdc/kdc.conf [appdefaults] pam = { debug = false ticket_lifetime = renew_lifetime = forwardable = true krb4_convert = false } Figure 1. Kerberos configuration file. Configuring the Name Service Switch The name service switch (NSS) configuration is held in the nsswitch.conf configuration file, which is normally located in the /etc directory. The following Winbind entries, as shown in figure 2, should be present to instruct the NSS subsystem to use Winbind for the necessary name related services. # # /etc/nsswitch.conf # passwd: files winbind shadow: files winbind group: files winbind hosts: files dns bootparams: nisplus [NOTFOUND=return] files ethers: files netmasks: files networks: files protocols: files winbind rpc: files services: files winbind netgroup: files winbind publickey: nisplus automount: files winbind aliases: files nisplus Figure 2. Name service switch configuration file. Configuring the PAM Subsystem Depending on the flavor Unix or Linux being configured, PAM configuration differs slightly. This is due to certain configurations using the pam-stack ( pam_stack.so ) configuration. Page 9
10 Traditionally, each service that uses PAM has its own PAM configuration. For example, the login service (text mode TTY login) has a file named login located in the /etc/pam.d directory. Inside this file would be a series of entries defining the PAM modules to be used for the various authentication steps needed by the login service. However, if a system is setup to use a stackable configuration, the pam_stack.so module might be used to allow the login service to call outside its own stack, or configuration file, to other services PAM stacks or a central file. When using a centrally configured PAM implementation, the single file commonly used for configuring all services stacks is the system-auth file located in etc/pam.d The following example PAM stack configuration is valid for either a single service or for systems using pam_stack.so and a system-auth stack configuration file. If it is noted that a service specific PAM configuration file, such as /etc/pam.d/login contains a pam_stack.so service=system-auth entry (or similar pam_stack.so entry), then the system-auth file should be the only file modified to include the necessary Winbind entries. Figure 3 illustrates a working example of a PAM stack configuration file. It should be possible to cut and paste this directly into the system-auth PAM stack configuration file. auth required /lib/security/$isa/pam_env.so auth sufficient /lib/security/$isa/pam_unix.so likeauth nullok auth sufficient /lib/security/$isa/pam_krb5.so use_first_pass auth sufficient /lib/security/$isa/pam_winbind.so use_first_pass auth required /lib/security/$isa/pam_deny.so account sufficient /lib/security/$isa/pam_succeed_if.so uid < 100 account required /lib/security/$isa/pam_unix.so account sufficient /lib/security/$isa/pam_krb5.so account sufficient /lib/security/$isa/pam_winbind.so password requisite password sufficient password sufficient password sufficient password required /lib/security/$isa/pam_cracklib.so retry=3 /lib/security/$isa/pam_unix.so nullok use_authtok md5 shadow /lib/security/$isa/pam_krb5.so use_authtok /lib/security/$isa/pam_winbind.so use_authtok /lib/security/$isa/pam_deny.so session required /lib/security/$isa/pam_limits.so session required /lib/security/$isa/pam_unix.so session optional /lib/security/$isa/pam_mkhomedir.so skel=etc/skel/ umask=0022 session optional /lib/security/$isa/pam_krb5.so Figure 3 Example PAM Configuration file (note: some lines are wordwrapped) The Kerberos and Winbind specific entries that need to added to a PAM configuration file for Winbind are as follows: Page 10
11 auth auth account account sufficient /lib/security/$isa/pam_krb5.so use_first_pass sufficient /lib/security/$isa/pam_winbind.so use_first_pass sufficient /lib/security/$isa/pam_krb5.so sufficient /lib/security/$isa/pam_winbind.so password password sufficient /lib/security/$isa/pam_krb5.so use_authtok sufficient /lib/security/$isa/pam_winbind.so use_authtok session optional /lib/security/$isa/pam_mkhomedir.so skel=etc/skel/ umask=0022 session optional /lib/security/$isa/pam_krb5.so Note: For automatic home directory creation, it is necessary to have the pam_mkhomedir.so module present with skel=etc/skel/ umask=0022 parameters set. If a user authenticates and no home directory exists, the home directory is created in /home. The umask=0022 parameter causes the directory permission to be set to 755. Use the umask permissions mask flag to strengthen or weaken permissions as needed (this follows standard umask convention). The home directory is constructed from the skeletal files found in the /etc/skel directory. If may be necessary to install pam_mkhomedir.so if the system being configured is an older distribution of Linux or Unix (see Appendix A. for reference locations). Page 11
12 Configuring Winbind The following sections describe the necessary global settings for the smb.conf configuration file located in etc/samba. The sections are separated only by the IDMAP configuration options and each example demonstrates a working configuration. Samba Winbind Standard (local IDMAP) Configuration The following smb.conf configuration file, shown in figure 4, is configured to support a local, non-centralized, Winbind IDMAP database. Only the global section is included as this is the only section required for Winbind configuration. For additional Samba smb.conf reference the support sites listed in Appendix A. [global] workgroup = NETBIOSDOMNAME netbios name = NETBIOSCOMPNAME server string = A Workstation printcap name = /etc/printcap load printers = yes log file = /var/log/samba/%m.log max log size = 50 security = ADS realm = XXX.DOMAINNAME.COM encrypt passwords = yes smb passwd file = /etc/samba/smbpasswd allow trusted domains = yes unix password sync = Yes passwd program = /usr/bin/passwd %u passwd chat = *New*password* %n\n *Retype*new*password* %n\n *passwd:*all*authentication*tokens*updated*su\ ccessfully* pam password change = yes obey pam restrictions = yes socket options = TCP_NODELAY SO_RCVBUF=8192 SO_SNDBUF=8192 dns proxy = no idmap uid = idmap gid = winbind use default domain = yes winbind separator = - winbind enum users = yes winbind enum groups = yes template shell = /bin/bash template homedir = /home/%u # %U=username Figure 4 Example simple Samba configuration file Global section (note: some lines are wordwrapped) For the workgroup entry, enter the legacy NetBIOS name of the AD domain the host will be participating in. For the netbiosname entry, set this value to the computer name Page 12
13 the host should be known by in AD (e.g. the computer account name). For the realm entry, set the value to the FQDN of the Active Directory domain this host will be joined to. Note: In an AD domain containing large numbers of user and group objects (over 3000), it is recommended that the winbind enum users and winbind enum groups option be set to a no value. While this will impact certain user interface elements from presenting all available AD security principals, it may dramatically improve system response time for certain actions and will significantly reduce LDAP traffic. Once Winbind and the supporting components are configured, issue the following command at a shell (logged in as root) to finalize the Winbind setup: net ads join -U administrator This command will join the host to the AD domain (supplement administrator with any account granted the necessary rights to join computers to the AD). To start and test Winbind, type winbindd at the shell prompt (as root). To validate that Winbind is correctly seeing the domain, type wbinfo g at the shell prompt; this should enumerate and print to screen all the groups in the AD domain (for further wbinfo options, type wbinfo at the shell). To validate authentication is functioning correctly, test logons through several different services including ssh and local login. Once testing is complete, and the configuration has been validated as working, add the Winbind daemon (winbindd) to the appropriate Unix/Linux run-level configuration (consult the OS specific documentation for assistance with this step). Winbind using LDAP IDMAP Back-End In order to configure Winbind to use an LDAP directory server, it is necessary to configure an LDAP back-end. This document specifically references using OpenLDAP as the LDAP provider for this configuration; however other stand-alone LDAP v3 compliant directory services will also suffice but are not within the scope of this document. Configuring OpenLDAP to support Winbind IDMAP Installation of OpenLDAP is not covered in this document; please reference the official OpenLDAP documentation located at Once OpenLDAP is installed, configure the slapd.conf, located in /etc/slapd as shown in figure 5. To generate the rootdn password for OpenLDAP, use the slappasswd command to generate a password hash, then paste the hash into the rootpw value. Be sure to validate the file is set to mode 700 for permissions. Note: As with all example configurations, replace placeholder name references, such as dc=domainname,dc=com, with appropriate names. In the case of OpenLDAP, this Page 13
14 name need not match the Active Directory naming conventions as the two are entirely independent. # # See slapd.conf(5) for details on configuration options. # This file should NOT be world readable. # include include include include include include /etc/ldap/schema/core.schema /etc/ldap/schema/cosine.schema /etc/ldap/schema/nis.schema /etc/ldap/schema/inetorgperson.schema /etc/ldap/schema/openldap.schema /etc/ldap/schema/samba.schema # Where the pid file is put. The init.d script # will not stop the server if you change this. pidfile /var/run/slapd/slapd.pid # List of arguments that were passed to the server argsfile /var/run/slapd.args # if no access controls are present, the default policy # allows anyone and everyone to read anything but restricts # updates to rootdn. (e.g., "access to * by * read") # # rootdn can always read and write EVERYTHING! ####################################################################### # BDB database definitions ####################################################################### database bdb suffix "dc=domainname,dc=com" rootdn "cn=manager,dc=domainname,dc=com" # Cleartext passwords, especially for the rootdn, should # be avoid. See slappasswd(8) and slapd.conf(5) for details. # Use of strong authentication encouraged. rootpw {SSHA}YoFP07ouw2h4xiVyMOJqQwfCq3w/OerG # The database directory MUST exist prior to running slapd AND # should only be accessible by the slapd and slap tools. # Mode 700 recommended. directory "C:/openldap/var/openldap-data" # Indices to maintain index objectclass eq ##index uid pres,eq ##index rid eq index uidnumber eq index gidnumber eq index cn eq index sambasid eq Figure 6. Example OpenLDAP configuration file (note: some lines are wordwrapped) Page 14
15 Prior to starting the OpenLDAP server, validate the samba.schema schema file is located in the etc/ldap/schema directory. The latest version of the schema can be found in the samba distribution files available from Once the OpenLDAP configuration is complete, start the OpenLDAP server by typing slapd at the shell prompt. Validate that the LDAP server is functioning by using an LDAP tool, such as LDP, to connect and bind to the server (using the cn=manager,dc=domainname,dc=com account and the password entered in slapd.conf). Create and object named cn=manager, dc=domainname, dc=com with an object class type of organizationalrole and a description of Directory Manager. The above example does not include SSL support. It is absolutely critical that once a working configuration is achieved and tested, that SSL be enabled for LDAP connections. This is to prevent the rootdn password from being compromised during a simple LDAP bind from the Winbind host. For additional information on enabling SSL for LDAP connections in OpenLDAP see: Once testing is complete, and the configuration has been validated as working, add the OpenLDAP daemon (slapd) to the appropriate Unix/Linux run-level configuration (consult the OS specific documentation for assistance with this step). Winbind IDMAP LDAP configuration Configuring the smb.conf to instruct Winbind to use an LDAP backend for IDMAP data storage is fairly straight forward. Add the following lines to a working smb.conf configuration file: ldap admin dn = cn=manager,dc=domainname,dc=com ldap idmap suffix = ou=idmap ldap suffix = dc=domainname,dc=com idmap backend = ldap:ldap://fqdnofldapserver Figure 7. Samba configuration additions for IDMAP LDAP backend The ldap admin dn value should match the rootdn value set during the configuration of the OpenLDAP server. The ldap idmap suffix should be set to ou=idmap. The ldap suffix should match the suffix value set in the slapd.conf configuration file. The idmap backend value should be the IP address or fully qualified DNS name of the server running OpenLDAP. Once the above settings are present, type the following command at the shell prompt: smbpassword -w [password_of_directory_manager] Page 15
16 Where password_of_directory_manager would be the password set for the OpenLDAP rootdn account (use the human readable form submitted to the slappasswd command). The password will be stored in the Samba secrets.ldb database, which hashes the password and is only readable by the root account. Once Winbind and the supporting components are configured, issue the following command at a shell (logged in as root) to finalize the Winbind setup: net ads join -U administrator This command will join the host to the AD domain (supplement administrator with any account granted the necessary rights to join computers to the AD). To start and test Winbind, type winbindd at the shell prompt (as root). To validate that Winbind is correctly seeing the domain, type wbinfo g at the shell prompt; this should enumerate and print to screen all the groups in the AD domain (for further wbinfo options, type wbinfo at the shell). To validate authentication is functioning correctly, test logons through several different services including ssh and local login. To validate that IDMAP entries are being entered correctly in the LDAP directory, connect with an LDAP administration tool (e.g. LDP) to the OpenLDAP server. Expand the IDMAP container (ou=idmap); there should be numerous entries similar to the example below: Expanding base 'sambasid=s ,ou=idmap,dc=domainname,dc=com'... Result <0>: (null) Matched DNs: Getting 1 entries: >> Dn: sambasid=s ,ou=idmap, dc=domainname,dc=com 2> objectclass: sambaidmapentry; sambasidentry; 1> gidnumber: 10218; 1> sambasid: S ; Figure 8. Example IDMAP entry Once testing is complete, and the configuration has been validated as working, add the Winbind daemon (winbindd) to the appropriate Unix/Linux run-level configuration (consult the OS specific documentation for assistance with this step). To configure Winbind to use LDAP SSL for connections, add the following line to the smb.conf configuration file: ldap ssl = on Also change the idmap backend value to include an s in the URL address as shown below: Page 16
17 idmap backend = ldap:ldaps://fqdnofldapserver Winbind using an Active Directory Application Partition for IDMAP Back-End Active Directory, as with any LDAP V3 compliant directory service, can function as the backend for Winbind IDMAP back-end storage. This configuration uses a Windows Server 2003 Active Directory application partition to store the IDMAP entries. Using an application partition has some significant advantages over storing the IDMAP data in an AD domain partition or in the configuration partition: security principals can not be created in an application partition, preventing possible rogue accounts from being added using the ldap admin dn account info stored in the Samba secrets.tdb database. Additionally, the application partition replication scope is completely controllable (application partitions do not participate in global catalog indexing) allowing strict selection of one or more Domain Controllers to host the IDMAP data, which negates the risk of an LDAP flooding attack impacting domain or forest-wide function. Due to the potential issues with not using an AD application partition, it is not recommended that Winbind IDMAP be configured for use with a Domain Partition or the Configuration Partition. As such, Windows 2000 Active Directory is not recommended for use with Winbind for IDMAP storage. Configuring Windows Server 2003 Active Directory to support Winbind IDMAP Note: The tasks outlined in this section assume that the actions affecting Active Directory are being executed by an account with Enterprise Admins and Schema Admins privileges. Prior to configuring Winbind IDMAP to store data in the AD, it is necessary to extend the AD schema with the necessary Samba schema extensions. To perform this action, login with Schema Admins privileges on the Active Directory Forest Schema Master domain controller, unzip the ADSambaSchema.zip archive (included with this document package) to c:\sambaschema. Open each.ldf file and perform a search and replace on the string dc=testnet,dc=com, replacing the string with the top level Domain Component (DC=) values for the AD forest. Once the files have been modified correctly, install the extensions by executing the schemaupdate.bat batch file from the command prompt. Be sure to change directory to c:\sambaschema prior to executing the batch file. Once the schema extensions have been loaded successfully, open the schema management MMC snap-in. Validate that the uidnumber and gidnumber attributes have no minimum or maximum value setting by viewing the properties of the attribute objects as shown in figure 9. Page 17
18 Figure 9. uidnumber attribute properties Having completed the schema updates and verified the uidnumber and gidnumber attributes, it is necessary to create a new user account, or group, in the Active Directory. This group will be used to set access control on the application partition created in the next step. If a single account is created, this account must be located in the same domain that will house the DC holding the application partition, as Winbind uses a simple LDAP bind for authentication. Additionally, if a group is used, the group can be housed anywhere in the forest, but an account must be present in the local domain partition of any DC holding a replica of the partition and being used for Winbind IDMAP. Note: For the purposes of this documentation, a single user account named IDMAPManager will be used to demonstrate the ACL settings for the application partition. To create an application partition: 1. Open a Command Prompt on the DC that should hold the first replica of the application partition. 2. Type: ntdsutil 3. At the ntdsutil command prompt, type: domain management 4. At the domain management command prompt, type: connection Page 18
19 5. At the connection command prompt, type:connect to server name of domain controller 6. At the connection command prompt, type: quit 7. At the domain management command prompt, do type: create nc dc=sambaidmap,dc=domainname,dc=com null Once the application partition has been created, open ADSIedit.msc and connect to the application partition using settings similar to those shown in figure 10. Figure 10. Example ADSI connection setting for accessing an application partition Once connected, select the top level application partition (e.g. dc=sambaidmap,dc=domainname,dc=com) node in the left-hand pane and right-click selecting new object from the object list, select sambaunixidpool. When asked to enter the ou= attribute, type idmap. When queried for the mandatory gidnumber and uidnumber values, type in for each. Page 19
20 Figure 11. Create Object list Once the ou=idmap,dc=sambaidmap,dc=domainname,dc=com container has been created, right-click on the object and select properties. On the security tab, click Add and proceed to add the IDMAPManager user account. Grant this account Read,Write, Create All Child Objects, Delete All Child Objects as shown in figure 12. Figure 12. Permissions for the IDMAPManager account on the ou=idmap container Having completed the steps above, the AD should now be ready to host IDMAP data. As with the OpenLDAP configuration, once the final configuration has been tested, SSL should be used to protect the IDMAPManager credentials. Any DC participating in an AD Forest with a Microsoft Enterprise CA implementation will already be capable of accepting SSL connections. To implement LDAP SSL without a Microsoft Enterprise CA, or for additional information configuring DC s to use SSL, see: Page 20
21 Winbind IDMAP LDAP configuration for AD Application Partitions Configuring the smb.conf to instruct Winbind to use an LDAP backend for IDMAP data storage in an AD application partition is nearly identical to the configuration used for OpenLDAP. Add the following lines to a working smb.conf configuration file: ldap admin dn = cn=idmapmanager,cn=users,dc=domainname,dc=com ldap idmap suffix = ou=idmap ldap suffix = dc=sambaidmap,dc=domainname,dc=com idmap backend = ldap:ldap://fqdnofaddomaincontroller Figure 13. Samba configuration additions for IDMAP AD backend The ldap admin dn value should match the LDAP Distinguished Name (DN) of the IDMAPManager created in AD (or other user with rights to the idmap container). The ldap idmap suffix should be set to ou=idmap. The ldap suffix should match the DN of the application partition. The idmap backend value should be the IP address or fully qualified DNS name of the AD domain controller. Once the above settings are present, type the following command at the shell prompt: smbpassword -w [password_of_idmapmanager] Where password_of_idmapmanager would be the password for the IDMAPManager account in AD. The password will be stored in the Samba secrets.ldb database, which hashes the password and is only readable by the root account. Once Winbind and the supporting components are configured, issue the following command at a shell (logged in as root) to finalize the Winbind setup: net ads join -U administrator This command will join the host to the AD domain (supplement administrator with any account granted the necessary rights to join computers to the AD). To start and test Winbind, type winbindd at the shell prompt (as root). To validate that Winbind is correctly seeing the domain, type wbinfo g at the shell prompt; this should enumerate and print to screen all the groups in the AD domain (for further wbinfo options, type wbinfo at the shell). To validate authentication is functioning correctly, test logons through several different services including ssh and local login. To validate that IDMAP entries are being entered correctly in the Active Directory application partition, connect with an LDAP administration tool (e.g. LDP) or ADSIEdit to the AD Application Partition. Expand the IDMAP container (ou=idmap); there should be numerous entries similar to the example below: Page 21
22 Expanding base 'sambasid=s ,OU=idmap,DC=sambaidmap,DC=domainname,DC=com'... Result <0>: (null) Matched DNs: Getting 1 entries: >> Dn: sambasid=s ,OU=idmap,DC=sambaidmap,DC=domainname,DC=com 1> uidnumber: 10017; 1> sambasid: S ; 3> objectclass: top; sambaidmapentry; sambasidentry; 1> distinguishedname: sambasid=s ,ou=idmap,dc=sambaidmap,dc=domainname,dc=com; 1> instancetype: 0x4 = ( IT_WRITE ); 1> whencreated: 12/12/ :46:11 Eastern Standard Time Eastern Daylight Time; 1> whenchanged: 12/12/ :46:11 Eastern Standard Time Eastern Daylight Time; 1> usncreated: ; 1> usnchanged: ; 1> name: S ; 1> objectguid: cb c ac85-786ed858a65d; 1> objectcategory: CN=sambaSidEntry,CN=Schema,CN=Configuration,DC=domainname,DC=com; Figure 8. Example IDMAP entry Once testing is complete, and the configuration has been validated as working, add the Winbind daemon (winbindd) to the appropriate Unix/Linux run-level configuration (consult the OS specific documentation for assistance with this step). To configure Winbind to use LDAP SSL for connections, add the following line to the smb.conf configuration file: ldap ssl = on Also change the idmap backend value to include an s in the URL address as shown below: idmap backend = ldap:ldaps://fqdnofaddomaincontroller Page 22
23 Appendix A. Additional Resources Samba Information: Kerberos Information: Kerberos Configuration Files: Files.html#Configuration%20Files Linux PAM Information: Kerberos Information: Linux NSS Information: SUN General Information: SUN PAM Information: SUN Samba Software Modules: SUN pam_mkhomedir.so information: OpenLDAP Information: OpenLDAP and SSL: Active Directory Application Partitions: Active Directory and SSL: Page 23
24 Appendix B. Active Directory Schema Extensions Posixattributes.ldf dn: CN=uidNumber,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: uidnumber attributeid: cn: uidnumber distinguishedname: CN=uidNumber,CN=Schema,CN=Configuration,dc=testnet,dc=com ldapdisplayname: uidnumber name: uidnumber objectcategory: CN=Attribute-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com rangelower: 2000 rangeupper: schemaidguid:: 58MKDRf3G0aAARxcPo+TNA== dn: CN=gidNumber,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: gidnumber attributeid: cn: gidnumber distinguishedname: CN=gidNumber,CN=Schema,CN=Configuration,dc=testnet,dc=com ldapdisplayname: gidnumber name: gidnumber objectcategory: CN=Attribute-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com rangelower: 2000 rangeupper: schemaidguid:: ubkku2nqeukb9lg/itublw== dn: CN=loginShell,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: loginshell attributeid: attributesyntax: cn: loginshell distinguishedname: CN=loginShell,CN=Schema,CN=Configuration,dc=testnet,dc=com ldapdisplayname: loginshell name: loginshell objectcategory: CN=Attribute-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com 2 schemaidguid:: 2mImn2DEJ0e8vcTzTDQMLA== dn: CN=gecos,CN=Schema,CN=Configuration,dc=testnet,dc=com Page 24
25 admindisplayname: gecos attributeid: attributesyntax: cn: gecos distinguishedname: CN=gecos,CN=Schema,CN=Configuration,dc=testnet,dc=com ldapdisplayname: gecos name: gecos objectcategory: CN=Attribute-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com 2 schemaidguid:: /qrvb1x+d0wdr3gmhhyn1w== dn: CN=memberUid,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: memberuid attributeid: attributesyntax: cn: memberuid distinguishedname: CN=memberUid,CN=Schema,CN=Configuration,dc=testnet,dc=com issinglevalued: FALSE ldapdisplayname: memberuid name: memberuid objectcategory: CN=Attribute-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com 2 schemaidguid:: 5u4QiSA4NUOKpGny9udGjQ== dn: CN=shadowExpire,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: shadowexpire attributeid: cn: shadowexpire distinguishedname: CN=shadowExpire,CN=Schema,CN=Configuration,dc=testnet,dc=com ldapdisplayname: shadowexpire name: shadowexpire objectcategory: CN=Attribute-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com schemaidguid:: o63eqpvxtuaief2lypuedw== dn: CN=shadowFlag,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: shadowflag attributeid: cn: shadowflag distinguishedname: CN=shadowFlag,CN=Schema,CN=Configuration,dc=testnet,dc=com ldapdisplayname: shadowflag name: shadowflag objectcategory: CN=Attribute-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com Page 25
26 schemaidguid:: c1jtdrbimuqiclp7vgaz0g== dn: CN=shadowInactive,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: shadowinactive attributeid: cn: shadowinactive distinguishedname: CN=shadowInactive,CN=Schema,CN=Configuration,dc=testnet,dc=com ldapdisplayname: shadowinactive name: shadowinactive objectcategory: CN=Attribute-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com schemaidguid:: erww0mi8v0sklecp/uqgzg== dn: CN=shadowLastChange,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: shadowlastchange attributeid: cn: shadowlastchange distinguishedname: CN=shadowLastChange,CN=Schema,CN=Configuration,dc=testnet,dc=com ldapdisplayname: shadowlastchange name: shadowlastchange objectcategory: CN=Attribute-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com schemaidguid:: xdf7rhtk4kegq1u3kqgktw== dn: CN=shadowMax,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: shadowmax attributeid: cn: shadowmax distinguishedname: CN=shadowMax,CN=Schema,CN=Configuration,dc=testnet,dc=com ldapdisplayname: shadowmax name: shadowmax objectcategory: CN=Attribute-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com schemaidguid:: EFk3wWJoRUeBu/HS58T+Jg== dn: CN=shadowMin,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: shadowmin attributeid: cn: shadowmin distinguishedname: CN=shadowMin,CN=Schema,CN=Configuration,dc=testnet,dc=com ldapdisplayname: shadowmin Page 26
27 name: shadowmin objectcategory: CN=Attribute-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com schemaidguid:: Jndf3iFO0kmlknWk6qKvqw== dn: CN=shadowWarning,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: shadowwarning attributeid: cn: shadowwarning distinguishedname: CN=shadowWarning,CN=Schema,CN=Configuration,dc=testnet,dc=com ldapdisplayname: shadowwarning name: shadowwarning objectcategory: CN=Attribute-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com schemaidguid:: S9nkw4wmIUKvFIPMsxz2lQ== DN: changetype: modify add: schemaupdatenow schemaupdatenow: 1 - Posixclasses.ldf dn: CN=posixAccount,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: posixaccount cn: posixaccount defaultsecuritydescriptor: D:(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;DA)(A;;LCRPRC;;;WD)(A;;CCDCLCS WRPWPDTLOCRSDRCWDWO;;;SY) distinguishedname: CN=posixAccount,CN=Schema,CN=Configuration,dc=testnet,dc=com governsid: ldapdisplayname: posixaccount maycontain: description maycontain: gecos maycontain: loginshell maycontain: userpassword mustcontain: cn mustcontain: gidnumber mustcontain: homedirectory mustcontain: uid mustcontain: uidnumber name: posixaccount objectcategory: CN=Class-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com objectclass: classschema objectclasscategory: 1 posssuperiors: user posssuperiors: organizationalperson posssuperiors: organizationalrole posssuperiors: organizationalunit rdnattid: cn schemaidguid:: bjwa/uryrey0mmcbzzxyhq== Page 27
28 subclassof: top systemonly: FALSE dn: CN=shadowAccount,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: shadowaccount cn: shadowaccount defaultsecuritydescriptor: D:(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;DA)(A;;LCRPRC;;;WD)(A;;CCDCLCS WRPWPDTLOCRSDRCWDWO;;;SY) distinguishedname: CN=shadowAccount,CN=Schema,CN=Configuration,dc=testnet,dc=com governsid: ldapdisplayname: shadowaccount maycontain: description maycontain: shadowexpire maycontain: shadowflag maycontain: shadowinactive maycontain: shadowlastchange maycontain: shadowmax maycontain: shadowmin maycontain: shadowwarning maycontain: userpassword mustcontain: uid name: shadowaccount objectcategory: CN=Class-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com objectclass: classschema objectclasscategory: 1 posssuperiors: user posssuperiors: organizationalperson posssuperiors: organizationalrole posssuperiors: organizationalunit rdnattid: cn schemaidguid:: O3MjwPrR6ECUyHB/jvlYQA== subclassof: top systemonly: FALSE dn: CN=posixGroup,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: posixgroup cn: posixgroup defaultsecuritydescriptor: D:(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;DA)(A;;LCRPRC;;;WD)(A;;CCDCLCS WRPWPDTLOCRSDRCWDWO;;;SY) distinguishedname: CN=posixGroup,CN=Schema,CN=Configuration,dc=testnet,dc=com governsid: ldapdisplayname: posixgroup maycontain: description maycontain: memberuid maycontain: userpassword mustcontain: cn mustcontain: gidnumber name: posixgroup objectcategory: CN=Class-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com objectclass: classschema objectclasscategory: 1 posssuperiors: group posssuperiors: organizationalperson posssuperiors: organizationalrole posssuperiors: organizationalunit rdnattid: cn schemaidguid:: 7pmYcUK03EyCKWGQNFgZDA== Page 28
29 subclassof: top systemonly: FALSE DN: changetype: modify add: schemaupdatenow schemaupdatenow: 1 - Sambaattributes.ldf dn: CN=sambaLMPassword,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambalmpassword attributeid: attributesyntax: cn: sambalmpassword distinguishedname: CN=sambaLMPassword,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambalmpassword name: sambalmpassword 0 dn: CN=sambaNTPassword,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambantpassword attributeid: attributesyntax: cn: sambantpassword distinguishedname: CN=sambaNTPassword,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambantpassword name: sambantpassword 0 dn: CN=sambaAcctFlags,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambaacctflags attributeid: attributesyntax: cn: sambaacctflags distinguishedname: CN=sambaAcctFlags,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambaacctflags name: sambaacctflags 0 dn: CN=sambaPwdLastSet,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambapwdlastset Page 29
30 attributeid: cn: sambapwdlastset distinguishedname: CN=sambaPwdLastSet,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambapwdlastset name: sambapwdlastset dn: CN=sambaPwdCanChange,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambapwdcanchange attributeid: cn: sambapwdcanchange distinguishedname: CN=sambaPwdCanChange,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambapwdcanchange name: sambapwdcanchange dn: CN=sambaPwdMustChange,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambapwdmustchange attributeid: cn: sambapwdmustchange distinguishedname: CN=sambaPwdMustChange,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambapwdmustchange name: sambapwdmustchange dn: CN=sambaLogonTime,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambalogontime attributeid: cn: sambalogontime distinguishedname: CN=sambaLogonTime,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambalogontime name: sambalogontime dn: CN=sambaLogoffTime,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambalogofftime Page 30
31 attributeid: cn: sambalogofftime distinguishedname: CN=sambaLogoffTime,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambalogofftime name: sambalogofftime dn: CN=sambaKickoffTime,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambakickofftime attributeid: cn: sambakickofftime distinguishedname: CN=sambaKickoffTime,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambakickofftime name: sambakickofftime dn: CN=sambaHomeDrive,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambahomedrive attributeid: attributesyntax: cn: sambahomedrive distinguishedname: CN=sambaHomeDrive,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambahomedrive name: sambahomedrive 0 dn: CN=sambaLogonScript,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambalogonscript attributeid: attributesyntax: cn: sambalogonscript distinguishedname: CN=sambaLogonScript,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambalogonscript name: sambalogonscript 0 dn: CN=sambaProfilePath,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambaprofilepath Page 31
32 attributeid: attributesyntax: cn: sambaprofilepath distinguishedname: CN=sambaProfilePath,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambaprofilepath name: sambaprofilepath 0 dn: CN=sambaUserWorkstations,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambauserworkstations attributeid: attributesyntax: cn: sambauserworkstations distinguishedname: CN=sambaUserWorkstations,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambauserworkstations name: sambauserworkstations 0 dn: CN=sambaHomePath,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambahomepath attributeid: attributesyntax: cn: sambahomepath distinguishedname: CN=sambaHomePath,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambahomepath name: sambahomepath 0 dn: CN=sambaDomainName,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambadomainname attributeid: attributesyntax: cn: sambadomainname distinguishedname: CN=sambaDomainName,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambadomainname name: sambadomainname omsyntax: 64 dn: CN=sambaSID,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambasid Page 32
33 attributeid: attributesyntax: cn: sambasid distinguishedname: CN=sambaSID,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambasid name: sambasid omsyntax: 64 dn: CN=sambaPrimaryGroupSID,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambaprimarygroupsid attributeid: attributesyntax: cn: sambaprimarygroupsid distinguishedname: CN=sambaPrimaryGroupSID,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambaprimarygroupsid name: sambaprimarygroupsid omsyntax: 64 dn: CN=sambaGroupType,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambagrouptype attributeid: cn: sambagrouptype distinguishedname: CN=sambaGroupType,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambagrouptype name: sambagrouptype dn: CN=sambaNextUserRid,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambanextuserrid attributeid: cn: sambanextuserrid distinguishedname: CN=sambaNextUserRid,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambanextuserrid name: sambanextuserrid dn: CN=sambaNextGroupRid,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambanextgrouprid Page 33
34 attributeid: cn: sambanextgrouprid distinguishedname: CN=sambaNextGroupRid,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambanextgrouprid name: sambanextgrouprid dn: CN=sambaNextRid,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambanextrid attributeid: cn: sambanextrid distinguishedname: CN=sambaNextRid,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambanextrid name: sambanextrid dn: CN=sambaAlgorithmicRidBase,CN=Schema,CN=Configuration,DC=testnet,DC=com admindisplayname: sambaalgorithmicridbase attributeid: cn: sambaalgorithmicridbase distinguishedname: CN=sambaAlgorithmicRidBase,CN=Schema,CN=Configuration,DC=testnet,DC=com ldapdisplayname: sambaalgorithmicridbase name: sambaalgorithmicridbase DN: changetype: modify add: schemaupdatenow schemaupdatenow: 1 - Sambaclasses.ldf dn: CN=sambaDomain,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: sambadomain cn: sambadomain defaultsecuritydescriptor: D:(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;DA)(A;;LCRPRC;;;WD)(A;;CCDCLCS WRPWPDTLOCRSDRCWDWO;;;SY) distinguishedname: CN=sambaDomain,CN=Schema,CN=Configuration,dc=testnet,dc=com governsid: Page 34
35 ldapdisplayname: sambadomain maycontain: sambanextrid maycontain: sambanextgrouprid maycontain: sambanextuserrid maycontain: sambaalgorithmicridbase mustcontain: sambadomainname mustcontain: sambasid name: sambadomain objectcategory: CN=Class-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com objectclass: classschema objectclasscategory: 1 posssuperiors: group posssuperiors: user posssuperiors: organizationalperson posssuperiors: organizationalrole posssuperiors: organizationalunit rdnattid: sambadomainname subclassof: top systemonly: FALSE dn: CN=sambaIdmapEntry,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: sambaidmapentry cn: sambaidmapentry defaultsecuritydescriptor: D:(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;DA)(A;;LCRPRC;;;WD)(A;;CCDCLCS WRPWPDTLOCRSDRCWDWO;;;SY) distinguishedname: CN=sambaIdmapEntry,CN=Schema,CN=Configuration,dc=testnet,dc=com governsid: ldapdisplayname: sambaidmapentry maycontain: uidnumber maycontain: gidnumber mustcontain: sambasid name: sambaidmapentry objectcategory: CN=Class-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com objectclass: classschema objectclasscategory: 1 posssuperiors: group posssuperiors: user posssuperiors: organizationalperson posssuperiors: organizationalrole posssuperiors: organizationalunit posssuperiors: sambadomain rdnattid: sambasid subclassof: top systemonly: FALSE dn: CN=sambaSidEntry,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: sambasidentry cn: sambasidentry defaultsecuritydescriptor: D:(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;DA)(A;;LCRPRC;;;WD)(A;;CCDCLCS WRPWPDTLOCRSDRCWDWO;;;SY) distinguishedname: CN=sambaSidEntry,CN=Schema,CN=Configuration,dc=testnet,dc=com governsid: ldapdisplayname: sambasidentry mustcontain: sambasid name: sambasidentry objectcategory: CN=Class-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com Page 35
36 objectclass: classschema objectclasscategory: 1 posssuperiors: group posssuperiors: user posssuperiors: organizationalperson posssuperiors: organizationalrole posssuperiors: organizationalunit rdnattid: sambasid subclassof: sambaidmapentry systemonly: FALSE dn: CN=sambaSamAccount,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: sambasamaccount cn: sambasamaccount defaultsecuritydescriptor: D:(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;DA)(A;;LCRPRC;;;WD)(A;;CCDCLCS WRPWPDTLOCRSDRCWDWO;;;SY) distinguishedname: CN=sambaSamAccount,CN=Schema,CN=Configuration,dc=testnet,dc=com governsid: ldapdisplayname: sambasamaccount subclassof: posixaccount maycontain: sambalmpassword maycontain: sambantpassword maycontain: sambapwdlastset maycontain: sambalogontime maycontain: sambalogofftime maycontain: sambakickofftime maycontain: sambapwdcanchange maycontain: sambapwdmustchange maycontain: sambaacctflags maycontain: displayname maycontain: sambahomepath maycontain: sambahomedrive maycontain: sambalogonscript maycontain: sambaprofilepath maycontain: description maycontain: sambauserworkstations maycontain: sambaprimarygroupsid maycontain: sambadomainname mustcontain: objectclass mustcontain: uid mustcontain: sambasid name: sambasamaccount objectcategory: CN=Class-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com objectclass: classschema objectclasscategory: 1 posssuperiors: user posssuperiors: organizationalperson posssuperiors: organizationalrole posssuperiors: organizationalunit posssuperiors: sambadomain rdnattid: uid systemonly: FALSE dn: CN=sambaGroupMapping,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: sambagroupmapping cn: sambagroupmapping Page 36
37 defaultsecuritydescriptor: D:(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;DA)(A;;LCRPRC;;;WD)(A;;CCDCLCS WRPWPDTLOCRSDRCWDWO;;;SY) distinguishedname: CN=sambaGroupMapping,CN=Schema,CN=Configuration,dc=testnet,dc=com governsid: ldapdisplayname: sambagroupmapping maycontain: displayname maycontain: description mustcontain: gidnumber mustcontain: sambasid mustcontain: sambagrouptype name: sambagroupmapping objectcategory: CN=Class-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com objectclass: classschema objectclasscategory: 1 posssuperiors: group posssuperiors: organizationalperson posssuperiors: organizationalrole posssuperiors: organizationalunit posssuperiors: sambadomain rdnattid: cn subclassof: posixgroup systemonly: FALSE dn: CN=sambaUnixIdPool,CN=Schema,CN=Configuration,dc=testnet,dc=com admindisplayname: sambaunixidpool cn: sambaunixidpool defaultsecuritydescriptor: D:(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;DA)(A;;LCRPRC;;;WD)(A;;CCDCLCS WRPWPDTLOCRSDRCWDWO;;;SY) distinguishedname: CN=sambaUnixIdPool,CN=Schema,CN=Configuration,dc=testnet,dc=com governsid: ldapdisplayname: sambaunixidpool mustcontain: uidnumber mustcontain: gidnumber name: sambaunixidpool objectcategory: CN=Class-Schema,CN=Schema,CN=Configuration,dc=testnet,dc=com objectclass: classschema objectclasscategory: 1 posssuperiors: user posssuperiors: organizationalperson posssuperiors: organizationalrole posssuperiors: organizationalunit posssuperiors: sambadomain rdnattid: ou subclassof: organizationalunit systemonly: FALSE DN: changetype: modify add: schemaupdatenow schemaupdatenow: 1 - Schemaupdate.bat ldifde -i -f Posixattributes.ldf Page 37
38 ldifde -i -f Posixclasses.ldf ldifde -i -f Sambaattributes.ldf ldifde -i -f Sambaclasses.ldf Page 38
39 Appendix C. Acknowledgements Portions of the How Winbind Works section of this document were directly derived from Chapter 12 Identity Mapping (IDMAP) and Chapter 21 Winbind: Use of Domain Accounts located in the The Official Samba-3 HOWTO and Reference Guide ( Page 39
Allowing Linux to Authenticate to a Windows 2003 AD Domain. Prepared by. Thomas J. Munn, CISSP 11-May-06
Allowing Linux to Authenticate to a Windows 2003 AD Domain Prepared by Thomas J. Munn, CISSP 11-May-06 Table of Contents: Table of Contents:... 2 Introduction... 3 Requirements... 4 Installing the Necessary
AD Schema Update IPBrick iportalmais
AD Schema Update IPBrick iportalmais October 2006 2 Copyright c iportalmais All rights reserved. October 2006. The information in this document can be changed without further notice. The declarations,
Attunity RepliWeb PAM Configuration Guide
Attunity RepliWeb PAM Configuration Guide Software Version 5.2 For Linux and UNIX operating systems June 28, 2012 RepliWeb, Inc., 6441 Lyons Road, Coconut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954)
Security with LDAP. Andrew Findlay. February 2002. Skills 1st Ltd www.skills-1st.co.uk. [email protected]
Security with LDAP Andrew Findlay Skills 1st Ltd www.skills-1st.co.uk February 2002 Security with LDAP Applications of LDAP White Pages NIS (Network Information System) Authentication Lots of hype How
RHEL Clients to AD Integrating RHEL clients to Active Directory
RHEL Clients to AD Integrating RHEL clients to Active Directory Presenter Dave Sullivan Sr. TAM, Red Hat 2013-09-03 Agenda Review Dmitri Pal and Simo Sorce Preso Legacy RHEL hook to AD RHEL Direct--->sssd--->AD
Configure Samba with ACL and Active Directory integration Robert LeBlanc ([email protected]) BioAg Computer Support, Brigham Young University
Configure Samba with ACL and Active Directory integration Robert LeBlanc ([email protected]) BioAg Computer Support, Brigham Young University This document uses Debain Linux 3.1 (Sarge) on x86 hardware.
Linuxdays 2005, Samba Tutorial
Linuxdays 2005, Samba Tutorial Alain Knaff [email protected] Summary 1. Installing 2. Basic config (defining shares,...) 3. Operating as a PDC 4. Password synchronization 5. Access control 6. Samba
Installing Squid with Active Directory Authentication
Installing Squid with Active Directory Authentication 18May06 Proxy servers are fairly essential devices that should be part of a network s perimeter defense strategy. They are devices that allow clients
Unified Authentication, Authorization and User Administration An Open Source Approach. Ted C. Cheng, Howard Chu, Matthew Hardin
Unified Authentication, Authorization and User Administration An Open Source Approach Introduction Ted C. Cheng, Howard Chu, Matthew Hardin {tedcheng,hyc,mhardin}@symas.com Authentication, authorization,
Avaya CM Login with Windows Active Directory Services
Avaya CM Login with Windows Active Directory Services Objective 2 Installing Active Directory Services on a Windows 2003 Server 2 Installing Windows Service for UNIX on Windows 2003 Active Directory Server
# Windows Internet Name Serving Support Section: # WINS Support - Tells the NMBD component of Samba to enable its WINS Server ; wins support = no
Sample configuration file for the Samba suite for Debian GNU/Linux. This is the main Samba configuration file. You should read the smb.conf(5) manual page in order to understand the options listed here.
Integration with Active Directory. Jeremy Allison Samba Team
Integration with Active Directory Jeremy Allison Samba Team Benefits of using Active Directory Unlike the earlier Microsoft Windows NT 4.x Domain directory service which used proprietary DCE/RPC calls,
Active Directory and Linux Identity Management
Active Directory and Linux Identity Management Published by the Open Source Software Lab at Microsoft. December 2007. Special thanks to Chris Travers, Contributing Author to the Open Source Software Lab.
Implementazione dell autenticazione con LDAP
Implementazione dell autenticazione con LDAP Esercitazione Informazioni preliminari " : /etc/openldap/slapd.conf /etc/openldap/ldap.conf /etc/ldap.conf #$/etc/init.d/ldap "$ "%&$ldap:///??
User Management / Directory Services using LDAP
User Management / Directory Services using LDAP Benjamin Wellmann [email protected] May 14, 2010 1 Introduction LDAP or Lightweight Directory Access Protocol is a protocol for querying and modifying data
Interoperability Update: Red Hat Enterprise Linux 7 beta and Microsoft Windows
Interoperability Update: Red Hat Enterprise 7 beta and Microsoft Windows Mark Heslin Principal Systems Engineer Red Hat Systems Engineering Dmitri Pal Senior Engineering Manager Red Hat Software Engineering
Migration of Windows Intranet domain to Linux Domain Moving Linux to a Wider World
Journal of Basic and Applied Engineering Research pp. 55-59 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Migration of Windows Intranet domain to Linux Domain Moving Linux to
Using Active Directory as your Solaris Authentication Source
Using Active Directory as your Solaris Authentication Source The scope of this paper is to document how a newly installed Solaris 10 server can be configured to use an Active Directory directory service
Linux Authentication using LDAP and edirectory
Linux Authentication using LDAP and edirectory Adrián Malaguti www.novell.com Contents Table of Contents Contents...2 Objetive...3 Authentication scheme...3 Recommendations...3 Server configuration...4
Using Kerberos to Authenticate a Solaris TM 10 OS LDAP Client With Microsoft Active Directory
Using Kerberos to Authenticate a Solaris TM 10 OS LDAP Client With Microsoft Active Directory Wajih Ahmed and Baban Kenkre March 2008 (Updated May 2008) Sun Microsystems, Inc. Please note: This configuration
Using Single Sign-on with Samba. Appendices. Glossary. Using Single Sign-on with Samba. SonicOS Enhanced
SonicOS Enhanced Using Single Sign-on with Samba Using Single Sign-on with Samba Introduction Recommended Versions Caveats SonicWALL Single Sign-on in Windows SonicWALL Single Sign-on with Samba Checking
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist.
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Outline 1. What is authentication? a. General Informations 2. Authentication Systems in Linux a. Local
Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory
Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory May 21, 2014 This edition of this document applies to Piston OpenStack 3.0. To send us your comments about this document, e-mail [email protected].
Using Active Directory to Authenticate Linux Users. Using Standard Protocols and Open Source Products
Using Active Directory to Authenticate Linux Users Using Standard Protocols and Open Source Products 5/22/2006 EXECUTIVE SUMMARY... 5 GOALS AND OBJECTIVES... 5 INFRASTRUCTURE AND RESOURCES... 5 LAB DOCUMENTATION...
SSSD Active Directory Improvements
FreeIPA Training Series SSSD Active Directory Improvements Jakub Hrozek January 2013 Contents of the presentation 1.Overview of Active Directory related improvements 2.Range attributes support 3.Mapping
Windows Enterprise OU Administrator Tips. Integrating RHEL5 Systems with Active Directory
Windows Enterprise OU Administrator Tips Integrating RHEL5 Systems with Active Directory John Dickerson and Beata Pruski Created: December 4, 2009 Last Update: February 4, 2011 This document will show
Integrating HP-UX 11.x Account Management and Authentication with Microsoft Windows 2000 White Paper
Integrating HP-UX 11.x Account Management and Authentication with Microsoft Windows 2000 White Paper! Printed in: U.S.A. Copyright 2001 Hewlett-Packard Company Legal Notices The information in this document
Practical LDAP on Linux
Practical LDAP on Linux A practical guide to integrating LDAP directory services on Linux Michael Clark http://gort.metaparadigm.com/ldap/ Aug-23-02 1 Presentation Overview The
Univention Corporate Server. Extended domain services documentation
Univention Corporate Server Extended domain services documentation 2 Table of Contents 1. Integration of Ubuntu clients into a UCS domain... 4 1.1. Integration into the LDAP directory and the SSL certificate
How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance
An Oracle Technical White Paper November 2014 How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance Table of Contents Introduction...3 Active Directory LDAP Services...4
LDAP Server Configuration Example
ATEN Help File LDAP Server Configuration Example Introduction The KVM Over the NET switch allows log in authentication and authorization through external programs. This chapter provides an example of how
Connect to UW UWWI Active Directory
Connect to UW UWWI Active Directory Motivation Working in progress notes: Create Computer in Active Directory. Firewall Hostname - FQDN required Create krb5 keytab REDHAT & VARIANTS specific instructions
Managing an Active Directory Infrastructure
3 CHAPTER 3 Managing an Active Directory Infrastructure Objectives This chapter covers the following Microsoft-specified objectives for the Planning and Implementing an Active Directory Infrastructure
(june 2007 -> this is version 3.025a)
U s i n g t h e L i n u x P C o n t h e M e e t P C V L A N This article was published on www.tudelft.nl/itt Date: june, 2007 Author: Boris van Es Version: 1.0 Case In your lab there are several computers
Unifying Authorization Models
Unifying Authorization Models Merging /etc/group and 'Domain Users' Gerald Carter Centeris [email protected] http://www.samba.org/ Slide 1 Copyright G. Carter, 2006 Outline http://samba.org/~jerry/slides/lwny07_2up.pdf
Configuring idrac6 for Directory Services
Configuring idrac6 for Directory Services Instructions for Setting Up idrac6 with Active Directory, Novell, Fedora, OpenDS and OpenLDAP Directory Services. A Dell Technical White Paper Dell Product Group
FreeIPA 3.3 Trust features
FreeIPA 3.3 features Sumit Bose, Alexander Bokovoy March 2014 FreeIPA and Active Directory FreeIPA and Active Directory both provide identity management solutions on top of the Kerberos infrastructure
Windows Security and Directory Services for UNIX using Centrify DirectControl
SOLUTION GUIDE CENTRIFY CORP. SEPTEMBER 2005 Windows Security and Directory Services for UNIX using Centrify DirectControl With Centrify, you can now fully leverage your investment in Active Directory
LDAP-UX Client Services B.04.10 with Microsoft Windows Active Directory Administrator's Guide
LDAP-UX Client Services B.04.10 with Microsoft Windows Active Directory Administrator's Guide HP-UX 11i v1, v2 and v3 HP Part Number: J4269-90074 Published: E0407 Edition: Edition 6 Copyright 2007 Hewlett-Packard
DB2 - LDAP. To start with configuration of transparent LDAP, you need to configure the LDAP server.
http://www.tutorialspoint.com/db2/db2_ldap.htm DB2 - LDAP Copyright tutorialspoint.com Introduction LDAP is Lightweight Directory Access Protocol. LDAP is a global directory service, industry-standard
LDAP Server Configuration Example
ATEN Help File LDAP Server Configuration Example Introduction KVM Over the NET switches allow log in authentication and authorization through external programs. This help file provides an example of how
Samba on HP StorageWorks Enterprise File Services (EFS) Clustered File System Software
Samba on HP StorageWorks Enterprise File Services (EFS) Clustered File System Software Installation and integration guide Abstract... 2 Introduction... 2 Application overview... 2 Application configuration...
CA SiteMinder. Directory Configuration - OpenLDAP. r6.0 SP6
CA SiteMinder Directory Configuration - OpenLDAP r6.0 SP6 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Going in production Winbind in large AD domains today. Günther Deschner [email protected]. (Red Hat / Samba Team)
Going in production Winbind in large AD domains today Günther Deschner [email protected] (Red Hat / Samba Team) Agenda To go where no one has gone before Winbind scalability Find Domain Controllers Active Directory
Modifying the Active Directory Schema to Support Mac Systems
Modifying the Active Directory Schema to Support Mac Systems Strategies and Best Practices for Planning, Testing, and Deploying the Mac Successfully in Your Enterprise October 2009 2 Contents Page 3 Page
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation
Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation Agenda Overview Components Considerations Configurations Futures Summary What is needed? Thorough understanding components,
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
IPBrick - Member of AD domain IPBrick iportalmais
IPBrick - Member of AD domain IPBrick iportalmais March 2009 2 Copyright c iportalmais All rights reserved. March 2009. The information in this document can be changed without further notice. The declarations,
Mac OS X Directory Services
Mac OS X Directory Services Agenda Open Directory Mac OS X client access Directory services in Mac OS X Server Redundancy and replication Mac OS X access to other directory services Active Directory support
Active Directory Integration
SwiftStack Gateway Active Directory Integration Summary There are two main ways of integrating the SwiftStack Gateway with Microsoft Active Directory authentication: RID, using winbind LDAP For most implementations
VINTELA AUTHENTICATION SERVICES
VINTELA AUTHENTICATION SERVICES Troubleshooting Training, Level I Last printed 10/26/2006 3:07:00 PM VAS Troubleshooting Training, Level I VAS Troubleshooting Training, Level I... 2 1: Outline and Purpose...
Managing an Active Directory Infrastructure O BJECTIVES
O BJECTIVES This chapter covers the following Microsoft-specified objectives for the Planning and Implementing an Active Directory Infrastructure and Managing and Maintaining an Active Directory Infrastructure
Identity Management based on FreeIPA
Identity Management based on FreeIPA SLAC 2014 Thorsten Scherf Red Hat EMEA What is an Identity Management System (IdM) An IdM system is a set of services and rules to manage the users of an organization
Apple Technical White Paper. Best Practices for Integrating OS X Lion with Active Directory
Best Practices for Integrating OS X Lion with Active Directory Updated November 1, 2011 Contents Apple s Built-In Solution... 3 How to Integrate OS X with Active Directory... 4 Enterprise Integration Challenges...
Skyward LDAP Launch Kit Table of Contents
04.30.2015 Table of Contents What is LDAP and what is it used for?... 3 Can Cloud Hosted (ISCorp) Customers use LDAP?... 3 What is Advanced LDAP?... 3 Does LDAP support single sign-on?... 4 How do I know
Introduction... 1. Installing and Configuring the LDAP Server... 3. Configuring Yealink IP Phones... 30. Using LDAP Phonebook...
Introduction... 1 Installing and Configuring the LDAP Server... 3 OpenLDAP... 3 Installing the OpenLDAP Server... 3 Configuring the OpenLDAP Server... 4 Configuring the LDAPExploreTool2... 8 Microsoft
Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names
DataCove DT Active Directory Authentication In Active Directory (AD) authentication mode, the server uses NTLM v2 and LDAP protocols to authenticate users residing in Active Directory. The login procedure
Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services
Univention Corporate Server Operation of a Samba domain based on Windows NT domain services 2 Table of Contents 1. Components of a Samba domain... 4 2. Installation... 5 3. Services of a Samba domain...
Integrating Lustre with User Security Administration. LAD 15 // Chris Gouge // 2015 Sep
Integrating Lustre with User Security Administration LAD 15 // Chris Gouge // 2015 Sep Topics User Security in Linux POSIX Permissions The Requirement for Upcall in Lustre Upcall Utilities Overview Upcall
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
eprism Enterprise Tech Notes
eprism Enterprise Tech Notes Utilizing Microsoft Active Directory for eprism s Directory Services Context eprism can integrate with an existing LDAP (Lightweight Directory Access Protocol) directory for
Authentication in a Heterogeneous Environment
Authentication in a Heterogeneous Environment Integrating Linux (and UNIX and Mac) Identity Management in Microsoft Active Directory Mike Patnode VP of Technology Centrify Corporation [email protected]
Authentication Authorization Infrastructure
Authentication Authorization Infrastructure Jan Du Caju LUDIT - KULeuvenNet AAI update ldap kerberos Shibboleth LDAP end user ldap servers (in fail-over without password hashes): ldap.kuleuven.be (point
FreeIPA Cross Forest Trusts
Alexander Bokovoy Andreas Schneider May 10th, 2012 1 FreeIPA What is FreeIPA? Cross Forest Trusts 2 Samba 3 Demo Talloc Tutorial Pavel Brezina wrote Talloc tutorial! http://talloc.samba.org/
The following process allows you to configure exacqvision permissions and privileges for accounts that exist on an Active Directory server:
Ubuntu Linux Server & Client and Active Directory 1 Configuration The following process allows you to configure exacqvision permissions and privileges for accounts that exist on an Active Directory server:
Windows Server 2003 Service Pack 1 (SP1) or later service packs Enhanced version of Ntdsutil.exe
Article ID: 216498 - Last Review: February 3, 2010 - Revision: 11.0 How to remove data in Active Directory after an unsuccessful domain controller demotion System Tip This article applies to a different
Extending Microsoft Windows Active Directory Authentication to Access HP Service Health Reporter
Technical White Paper Extending Microsoft Windows Active Directory Authentication to Access HP Service Health Reporter For the Windows Operation System Software Version 9.40 Table of Contents Introduction...
The following gives an overview of LDAP from a user's perspective.
LDAP stands for Lightweight Directory Access Protocol, which is a client-server protocol for accessing a directory service. LDAP is a directory service protocol that runs over TCP/IP. The nitty-gritty
Integrating Mac OS X 10.6 with Active Directory. 1 April 2010
Integrating Mac OS X 10.6 with Active Directory 1 April 2010 Introduction Apple Macintosh Computers running Mac OS X 10.6 can be integrated with the Boston University Active Directory to allow use of Active
Bring Linux into Microsoft s ADS
Bring Linux into Microsoft s ADS A lecture by Jens Kühnel Jens Kühnel Konsult und Training Bad Vilbel Germany About the speaker Jens Kühnel computer freak since age 8 Linux user since 1995 freelancer since
Directory Solutions Using OpenLDAP
Abstract Directory Solutions Using OpenLDAP Directory services are becoming the central location in the enterprise to store and retrieve information relating to users, groups, passwords, machines, printers
Step-by-Step Guide to Active Directory Bulk Import and Export
Page 1 of 12 TechNet Home > Windows Server TechCenter > Identity and Directory Services > Active Directory > Step By Step Step-by-Step Guide to Active Directory Bulk Import and Export Published: September
Creating an LDAP Directory
Systems and Network Management 1 Background Creating an LDAP Directory The ldap protocol is a standard for network directories. Some proprietary directory servers have been based on ldap, for example,
CYAN SECURE WEB HOWTO. NTLM Authentication
CYAN SECURE WEB HOWTO June 2008 Applies to: CYAN Secure Web 1.4 and above NTLM helps to transparently synchronize user names and passwords of an Active Directory Domain and use them for authentication.
Distributed File System
Petru Maior University, Târgu-Mureș Science Department Information Technolgy Master Course Distributed File System Students: Bardosi Florin Cifor Crina Danciu Ioana Hintea Dan Alexandru Table of Contents
Enabling Active Directory Authentication with ESX Server 1
1 Enabling Active Directory Authentication with ESX Server 1 This document provides information about how to configure ESX Server to use Active Directory for authentication. ESX Server system includes
USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE
White Paper USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE CONTENTS Executive Summary 1 Introduction 1 Audience 2 Terminology 2 Windows Concepts
Open Directory & OpenLDAP. David M. O Rourke Engineering Manager
Open Directory & OpenLDAP David M. O Rourke Engineering Manager Overview Background on Apple s Open Directory Technology (8 minutes) What is it What is Directory Services How has Apple integrated OpenLDAP
IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE
White Paper IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE Abstract The OneFS user mapping service combines a user s identities from different directory services into a single access
Troubleshooting Active Directory Server
Proven Practice Troubleshooting Active Directory Server Product(s): IBM Cognos Series 7 Area of Interest: Security Troubleshooting Active Directory Server 2 Copyright Copyright 2008 Cognos ULC (formerly
Vintela Authentication from SCO Release 2.2. System Administration Guide
Vintela Authentication from SCO Release 2.2 System Administration Guide November 19, 2003 COPYRIGHT (c) Copyright 2003 Vintela, Inc. All Rights Reserved. (c) Copyright 2003 The SCO Group, Inc. Vintela
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
CONFIGURING ACTIVE DIRECTORY IN LIFELINE
White Paper CONFIGURING ACTIVE DIRECTORY IN LIFELINE CONTENTS Introduction 1 Audience 1 Terminology 1 Test Environment 2 Joining a Lenovo network storage device to an AD domain 3 Importing Domain Users
ONEFS MULTIPROTOCOL SECURITY UNTANGLED
White Paper ONEFS MULTIPROTOCOL SECURITY UNTANGLED Abstract This paper describes the role that identity management, authentication, and access control play in the security system of the EMC Isilon OneFS
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
Building Open Source Identity Management with FreeIPA. Martin Kosek [email protected] http://www.oss4b.it/
Building Open Source Identity Management with FreeIPA Martin Kosek [email protected] http:/// OSS4B 2013 - Open Source Software for Business 19-20 September 2013, Monash University Prato Centre Prato,
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
Enabling single sign-on for Cognos 8/10 with Active Directory
Enabling single sign-on for Cognos 8/10 with Active Directory Overview QueryVision Note: Overview This document pulls together information from a number of QueryVision and IBM/Cognos material that are
Samba and LDAP in 30 Minutes
Samba and LDAP in 30 Minutes Configuring LDAP and a Samba-PDC on RHEL4 by Jens Kühnel Bad Vilbel, Germany freelance SuSE- and RedHat-Trainer book author Samba 3 - Wanderer zwischen den Welten Overview
How To Use Directcontrol With Netapp Filers And Directcontrol Together
Application Note Using DirectControl with Network Appliance Filers Published: June 2006 Abstract This Application Note describes the integration between Network Appliance servers and Centrify DirectControl
Chapter 3 Authenticating Users
Chapter 3 Authenticating Users Remote users connecting to the SSL VPN Concentrator must be authenticated before being allowed to access the network. The login window presented to the user requires three
The Integration of LDAP into the Messaging Infrastructure at CERN
The Integration of LDAP into the Messaging Infrastructure at CERN Ray Jackson CERN / IT-IS Group 29 Nov 2000 16:00 CERN IT Auditorium, bldg. 31, 3-005 A bit about me Technical Student Sep 1997-1998 in
PineApp Surf-SeCure Quick
PineApp Surf-SeCure Quick Installation Guide September 2010 WEB BASED INSTALLATION SURF-SECURE AS PROXY 1. Once logged in, set the appliance s clock: a. Click on the Edit link under Time-Zone section.
1 Introduction. Windows Server & Client and Active Directory. www.exacq.com
Windows Server & Client and Active Directory 1 Introduction For an organization using Active Directory (AD) for user management of information technology services, integrating exacqvision into the AD infrastructure
