[NTLUG:Discuss] Asking the right Questions (Samba + AD)
. Daniel
xdesign at hotmail.com
Tue May 8 13:35:13 CDT 2007
Chris, you *ARE* the man.
Okay, so your few bits of advice either helped directly or pointed me in
the correct directions and for that I'm grateful.
If anyone is interested in my findings, I'd be happy to answer questions
about what I had learned, but I will say that one guide I stumbled upon
definitely gave me all the details and explanations I needed to make it all
come together in a way that I felt I came away actually learning something
in the process.
http://www.infosecwriters.com/text_resources/pdf/AD_and_Linux_TMunn.pdf
The PDF indicated above is probably the best guide to accomplishing what I
wanted ever. It also links to the sources the author used when creating
the guide. It explains all the little settings you need and why. That was
the important thing. One thing I wish it mentioned was that the Microsoft
environment is slow when it comes to propagating status and information
across the network. So when I tweaked this, that or the other and no
results came of it, I was left scratching my head wondering where I messed
up.
So the first key point is to be PATIENT. When you make some kind of change
with reference to the Active Directory Domain, it would be helpful if you
went off and did something else for about 5 minutes.
The next thing I learned from this guide that wasn't in any other guide was
the settings in /etc/nsswitch.conf. All the guides I had seen before
discussed only passwd, shadow and group being linked to "files" and
"winbind" but made no mention of protocols, services, netgroup or
automount. I don't actually know if that made a huge difference or not
(though I suspect it did make some when it came to getting groups
information into other apps like webmin's samba config app) but I included
the information from the guide as given and it worked in ways that I hadn't
seen before.
For another thing, mention was made about NTP... network time protocol or
whatever... and its significance in getting Kerberos to working properly.
That wasn't new information and it didn't provide anything specific other
than to say that the time info should be pulled from the domain servers. I
didn't have to change anything from what I already had, but it was an
important checkpoint to verify that both machines were in sync.
The Kerberos configuration was quite a bit more detailed than others I had
noticed in the previous attempts. I had no linkage to [appdefaults] or
[kdc] information. It was also interesting that the documentation spelled
out that in the [domain_realm] section, the ".domain-name.com =
DOMAIN-NAME.COM" should come before the "domain-name.com = DOMAIN-NAME.COM"
line. It stressed that this was critically important for some reason. I
had both lines in there, but in the opposite order and that may have been
one of the reasons for the failures I was experiencing. I also added an
extra line pointing to a second domain controller for kerberos information.
Finally, and probably most significantly, I added content lines as
specified related to PAM configuration. Notably, it added usage of
Kerberos authentication modules. (Also, it added the thing Chris mentioned
about mkhomedir.so... very useful) I believe those additions were the most
significant aspects enabling the functionality I sought.
All in all, this guide provides an excellent checklist of points when
setting up a Samba Linux server in an active directory environment.
Now as far as all that ACL stuff goes; while I feel I could have done it
that way, I needed to remind myself that it was far and away from the
actual intent of this particular server. In this case, it was so that
members of AD group "WebAdmins" and/or "WebDevelopers" would have
permission to log in and manage files for the company's intranet. So I
sort of took a short-cut to that end. I set the group permissions for the
share to reflect the requirement for group membership, but additionally, I
forced user (force user = and force group =) and group information to be
"apache." ACLs are a moot point when using this approach and it works
exactly the way I want it to work under this scenario. But if I were
creating a general purpose file server, then of course I would have gone
through the trouble of setting up ACLs and all that.
Once again, if anyone would like me to include my current config files or
anything else, I'd be happy to share the knowledge. But I'll say that the
vast majority of anything I have is also mentioned in the guide indicated
at the top of this message. It's VERY useful... very useful.
>. Daniel wrote:
> > Excellent! That'll fill in the missing bits on login! :) Great! I'll
try
> > that in the morning.
> >
> > Next, what if I want to share something like, say, /var/www/html to be
> > writeable by members of the ADOMAIN\WebAdministrators group?
>
>If you really have taken things all the way.. your files are now
>under the auspices of POSIX (draft) ACLs. The best way to change
>the permissions is to have the owner (the web user) be an AD
>user and change the permissions via Windows.
>
>If that's not what you want... you can at least play with settings
>under Windows for some other directory and look at how it translated
>into extended ACLs and manipulate the values from a linux shell.
>
> >
> > Logs also show a problem with kerberos tickets... I'll search around
some
> > more on that though... seems to be a common problem with few answers.
> > (That is to say searching google for the error messages in the logs
yields
> > many hits, but I have yet to find any answers associated with the
> > questions.)
> >
> >
> >> From: Chris Cox <cjcox at acm.org>
> >
> >> . Daniel wrote:
> >>> Things seem to be working. I just can't get to something useable.
> >>>
> >>> I can get user accounts to log in via ssh, for example. I can ssh
into
> > the
> >>> box, using the format: ADOMAIN\username and it works except that
> > there's no
> >>> homedir created or anything like that... heck, I even tried logging
> > into X
> >>> using AD credentials. It "tried" but since there was no home
> > directory, it
> >>> didn't happen. Pretty neat really.
> >> You can use root preexec = on the homes share to force creation of a
> >> home dir for users hitting that share on the net.
> >>
> >> On the login side, use the pam module pam_mkhomedir.so
> >>
> >>> So here's the thing:
> >>>
> >>> How do I create a share that AD users can access?
> >>>
> >
> > _________________________________________________________________
> > ウェブページを印刷しても途切れない!便利なブラウザを使おう
> > http://promotion.msn.co.jp/ie7/
> >
> >
> > _______________________________________________
> > http://www.ntlug.org/mailman/listinfo/discuss
> >
> >
>
>
>_______________________________________________
>http://www.ntlug.org/mailman/listinfo/discuss
_________________________________________________________________
MSNトラベルのクチコミ写真コンテストに参加してプレゼントをGETしよう!
http://special.msn.co.jp/travel/campaign/0410/index.htm
More information about the Discuss
mailing list