Hey all,
I got a unique requirement of having AD groups map over to unix gid and existing
perms of Unix only groups being granted. Reading through the man pages it seems
this can be accomplished via idmap_nss. So my config looks like:
[global]
workgroup = SKUNKTEST
realm = SKUNKTEST.LOCAL
security = ads
preferred master = no
encrypt passwords = yes
log level = 5
log file = /var/log/samba/%m
max log size = 50
server string = Samba RnD Server
winbind enum groups = yes
idmap backend = tdb
idmap uid = 1000000-1999999
idmap gid = 1000000-1999999
idmap config SKUNKTEST: backend = nss
idmap config SKUNKTEST: range = 1000000-1999999
idmap config KRB: default = yes
idmap config KRB: backend = tdb
[foo]
comment = A Shared Drive
read only = no
path = /samba/arwin
When I do a "getent group" my winbindd-idmap.tdb populates with groups
from AD with gid mappings, of course winbind is running. When I access a share
via Windows and go to the security tab it will looks something like:
Everyone
arwin (Unix User\arwin)
it_posix (Unix Group\it_posix)
My problem arises here. If someone other than myself who is in the it_posix
group (LDAP) tries to access the file (perms are rwx for group), they get access
denied. So then apparently I should be able to "net groupmap" like:
net groupmap add ntgroup="testing" unixgroup=it_posix type=d
Which results in:
[root at krb samba]# net groupmap list verbose
testing
SID : S-1-5-21-471262856-1245818307-3878391063-11805
Unix gid : 5402
Unix group: itr_posix
Group type: Domain Group
Comment : Domain Unix group
Gid that is reported by Unix gid is good. Now the security tab looks like:
Everyone
arwin (Unix User\arwin)
testing (KRB\testing)
But people in that group still cannot access the file. It's only when I
turn off winbind they can access the file, but I want winbind running so acls
can be distributed for the groups in winbindd-idmap.tdb.
Any help is appreciated.
Thanks,
Arwin