Roy Eastwood
2019-Sep-25 15:25 UTC
[Samba] Unable to use BUILTIN AD groups on a domain member
I have set up a share on a domain member server and am attempting to set the ACLs from a domain-joined Windows 7 computer as per the WiKi at https://wiki.samba.org/index.php/Setting_up_a_Share_Using_Windows_ACLs I want to use one of the BUILTIN groups, Backup Operators to be able to have Full Control on files in the share (as it will be used for backups). However, when trying to assign the group, Windows cannot find it. (If I perform that same on a share on one of the DCs, it works OK). I can set ACLs for the usual domain groups, eg Domain Admins, Domain Users etc, but none of the BUILTIN groups are found. The server's OS is Rasbian Buster, Samba is Version 4.9.5-Debian. The sever knows about the groups as id test1 (an AD user) gives: uid=13101(test1) gid=10513(domain users) groups=10513(domain users),13101(test1),2001(BUILTIN\users) So I assume nsswitch is set up OK. wbinfo -g and getent group (when the two "winbind enum" lines in smb.conf were active) lists all the Domain groups, but none of the BUILTIN groups. The smb.conf is: [global] netbios name = pi4b security = ADS workgroup = MICROLYNX realm = MICROLYNX.ORG # disable smb1 client min protocol = smb2_02 server min protocol = smb2_02 log file = /var/log/samba/%m.log log level = 1 # to prevent "Address family not supported by protocol" messages (ipv6) bind interfaces only = yes interfaces = lo eth0 dedicated keytab file = /etc/krb5.keytab kerberos method = secrets and keytab winbind refresh tickets = yes winbind use default domain = yes # Default idmap config used for BUILTIN and local accounts/groups idmap config * : backend = tdb idmap config * : range = 2000-9999 # idmap config for domain MICROLYNX idmap config MICROLYNX:backend = rid idmap config MICROLYNX:range = 10000-99999 # next two lines for testing only - comment-out once working ok # winbind enum users = yes # winbind enum groups = yes # template shell = /bin/bash # template homedir = /srv/samba/users/%U vfs objects = acl_xattr map acl inherit = yes store dos attributes = yes username map = /etc/samba/user.map [images] # for backup images made by Macrium Reflect path = /srv/samba/images read only = no acl_xattr:ignore system acl = yes In the meantime I have used Domain Admins. getfacl shows: getfacl /srv/samba/images getfacl: Removing leading '/' from absolute path names # file: srv/samba/images # owner: root # group: domain\040admins user::rwx user:root:rwx user:10512:rwx user:10513:r-x group::rwx group:NT\040Authority\\system:rwx group:domain\040admins:rwx group:domain\040users:r-x mask::rwx other::--- default:user::rwx default:user:root:rwx default:user:10513:r-x default:group::--- default:group:NT\040Authority\\system:rwx default:group:domain\040admins:--- default:group:domain\040users:r-x default:mask::rwx default:other::--- How do I assign the Backup Operators ACLs on the share? If this isn't possible, I guess I could use delegation or nested groups. But I think I must have something set up incorrectly. Appreciate any advice. Thanks, Roy
Rowland penny
2019-Sep-25 16:24 UTC
[Samba] Unable to use BUILTIN AD groups on a domain member
On 25/09/2019 16:25, Roy Eastwood via samba wrote:> I have set up a share on a domain member server and am attempting to set the ACLs from a domain-joined Windows 7 computer as per the > WiKi at https://wiki.samba.org/index.php/Setting_up_a_Share_Using_Windows_ACLs > > I want to use one of the BUILTIN groups, Backup Operators to be able to have Full Control on files in the share (as it will be used > for backups). However, when trying to assign the group, Windows cannot find it. (If I perform that same on a share on one of the > DCs, it works OK). I can set ACLs for the usual domain groups, eg Domain Admins, Domain Users etc, but none of the BUILTIN groups > are found. > > The server's OS is Rasbian Buster, Samba is Version 4.9.5-Debian. The sever knows about the groups as id test1 (an AD user) gives: > > uid=13101(test1) gid=10513(domain users) groups=10513(domain users),13101(test1),2001(BUILTIN\users) > > So I assume nsswitch is set up OK. > > wbinfo -g and getent group (when the two "winbind enum" lines in smb.conf were active) lists all the Domain groups, but none of the > BUILTIN groups. > > The smb.conf is: > [global] > netbios name = pi4b > security = ADS > workgroup = MICROLYNX > realm = MICROLYNX.ORG > > # disable smb1 > client min protocol = smb2_02 > server min protocol = smb2_02 > > log file = /var/log/samba/%m.log > log level = 1 > > # to prevent "Address family not supported by protocol" messages (ipv6) > bind interfaces only = yes > interfaces = lo eth0 > > dedicated keytab file = /etc/krb5.keytab > kerberos method = secrets and keytab > winbind refresh tickets = yes > > winbind use default domain = yes > > # Default idmap config used for BUILTIN and local accounts/groups > idmap config * : backend = tdb > idmap config * : range = 2000-9999 > > # idmap config for domain MICROLYNX > idmap config MICROLYNX:backend = rid > idmap config MICROLYNX:range = 10000-99999 > > # next two lines for testing only - comment-out once working ok > # winbind enum users = yes > # winbind enum groups = yes > > # template shell = /bin/bash > # template homedir = /srv/samba/users/%U > > vfs objects = acl_xattr > map acl inherit = yes > store dos attributes = yes > username map = /etc/samba/user.map > > [images] > # for backup images made by Macrium Reflect > path = /srv/samba/images > read only = no > acl_xattr:ignore system acl = yes > > In the meantime I have used Domain Admins. getfacl shows: > > getfacl /srv/samba/images > getfacl: Removing leading '/' from absolute path names > # file: srv/samba/images > # owner: root > # group: domain\040admins > user::rwx > user:root:rwx > user:10512:rwx > user:10513:r-x > group::rwx > group:NT\040Authority\\system:rwx > group:domain\040admins:rwx > group:domain\040users:r-x > mask::rwx > other::--- > default:user::rwx > default:user:root:rwx > default:user:10513:r-x > default:group::--- > default:group:NT\040Authority\\system:rwx > default:group:domain\040admins:--- > default:group:domain\040users:r-x > default:mask::rwx > default:other::--- > > How do I assign the Backup Operators ACLs on the share? If this isn't possible, I guess I could use delegation or nested groups. > But I think I must have something set up incorrectly. Appreciate any advice. > > Thanks, > > Roy > > >No, you haven't got anything set up incorrectly ;-) Backup Operators is a Windows group, so you cannot use it anywhere but on Windows or a Samba DC. I would just create a new group and make this group a member of Backup Operators. Rowland
Roy Eastwood
2019-Sep-25 17:53 UTC
[Samba] Unable to use BUILTIN AD groups on a domain member
On 25 September 2019 17:25, Rowland penny wrote:> On 25/09/2019 16:25, Roy Eastwood via samba wrote: > > I have set up a share on a domain member server and am attempting to set the ACLs from a domain-joined Windows 7 computer as > per the > > WiKi at https://wiki.samba.org/index.php/Setting_up_a_Share_Using_Windows_ACLs > > > > I want to use one of the BUILTIN groups, Backup Operators to be able to have Full Control on files in the share (as it will beused> > for backups). However, when trying to assign the group, Windows cannot find it. (If I perform that same on a share on one ofthe> > DCs, it works OK). I can set ACLs for the usual domain groups, eg Domain Admins, Domain Users etc, but none of the BUILTIN > groups > > are found. > > > > The server's OS is Rasbian Buster, Samba is Version 4.9.5-Debian. The sever knows about the groups as id test1 (an AD user)gives:> > > > uid=13101(test1) gid=10513(domain users) groups=10513(domain users),13101(test1),2001(BUILTIN\users) > > > > So I assume nsswitch is set up OK. > > > > wbinfo -g and getent group (when the two "winbind enum" lines in smb.conf were active) lists all the Domain groups, but none of > the > > BUILTIN groups. > > > > The smb.conf is: > > [global] > > netbios name = pi4b > > security = ADS > > workgroup = MICROLYNX > > realm = MICROLYNX.ORG > > > > # disable smb1 > > client min protocol = smb2_02 > > server min protocol = smb2_02 > > > > log file = /var/log/samba/%m.log > > log level = 1 > > > > # to prevent "Address family not supported by protocol" messages (ipv6) > > bind interfaces only = yes > > interfaces = lo eth0 > > > > dedicated keytab file = /etc/krb5.keytab > > kerberos method = secrets and keytab > > winbind refresh tickets = yes > > > > winbind use default domain = yes > > > > # Default idmap config used for BUILTIN and local accounts/groups > > idmap config * : backend = tdb > > idmap config * : range = 2000-9999 > > > > # idmap config for domain MICROLYNX > > idmap config MICROLYNX:backend = rid > > idmap config MICROLYNX:range = 10000-99999 > > > > # next two lines for testing only - comment-out once working ok > > # winbind enum users = yes > > # winbind enum groups = yes > > > > # template shell = /bin/bash > > # template homedir = /srv/samba/users/%U > > > > vfs objects = acl_xattr > > map acl inherit = yes > > store dos attributes = yes > > username map = /etc/samba/user.map > > > > [images] > > # for backup images made by Macrium Reflect > > path = /srv/samba/images > > read only = no > > acl_xattr:ignore system acl = yes > > > > In the meantime I have used Domain Admins. getfacl shows: > > > > getfacl /srv/samba/images > > getfacl: Removing leading '/' from absolute path names > > # file: srv/samba/images > > # owner: root > > # group: domain\040admins > > user::rwx > > user:root:rwx > > user:10512:rwx > > user:10513:r-x > > group::rwx > > group:NT\040Authority\\system:rwx > > group:domain\040admins:rwx > > group:domain\040users:r-x > > mask::rwx > > other::--- > > default:user::rwx > > default:user:root:rwx > > default:user:10513:r-x > > default:group::--- > > default:group:NT\040Authority\\system:rwx > > default:group:domain\040admins:--- > > default:group:domain\040users:r-x > > default:mask::rwx > > default:other::--- > > > > How do I assign the Backup Operators ACLs on the share? If this isn't possible, I guess I could use delegation or nestedgroups.> > But I think I must have something set up incorrectly. Appreciate any advice. > > > > Thanks, > > > > Roy > > > > > > > No, you haven't got anything set up incorrectly ;-) > > Backup Operators is a Windows group, so you cannot use it anywhere but > on Windows or a Samba DC. > > I would just create a new group and make this group a member of Backup > Operators. > > RowlandThanks. I think I understand. In that case should I be able to assign a BUILTIN group's permissions to a folder on the Windows machine, which is joined to the domain, and I am logged on as a member of Domain Admins? But I get the same problem - cannot find the group 'Backup Operators'. Does this mean this will only work when I am a member of a domain which has a Windows DC? Or are the BUILTIN groups only available on a DC (Windows or Samba flavour) itself? Yes, either way, I'll create a new group as you say. Once again many thanks for your help. Roy