Hello, I've been reading up on lots of documents that mention the different ways to do things as far as joining a linux machine to AD and authentication. I've tried most of them but its not helping at all. I've included my config files for smb.conf, krb5.conf, pam.d/system-auth and the applicable nsswitch.conflines. For security reasons, i've obscured part of the domain name. Any help is appreciated. Here are the questions: 1. Do i need to edit more than one pam.d file? For now, I'm just trying to be able to SSH in as a domain account and as a local user account. 2. Do all the config files here look correct? 3. When logging in, what should my login name be? DOMAIN\Username or just Username or username@DOMAIN.NAME.COM ? I've tried all with no luck. 4. Can AD group policy affect this in someway? At the bottom, I have attached the output of some commands that may also help. Thank you in advance for any help/advice. Anoop # pam.d/system-auth auth required /lib/security/$ISA/pam_env.so auth sufficient /lib/security/$ISA/pam_unix.so likeauth nullok auth sufficient /lib/security/$ISA/pam_winbind.so use_first_pass auth required /lib/security/$ISA/pam_deny.so account required /lib/security/$ISA/pam_unix.so broken_shadow account sufficient /lib/security/$ISA/pam_succeed_if.so uid < 100 quiet account [default=bad success=ok user_unknown=ignore] /lib/security/$ISA/pam_winbind.so account required /lib/security/$ISA/pam_permit.so password requisite /lib/security/$ISA/pam_cracklib.so retry=3 password sufficient /lib/security/$ISA/pam_unix.so nullok use_authtok md5 shadow password sufficient /lib/security/$ISA/pam_winbind.so use_authtok password required /lib/security/$ISA/pam_deny.so session required /lib/security/$ISA/pam_limits.so session required /lib/security/$ISA/pam_unix.so # krb5.conf [logging] default = FILE:/var/log/krb5libs.log kdc = FILE:/var/log/krb5kdc.log admin_server = FILE:/var/log/kadmind.log [libdefaults] default_realm = CORP.OBSCURED.COM dns_lookup_realm = true dns_lookup_kdc = true ticket_lifetime = 24h forwardable = yes default_tgs_enctypes = DES-CBC-CRC DES-CBC-MD5 RC4-HMAC default_tkt_enctypes = DES-CBC-CRC DES-CBC-MD5 RC4-HMAC preferred_enctypes = DES-CBC-CRC DES-CBC-MD5 RC4-HMAC [realms] CORP.OBSCURED.COM = { kdc = dmc01.corp.obscured.com kdc = dmc02.corp.obscured.com default_domain = CORP.OBSCURED.COM kdc = dmc03.corp.obscured.com } [domain_realm] .example.com = CORP.OBSCURED.COM example.com = CORP.OBSCURED.COM [kdc] profile = /var/kerberos/krb5kdc/kdc.conf [appdefaults] pam = { debug = false ticket_lifetime = 36000 renew_lifetime = 36000 forwardable = true krb4_convert = false } # smb.conf [global] workgroup = CORP netbios name = ADTEST01 server string = A test server printcap name = /etc/printcap load printers = yes log file = /var/log/samba/%m.log log level = 10 max log size = 50 security = ads realm = CORP.OBSCURED.COM encrypt passwords = yes preferred master = no smb passwd file = /etc/samba/smbpasswd allow trusted domains = yes unix password sync = yes password server = * passwd program = /usr/bin/passwd %u passwd chat = *New*password* %n\n *Retype*new*password* %n\n *passwd:*all*authentication*tokens*updated*successfully* pam password change = yes obey pam restrictions = yes socket options = TCP_NODELAY SO_RCVBUF=8192 SO_SNDBUF=8192 dns proxy = no idmap uid = 10000-20000 idmap gid = 10000-20000 enhanced browsing = no winbind use default domain = no winbind separator = + winbind enum users = yes winbind enum groups = yes template shell = /bin/bash template homedir = /home/%U # nsswitch.conf passwd: files winbind shadow: files winbind group: files winbind hosts: files dns bootparams: nisplus [NOTFOUND=return] files ethers: files netmasks: files networks: files protocols: files winbind rpc: files services: files winbind netgroup: files winbind publickey: files automount: files winbind aliases: files # OUTPUT # net ads join -U Administrator bhataadmin's password: [2006/06/30 09:54:14, 0] libads/ldap.c:ads_add_machine_acct(1368) ads_add_machine_acct: Host account for ADTEST01 already exists - modifying old account Using short domain name -- CORP Joined 'ADTEST01' to realm 'CORP.OBSCURED.COM' # # kinit Administrator@CORP.OBSCURED.COM Password for Administrator@CORP.OBSCURED.COM: # # wbinfo -u Error looking up domain users # wbinfo -g Error looking up domain groups # wbinfo -t checking the trust secret via RPC calls failed error code was (0x0) Could not check secret # Thanks very much.
any idea what the separator should be to use CORP\zuser as the login? On 6/30/06, pk <paul@computertaming.com> wrote:> > since you smb.conf has winbind separator = + ; login CORP+zuser > wbinfo commands show you dont have access to the domain; go to ad server > delete linux computer( that you tried to join to the directory) from > the active directory. Kinit show kerberos works, Go to /var/log/samba > check error logs; check system logs, verify winbind is running, I found > after *.conf files were changed dameons had to be restarted. Trying > joing again. What happens if you use smbclient command ie > > smbclient //CORP.OBSCURED.COM/shared something -Uzuser%password > > > > > Anoop Bhat wrote: > > > Hello, > > > > I've been reading up on lots of documents that mention the different > > ways to > > do things as far as joining a linux machine to AD and authentication. > > I've > > tried most of them but its not helping at all. I've included my config > > files > > for smb.conf, krb5.conf, pam.d/system-auth and the applicable > > nsswitch.conflines. For security reasons, i've obscured part of the > > domain name. Any help > > is appreciated. > > > > Here are the questions: > > > > 1. Do i need to edit more than one pam.d file? For now, I'm just > > trying to > > be able to SSH in as a domain account and as a local user account. > > 2. Do all the config files here look correct? > > 3. When logging in, what should my login name be? DOMAIN\Username or > just > > Username or username@DOMAIN.NAME.COM ? I've tried all with no luck. > > 4. Can AD group policy affect this in someway? > > > > At the bottom, I have attached the output of some commands that may also > > help. > > > > Thank you in advance for any help/advice. > > > > Anoop > > > > # pam.d/system-auth > > auth required /lib/security/$ISA/pam_env.so > > auth sufficient /lib/security/$ISA/pam_unix.so likeauth nullok > > auth sufficient /lib/security/$ISA/pam_winbind.so > > use_first_pass > > auth required /lib/security/$ISA/pam_deny.so > > > > account required /lib/security/$ISA/pam_unix.so broken_shadow > > account sufficient /lib/security/$ISA/pam_succeed_if.so uid < 100 > > quiet > > account [default=bad success=ok user_unknown=ignore] > > /lib/security/$ISA/pam_winbind.so > > account required /lib/security/$ISA/pam_permit.so > > > > password requisite /lib/security/$ISA/pam_cracklib.so retry=3 > > password sufficient /lib/security/$ISA/pam_unix.so nullok > > use_authtok > > md5 shadow > > password sufficient /lib/security/$ISA/pam_winbind.so use_authtok > > password required /lib/security/$ISA/pam_deny.so > > > > session required /lib/security/$ISA/pam_limits.so > > session required /lib/security/$ISA/pam_unix.so > > > > # krb5.conf > > [logging] > > default = FILE:/var/log/krb5libs.log > > kdc = FILE:/var/log/krb5kdc.log > > admin_server = FILE:/var/log/kadmind.log > > > > [libdefaults] > > default_realm = CORP.OBSCURED.COM > > dns_lookup_realm = true > > dns_lookup_kdc = true > > ticket_lifetime = 24h > > forwardable = yes > > default_tgs_enctypes = DES-CBC-CRC DES-CBC-MD5 RC4-HMAC > > default_tkt_enctypes = DES-CBC-CRC DES-CBC-MD5 RC4-HMAC > > preferred_enctypes = DES-CBC-CRC DES-CBC-MD5 RC4-HMAC > > > > [realms] > > CORP.OBSCURED.COM = { > > kdc = dmc01.corp.obscured.com > > kdc = dmc02.corp.obscured.com > > default_domain = CORP.OBSCURED.COM > > kdc = dmc03.corp.obscured.com > > } > > > > [domain_realm] > > .example.com = CORP.OBSCURED.COM > > example.com = CORP.OBSCURED.COM > > > > [kdc] > > profile = /var/kerberos/krb5kdc/kdc.conf > > > > [appdefaults] > > pam = { > > debug = false > > ticket_lifetime = 36000 > > renew_lifetime = 36000 > > forwardable = true > > krb4_convert = false > > } > > > > # smb.conf > > [global] > > workgroup = CORP > > netbios name = ADTEST01 > > server string = A test server > > printcap name = /etc/printcap > > load printers = yes > > log file = /var/log/samba/%m.log > > log level = 10 > > max log size = 50 > > security = ads > > realm = CORP.OBSCURED.COM > > encrypt passwords = yes > > preferred master = no > > smb passwd file = /etc/samba/smbpasswd > > allow trusted domains = yes > > unix password sync = yes > > password server = * > > passwd program = /usr/bin/passwd %u > > passwd chat = *New*password* %n\n *Retype*new*password* %n\n > > *passwd:*all*authentication*tokens*updated*successfully* > > pam password change = yes > > obey pam restrictions = yes > > socket options = TCP_NODELAY SO_RCVBUF=8192 SO_SNDBUF=8192 > > dns proxy = no > > idmap uid = 10000-20000 > > idmap gid = 10000-20000 > > enhanced browsing = no > > winbind use default domain = no > > winbind separator = + > > winbind enum users = yes > > winbind enum groups = yes > > template shell = /bin/bash > > template homedir = /home/%U > > > > # nsswitch.conf > > passwd: files winbind > > shadow: files winbind > > group: files winbind > > > > hosts: files dns > > > > bootparams: nisplus [NOTFOUND=return] files > > ethers: files > > netmasks: files > > networks: files > > protocols: files winbind > > rpc: files > > services: files winbind > > netgroup: files winbind > > publickey: files > > automount: files winbind > > aliases: files > > > > # OUTPUT > > > > # net ads join -U Administrator > > bhataadmin's password: > > [2006/06/30 09:54:14, 0] libads/ldap.c:ads_add_machine_acct(1368) > > ads_add_machine_acct: Host account for ADTEST01 already exists - > > modifying > > old account > > Using short domain name -- CORP > > Joined 'ADTEST01' to realm 'CORP.OBSCURED.COM' > > # > > > > # kinit Administrator@CORP.OBSCURED.COM > > Password for Administrator@CORP.OBSCURED.COM: > > # > > > > # wbinfo -u > > Error looking up domain users > > # wbinfo -g > > Error looking up domain groups > > # wbinfo -t > > checking the trust secret via RPC calls failed > > error code was (0x0) > > Could not check secret > > # > > > > Thanks very much. > > > >
ahh ok. i had troubles with leaving the line in there. any ideas on how i can auth certain groups only? Thank you pk! On 6/30/06, pk <paul@computertaming.com> wrote:> > > > yes > winbind separator = \ > but that is the default so that line could be commented out and achieve > the same result. > > > Anoop Bhat wrote: > > > any idea what the separator should be to use CORP\zuser as the login? > > > > On 6/30/06, pk <paul@computertaming.com> wrote: > > > >> > >> since you smb.conf has winbind separator = + ; login CORP+zuser > >> wbinfo commands show you dont have access to the domain; go to ad > server > >> delete linux computer( that you tried to join to the directory) from > >> the active directory. Kinit show kerberos works, Go to /var/log/samba > >> check error logs; check system logs, verify winbind is running, I > found > >> after *.conf files were changed dameons had to be restarted. Trying > >> joing again. What happens if you use smbclient command ie > >> > >> smbclient //CORP.OBSCURED.COM/shared something -Uzuser%password > >> > >> > >> > >> > >> Anoop Bhat wrote: > >> > >> > Hello, > >> > > >> > I've been reading up on lots of documents that mention the different > >> > ways to > >> > do things as far as joining a linux machine to AD and authentication. > >> > I've > >> > tried most of them but its not helping at all. I've included my > config > >> > files > >> > for smb.conf, krb5.conf, pam.d/system-auth and the applicable > >> > nsswitch.conflines. For security reasons, i've obscured part of the > >> > domain name. Any help > >> > is appreciated. > >> > > >> > Here are the questions: > >> > > >> > 1. Do i need to edit more than one pam.d file? For now, I'm just > >> > trying to > >> > be able to SSH in as a domain account and as a local user account. > >> > 2. Do all the config files here look correct? > >> > 3. When logging in, what should my login name be? DOMAIN\Username or > >> just > >> > Username or username@DOMAIN.NAME.COM ? I've tried all with no luck. > >> > 4. Can AD group policy affect this in someway? > >> > > >> > At the bottom, I have attached the output of some commands that may > >> also > >> > help. > >> > > >> > Thank you in advance for any help/advice. > >> > > >> > Anoop > >> > > >> > # pam.d/system-auth > >> > auth required /lib/security/$ISA/pam_env.so > >> > auth sufficient /lib/security/$ISA/pam_unix.so likeauth > >> nullok > >> > auth sufficient /lib/security/$ISA/pam_winbind.so > >> > use_first_pass > >> > auth required /lib/security/$ISA/pam_deny.so > >> > > >> > account required /lib/security/$ISA/pam_unix.so > broken_shadow > >> > account sufficient /lib/security/$ISA/pam_succeed_if.so uid > >> < 100 > >> > quiet > >> > account [default=bad success=ok user_unknown=ignore] > >> > /lib/security/$ISA/pam_winbind.so > >> > account required /lib/security/$ISA/pam_permit.so > >> > > >> > password requisite /lib/security/$ISA/pam_cracklib.so retry=3 > >> > password sufficient /lib/security/$ISA/pam_unix.so nullok > >> > use_authtok > >> > md5 shadow > >> > password sufficient /lib/security/$ISA/pam_winbind.so > >> use_authtok > >> > password required /lib/security/$ISA/pam_deny.so > >> > > >> > session required /lib/security/$ISA/pam_limits.so > >> > session required /lib/security/$ISA/pam_unix.so > >> > > >> > # krb5.conf > >> > [logging] > >> > default = FILE:/var/log/krb5libs.log > >> > kdc = FILE:/var/log/krb5kdc.log > >> > admin_server = FILE:/var/log/kadmind.log > >> > > >> > [libdefaults] > >> > default_realm = CORP.OBSCURED.COM > >> > dns_lookup_realm = true > >> > dns_lookup_kdc = true > >> > ticket_lifetime = 24h > >> > forwardable = yes > >> > default_tgs_enctypes = DES-CBC-CRC DES-CBC-MD5 RC4-HMAC > >> > default_tkt_enctypes = DES-CBC-CRC DES-CBC-MD5 RC4-HMAC > >> > preferred_enctypes = DES-CBC-CRC DES-CBC-MD5 RC4-HMAC > >> > > >> > [realms] > >> > CORP.OBSCURED.COM = { > >> > kdc = dmc01.corp.obscured.com > >> > kdc = dmc02.corp.obscured.com > >> > default_domain = CORP.OBSCURED.COM > >> > kdc = dmc03.corp.obscured.com > >> > } > >> > > >> > [domain_realm] > >> > .example.com = CORP.OBSCURED.COM > >> > example.com = CORP.OBSCURED.COM > >> > > >> > [kdc] > >> > profile = /var/kerberos/krb5kdc/kdc.conf > >> > > >> > [appdefaults] > >> > pam = { > >> > debug = false > >> > ticket_lifetime = 36000 > >> > renew_lifetime = 36000 > >> > forwardable = true > >> > krb4_convert = false > >> > } > >> > > >> > # smb.conf > >> > [global] > >> > workgroup = CORP > >> > netbios name = ADTEST01 > >> > server string = A test server > >> > printcap name = /etc/printcap > >> > load printers = yes > >> > log file = /var/log/samba/%m.log > >> > log level = 10 > >> > max log size = 50 > >> > security = ads > >> > realm = CORP.OBSCURED.COM > >> > encrypt passwords = yes > >> > preferred master = no > >> > smb passwd file = /etc/samba/smbpasswd > >> > allow trusted domains = yes > >> > unix password sync = yes > >> > password server = * > >> > passwd program = /usr/bin/passwd %u > >> > passwd chat = *New*password* %n\n *Retype*new*password* %n\n > >> > *passwd:*all*authentication*tokens*updated*successfully* > >> > pam password change = yes > >> > obey pam restrictions = yes > >> > socket options = TCP_NODELAY SO_RCVBUF=8192 SO_SNDBUF=8192 > >> > dns proxy = no > >> > idmap uid = 10000-20000 > >> > idmap gid = 10000-20000 > >> > enhanced browsing = no > >> > winbind use default domain = no > >> > winbind separator = + > >> > winbind enum users = yes > >> > winbind enum groups = yes > >> > template shell = /bin/bash > >> > template homedir = /home/%U > >> > > >> > # nsswitch.conf > >> > passwd: files winbind > >> > shadow: files winbind > >> > group: files winbind > >> > > >> > hosts: files dns > >> > > >> > bootparams: nisplus [NOTFOUND=return] files > >> > ethers: files > >> > netmasks: files > >> > networks: files > >> > protocols: files winbind > >> > rpc: files > >> > services: files winbind > >> > netgroup: files winbind > >> > publickey: files > >> > automount: files winbind > >> > aliases: files > >> > > >> > # OUTPUT > >> > > >> > # net ads join -U Administrator > >> > bhataadmin's password: > >> > [2006/06/30 09:54:14, 0] libads/ldap.c:ads_add_machine_acct(1368) > >> > ads_add_machine_acct: Host account for ADTEST01 already exists - > >> > modifying > >> > old account > >> > Using short domain name -- CORP > >> > Joined 'ADTEST01' to realm 'CORP.OBSCURED.COM' > >> > # > >> > > >> > # kinit Administrator@CORP.OBSCURED.COM > >> > Password for Administrator@CORP.OBSCURED.COM: > >> > # > >> > > >> > # wbinfo -u > >> > Error looking up domain users > >> > # wbinfo -g > >> > Error looking up domain groups > >> > # wbinfo -t > >> > checking the trust secret via RPC calls failed > >> > error code was (0x0) > >> > Could not check secret > >> > # > >> > > >> > Thanks very much. > >> > >> > >> > >> > > >