Gaiseric Vandal
2016-Nov-14 17:09 UTC
[Samba] Member server does not show users from trusted domain
I have a samba classic domain, called it "DomainA." All domain controllers and servers are running 3.6.25 on Solaris 11. The PDC and BDC use an LDAP backend for unix, samba and idmap data. Member servers use LDAP backend for unix accounts, so the underlying unix and group accounts are consistent. There is a trust relationship with Windows 2008 AD domain ("DomainB.") On the member servers, "wbinfo -u" and "wbinfo -g" only shows members from servers' own domain (DomainA.) The wbinfo command does indicate that domains are trusted. root at member1# wbinfo -m BUILTIN MEMBER1 DOMAINA DOMAINB root at member1# wbinfo -D DOMAINB Name : DOMAINB Alt_Name : domainb.mydomain.com SID : S-1-5-21-xxxxxxxxxxxxxxx Active Directory : Yes Native : Yes Primary : No root at member1# Although I am assuming that wbinfo is merely querying the domainA PDC or BDC. The PDC is also the WINS server. I have trying to configure idmapping for domainB on the member servers, using an LDAP backend, to keep the idmapping consistent across all servers. However, I figure idmapping won't come into play if winbind is not even seeing the domainB users. I am actually unclear if the member server is supposed to contact its own domain controller for trusted account information or if it is supposed to contact the trusted domain (domainB) AD controller. The nmblookup command indicates WINS resolution is working correctly. root at member1# nmblookup -U name_of_wins_server -R 'DOMAINB#1C' … answers: nmb_name=DOMAINB<1c> rr_type=32 rr_class=1 ttl=216591 answers 0 char ...... hex E000C0A8031A Got a positive name query response from ... ip_of_DomainB_AD DomainB<1c> root at member1# The log.wb-DOMAINB log shows the server locating the domain controller for the trusted domain. root at member1#testparm -v | grep winbind .... Server role: ROLE_DOMAIN_MEMBER Press enter to see a dump of your service definitions winbind separator = \ winbind cache time = 300 winbind reconnect delay = 30 winbind max clients = 200 winbind enum users = Yes winbind enum groups = Yes winbind use default domain = No winbind trusted domains only = No winbind nested groups = Yes winbind expand groups = 1 winbind nss info = template winbind refresh tickets = No winbind offline logon = No winbind normalize names = No winbind rpc only = No winbind max domain connections = 1 root at member1# The IDMAP entry in smb.conf is as follows idmap config DOMAINB:backend = ldap # idmap config DOMAINB:readonly = no idmap config DOMAINB:readonly = yes idmap config DOMAINB:default=no idmap config DOMAINB:ldap_base_dn = ou=domainb,ou=idmap,o=ssci.com idmap config DOMAINB:ldap_user_dn = cn=SomeLDAPAdminUser idmap config DOMAINB:ldap_url = ldap://pdc.mydomain.com idmap config DOMAINB:range = 30000-39999 #is following legit? idmap config DOMAINB:suffix=ou=domainb,ou=idmap Idmapping is required so that "getent passwd" and "getent group" can list windows users. But even if idmapping is not setup correctly, I should still see trusted users with "wbinfo -u" and "wbinfo -g." Appreciate any feedback Thanks
I updated my PDC and BDC to Samba 4.4.7. Compiled from source into /usr/local/samba. On the samba domain controllers "/usr/local/samba/bin/wbinfo -u" shows the local domain users but not the trusted one. Everything indicates trusts are ok # /usr/local/samba/bin/net rpc trustdom list -U Administrator Enter Administrator's password: Trusted domains list: DOMAINB S-1-5-21-xxxxxxxxxx-xxxxxxxxxx-xxxxxxxxxx Trusting domains list: DOMAINB S-1-5-21-xxxxxxxxxx-xxxxxxxxxx-xxxxxxxxxx # #/usr/local/samba/bin/wbinfo --all-domains BUILTIN DOMAINA DOMAINB The log.wb-DOMAINB file shows [2016/11/17 16:22:02.091057, 1] ../source3/winbindd/winbindd_ads.c:136(ads_cached_connection_connect) ads_connect for domain DOMAINB failed: The request is not supported. [2016/11/17 16:24:44.932829, 3] ../source3/winbindd/winbindd_pam.c:2058(winbindd_dual_pam_auth_crap) [ 1578]: pam auth crap domain: administration user: administrator [2016/11/17 16:24:44.936346, 3] ../source3/winbindd/winbindd_ads.c:1488(sequence_number) ads: fetch sequence_number for DOMAINB [2016/11/17 16:24:44.936534, 2] ../source3/lib/smbldap.c:794(smbldap_open_connection) smbldap_open_connection: connection opened [2016/11/17 16:24:44.938529, 3] ../source3/lib/smbldap.c:1013(smbldap_connect_system) ldap_connect_system: successful connection to the LDAP server [2016/11/17 16:24:44.939117, 3] ../source3/libsmb/namequery.c:3117(get_dc_list) get_dc_list: preferred server list: "DS1.domainb.mydomain.com, *" [2016/11/17 16:24:44.940870, 3] ../source3/libads/ldap.c:618(ads_connect) Successfully contacted LDAP server 192.168.3.26 [2016/11/17 16:24:44.941023, 3] ../source3/libsmb/namequery.c:3117(get_dc_list) get_dc_list: preferred server list: "DS1.domainb.mydomain.com, *" [2016/11/17 16:24:44.942361, 3] ../source3/libads/ldap.c:618(ads_connect) Successfully contacted LDAP server 192.168.x.x [2016/11/17 16:24:44.943591, 3] ../source3/libads/ldap.c:618(ads_connect) Successfully contacted LDAP server 192.168.x.x. [2016/11/17 16:24:44.944318, 3] ../source3/libads/ldap.c:661(ads_connect) Connected to LDAP serverDS1.domainb.mydomain.com [2016/11/17 16:24:44.946468, 3] ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) ads_sasl_spnego_bind: got OID=1.3.6.1.4.1.311.2.2.30 [2016/11/17 16:24:44.946532, 3] ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) ads_sasl_spnego_bind: got OID=1.2.840.48018.1.2.2 [2016/11/17 16:24:44.946574, 3] ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) ads_sasl_spnego_bind: got OID=1.2.840.113554.1.2.2 [2016/11/17 16:24:44.946614, 3] ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) ads_sasl_spnego_bind: got OID=1.2.840.113554.1.2.2.3 [2016/11/17 16:24:44.946655, 3] ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) ads_sasl_spnego_bind: got OID=1.3.6.1.4.1.311.2.2.10 [2016/11/17 16:24:45.250387, 0] ../source3/libads/sasl.c:336(ads_sasl_spnego_gensec_bind) ads_setup_sasl_wrapping() failed: The request is not supported. [2016/11/17 16:24:45.256988, 0] ../source3/libads/sasl.c:779(ads_sasl_spnego_bind) kinit succeeded but ads_sasl_spnego_gensec_bind(KRB5) failed: The request is not supported. [2016/11/17 16:24:45.262868, 1] ../source3/winbindd/winbindd_ads.c:136(ads_cached_connection_connect) ads_connect for domain DOMAINB failed: The request is not supported. [2016/11/17 16:24:45.262996, 3] ../source3/winbindd/winbindd_ads.c:1488(sequence_number) ads: fetch sequence_number for DOMAINB [2016/11/17 16:24:45.263932, 3] ../source3/libsmb/namequery.c:3117(get_dc_list) get_dc_list: preferred server list: "DS1.domainb.mydomain.com, *" [2016/11/17 16:24:45.265508, 3] ../source3/libads/ldap.c:618(ads_connect) Successfully contacted LDAP server 192.168.x.x [2016/11/17 16:24:45.265657, 3] ../source3/libsmb/namequery.c:3117(get_dc_list) get_dc_list: preferred server list: "DS1.domainb.mydomain.com, *" [2016/11/17 16:24:45.266972, 3] ../source3/libads/ldap.c:618(ads_connect) Successfully contacted LDAP server 192.168.x.x [2016/11/17 16:24:45.268199, 3] ../source3/libads/ldap.c:618(ads_connect) Successfully contacted LDAP server 192.168.x.x [2016/11/17 16:24:45.268892, 3] ../source3/libads/ldap.c:661(ads_connect) Connected to LDAP server DS1.domainb.mydomain.com [2016/11/17 16:24:45.270958, 3] ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) ads_sasl_spnego_bind: got OID=1.3.6.1.4.1.311.2.2.30 [2016/11/17 16:24:45.271020, 3] ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) ads_sasl_spnego_bind: got OID=1.2.840.48018.1.2.2 [2016/11/17 16:24:45.271062, 3] ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) ads_sasl_spnego_bind: got OID=1.2.840.113554.1.2.2 [2016/11/17 16:24:45.271102, 3] ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) ads_sasl_spnego_bind: got OID=1.2.840.113554.1.2.2.3 [2016/11/17 16:24:45.271143, 3] ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) ads_sasl_spnego_bind: got OID=1.3.6.1.4.1.311.2.2.10 [2016/11/17 16:24:45.610705, 0] ../source3/libads/sasl.c:336(ads_sasl_spnego_gensec_bind) ads_setup_sasl_wrapping() failed: The request is not supported. [2016/11/17 16:24:45.617251, 0] ../source3/libads/sasl.c:779(ads_sasl_spnego_bind) kinit succeeded but ads_sasl_spnego_gensec_bind(KRB5) failed: The request is not supported. [2016/11/17 16:24:45.623138, 1] ../source3/winbindd/winbindd_ads.c:136(ads_cached_connection_connect) ads_connect for domain DOMAINB failed: The request is not supported. # /usr/local/samba/sbin/smbd -b ... --with Options: WITH_ADS WITH_AUTOMOUNT WITH_AVAHI_SUPPORT WITH_DNS_UPDATES WITH_PAM WITH_PAM_MODULES WITH_PTHREADPOOL WITH_QUOTAS WITH_SYSLOG WITH_WINBIND ... Active Directory Domains and Trusts on the DOMAINB directory server shows the trusts are valid in both directions. Appreciate any advice. On 11/14/16 12:09, Gaiseric Vandal wrote:> > I have a samba classic domain, called it "DomainA." All domain > controllers and servers are running 3.6.25 on Solaris 11. > > > The PDC and BDC use an LDAP backend for unix, samba and idmap > data. Member servers use LDAP backend for unix accounts, so the > underlying unix and group accounts are consistent. > > There is a trust relationship with Windows 2008 AD domain ("DomainB.") > > > > On the member servers, "wbinfo -u" and "wbinfo -g" only shows members > from servers' own domain (DomainA.) > > > The wbinfo command does indicate that domains are trusted. > > > root at member1# wbinfo -m > BUILTIN > MEMBER1 > DOMAINA > DOMAINB > root at member1# wbinfo -D DOMAINB > Name : DOMAINB > Alt_Name : domainb.mydomain.com > SID : S-1-5-21-xxxxxxxxxxxxxxx > Active Directory : Yes > Native : Yes > Primary : No > root at member1# > > > Although I am assuming that wbinfo is merely querying the domainA PDC > or BDC. The PDC is also the WINS server. > > > I have trying to configure idmapping for domainB on the member > servers, using an LDAP backend, to keep the idmapping consistent > across all servers. However, I figure idmapping won't come into > play if winbind is not even seeing the domainB users. I am actually > unclear if the member server is supposed to contact its own domain > controller for trusted account information or if it is supposed to > contact the trusted domain (domainB) AD controller. > > > The nmblookup command indicates WINS resolution is working correctly. > > > > root at member1# nmblookup -U name_of_wins_server -R 'DOMAINB#1C' > … > answers: nmb_name=DOMAINB<1c> rr_type=32 rr_class=1 ttl=216591 > answers 0 char ...... hex E000C0A8031A > Got a positive name query response from ... > ip_of_DomainB_AD DomainB<1c> > root at member1# > > > The log.wb-DOMAINB log shows the server locating the domain controller > for the trusted domain. > > > > root at member1#testparm -v | grep winbind > .... > Server role: ROLE_DOMAIN_MEMBER > Press enter to see a dump of your service definitions > > winbind separator = \ > winbind cache time = 300 > winbind reconnect delay = 30 > winbind max clients = 200 > winbind enum users = Yes > winbind enum groups = Yes > winbind use default domain = No > winbind trusted domains only = No > winbind nested groups = Yes > winbind expand groups = 1 > winbind nss info = template > winbind refresh tickets = No > winbind offline logon = No > winbind normalize names = No > winbind rpc only = No > winbind max domain connections = 1 > > root at member1# > > > > > The IDMAP entry in smb.conf is as follows > > idmap config DOMAINB:backend = ldap > # idmap config DOMAINB:readonly = no > idmap config DOMAINB:readonly = yes > idmap config DOMAINB:default=no > idmap config DOMAINB:ldap_base_dn > ou=domainb,ou=idmap,o=mydomain.com > idmap config DOMAINB:ldap_user_dn = cn=SomeLDAPAdminUser > idmap config DOMAINB:ldap_url = ldap://pdc.mydomain.com > idmap config DOMAINB:range = 30000-39999 > #is following legit? > idmap config DOMAINB:suffix=ou=domainb,ou=idmap > > > > Idmapping is required so that "getent passwd" and "getent group" can > list windows users. But even if idmapping is not setup correctly, I > should still see trusted users with "wbinfo -u" and "wbinfo -g." > > > Appreciate any feedback > > Thanks > > > >
Gaiseric Vandal
2016-Nov-18 15:48 UTC
[Samba] Wbinfo does show users from trusted domain / RPC error
I tried recreating the trusts. I start by setting up trusts on Windows side, using Active Directory Domains and Trusts on the DomainB AD server. . I specify the the samba domain (DOMAINB) but before I can even specify trust type or direction I get the following: Cannot continue Trust relationship can not be created… The local security authority is unable to obtain an RPC connection to the active directory domain controller SAMBAPDC . Please check that the name can be resolved and the server is available. So clearly by DNS or WINS the AD server has located the correct domain controller for the samba domain. # nmap -Pn SAMBAPDC PORT STATE SERVICE 22/tcp open ssh 88/tcp open kerberos-sec 111/tcp open rpcbind 139/tcp open netbios-ssn 389/tcp open ldap 445/tcp open microsoft-ds 636/tcp open ldapssl 4045/tcp open lockd 8654/tcp open unknown The server is running a kerberos and LDAP server independent of any samba services so port 88, 389 and 636 are not samba related. This is a "classic" samba domain. (nmap only scanned for TCP ports not UDP) According to the following link TCP port 135 should also be open. https://wiki.samba.org/index.php/Samba_NT4_PDC_Port_Usage I don't remember if TCP port 135 was open when I used samba 3.x domain controllers. The testparm command shows "allow dcerpc auth level connect = No" (which was not a parameter available with samba 3.x) Thanks On 11/17/16 16:38, Gaiseric Vandal wrote:> I updated my PDC and BDC to Samba 4.4.7. Compiled from source > into /usr/local/samba. > > > > On the samba domain controllers > > "/usr/local/samba/bin/wbinfo -u" shows the local domain users but not > the trusted one. > > Everything indicates trusts are ok > > > # /usr/local/samba/bin/net rpc trustdom list -U Administrator > Enter Administrator's password: > Trusted domains list: > > DOMAINB S-1-5-21-xxxxxxxxxx-xxxxxxxxxx-xxxxxxxxxx > > Trusting domains list: > > DOMAINB S-1-5-21-xxxxxxxxxx-xxxxxxxxxx-xxxxxxxxxx > # > > #/usr/local/samba/bin/wbinfo --all-domains > BUILTIN > DOMAINA > DOMAINB > > > > > The log.wb-DOMAINB file shows > > [2016/11/17 16:22:02.091057, 1] > ../source3/winbindd/winbindd_ads.c:136(ads_cached_connection_connect) > ads_connect for domain DOMAINB failed: The request is not > supported. > [2016/11/17 16:24:44.932829, 3] > ../source3/winbindd/winbindd_pam.c:2058(winbindd_dual_pam_auth_crap) > [ 1578]: pam auth crap domain: administration user: > administrator > [2016/11/17 16:24:44.936346, 3] > ../source3/winbindd/winbindd_ads.c:1488(sequence_number) > ads: fetch sequence_number for DOMAINB > [2016/11/17 16:24:44.936534, 2] > ../source3/lib/smbldap.c:794(smbldap_open_connection) > smbldap_open_connection: connection opened > [2016/11/17 16:24:44.938529, 3] > ../source3/lib/smbldap.c:1013(smbldap_connect_system) > ldap_connect_system: successful connection to the LDAP server > [2016/11/17 16:24:44.939117, 3] > ../source3/libsmb/namequery.c:3117(get_dc_list) > get_dc_list: preferred server list: > "DS1.domainb.mydomain.com, *" > [2016/11/17 16:24:44.940870, 3] > ../source3/libads/ldap.c:618(ads_connect) > Successfully contacted LDAP server 192.168.3.26 > [2016/11/17 16:24:44.941023, 3] > ../source3/libsmb/namequery.c:3117(get_dc_list) > get_dc_list: preferred server list: > "DS1.domainb.mydomain.com, *" > [2016/11/17 16:24:44.942361, 3] > ../source3/libads/ldap.c:618(ads_connect) > Successfully contacted LDAP server 192.168.x.x > [2016/11/17 16:24:44.943591, 3] > ../source3/libads/ldap.c:618(ads_connect) > Successfully contacted LDAP server 192.168.x.x. > [2016/11/17 16:24:44.944318, 3] > ../source3/libads/ldap.c:661(ads_connect) > Connected to LDAP serverDS1.domainb.mydomain.com > [2016/11/17 16:24:44.946468, 3] > ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) > ads_sasl_spnego_bind: got OID=1.3.6.1.4.1.311.2.2.30 > [2016/11/17 16:24:44.946532, 3] > ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) > ads_sasl_spnego_bind: got OID=1.2.840.48018.1.2.2 > [2016/11/17 16:24:44.946574, 3] > ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) > ads_sasl_spnego_bind: got OID=1.2.840.113554.1.2.2 > [2016/11/17 16:24:44.946614, 3] > ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) > ads_sasl_spnego_bind: got OID=1.2.840.113554.1.2.2.3 > [2016/11/17 16:24:44.946655, 3] > ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) > ads_sasl_spnego_bind: got OID=1.3.6.1.4.1.311.2.2.10 > [2016/11/17 16:24:45.250387, 0] > ../source3/libads/sasl.c:336(ads_sasl_spnego_gensec_bind) > ads_setup_sasl_wrapping() failed: The request is not supported. > [2016/11/17 16:24:45.256988, 0] > ../source3/libads/sasl.c:779(ads_sasl_spnego_bind) > kinit succeeded but ads_sasl_spnego_gensec_bind(KRB5) > failed: The request is not supported. > [2016/11/17 16:24:45.262868, 1] > ../source3/winbindd/winbindd_ads.c:136(ads_cached_connection_connect) > ads_connect for domain DOMAINB failed: The request is not > supported. > [2016/11/17 16:24:45.262996, 3] > ../source3/winbindd/winbindd_ads.c:1488(sequence_number) > ads: fetch sequence_number for DOMAINB > [2016/11/17 16:24:45.263932, 3] > ../source3/libsmb/namequery.c:3117(get_dc_list) > get_dc_list: preferred server list: > "DS1.domainb.mydomain.com, *" > [2016/11/17 16:24:45.265508, 3] > ../source3/libads/ldap.c:618(ads_connect) > Successfully contacted LDAP server 192.168.x.x > [2016/11/17 16:24:45.265657, 3] > ../source3/libsmb/namequery.c:3117(get_dc_list) > get_dc_list: preferred server list: > "DS1.domainb.mydomain.com, *" > [2016/11/17 16:24:45.266972, 3] > ../source3/libads/ldap.c:618(ads_connect) > Successfully contacted LDAP server 192.168.x.x > [2016/11/17 16:24:45.268199, 3] > ../source3/libads/ldap.c:618(ads_connect) > Successfully contacted LDAP server 192.168.x.x > [2016/11/17 16:24:45.268892, 3] > ../source3/libads/ldap.c:661(ads_connect) > Connected to LDAP server DS1.domainb.mydomain.com > [2016/11/17 16:24:45.270958, 3] > ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) > ads_sasl_spnego_bind: got OID=1.3.6.1.4.1.311.2.2.30 > [2016/11/17 16:24:45.271020, 3] > ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) > ads_sasl_spnego_bind: got OID=1.2.840.48018.1.2.2 > [2016/11/17 16:24:45.271062, 3] > ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) > ads_sasl_spnego_bind: got OID=1.2.840.113554.1.2.2 > [2016/11/17 16:24:45.271102, 3] > ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) > ads_sasl_spnego_bind: got OID=1.2.840.113554.1.2.2.3 > [2016/11/17 16:24:45.271143, 3] > ../source3/libads/sasl.c:733(ads_sasl_spnego_bind) > ads_sasl_spnego_bind: got OID=1.3.6.1.4.1.311.2.2.10 > [2016/11/17 16:24:45.610705, 0] > ../source3/libads/sasl.c:336(ads_sasl_spnego_gensec_bind) > ads_setup_sasl_wrapping() failed: The request is not supported. > [2016/11/17 16:24:45.617251, 0] > ../source3/libads/sasl.c:779(ads_sasl_spnego_bind) > kinit succeeded but ads_sasl_spnego_gensec_bind(KRB5) > failed: The request is not supported. > [2016/11/17 16:24:45.623138, 1] > ../source3/winbindd/winbindd_ads.c:136(ads_cached_connection_connect) > ads_connect for domain DOMAINB failed: The request is not > supported. > > > > > # /usr/local/samba/sbin/smbd -b > > > ... > --with Options: > WITH_ADS > WITH_AUTOMOUNT > WITH_AVAHI_SUPPORT > WITH_DNS_UPDATES > WITH_PAM > WITH_PAM_MODULES > WITH_PTHREADPOOL > WITH_QUOTAS > WITH_SYSLOG > WITH_WINBIND > > ... > > > > Active Directory Domains and Trusts on the DOMAINB directory server > shows the trusts are valid in both directions. > > > > Appreciate any advice. > > > On 11/14/16 12:09, Gaiseric Vandal wrote: >> >> I have a samba classic domain, called it "DomainA." All domain >> controllers and servers are running 3.6.25 on Solaris 11. >> >> >> The PDC and BDC use an LDAP backend for unix, samba and idmap >> data. Member servers use LDAP backend for unix accounts, so the >> underlying unix and group accounts are consistent. >> >> There is a trust relationship with Windows 2008 AD domain ("DomainB.") >> >> >> >> On the member servers, "wbinfo -u" and "wbinfo -g" only shows members >> from servers' own domain (DomainA.) >> >> >> The wbinfo command does indicate that domains are trusted. >> >> >> root at member1# wbinfo -m >> BUILTIN >> MEMBER1 >> DOMAINA >> DOMAINB >> root at member1# wbinfo -D DOMAINB >> Name : DOMAINB >> Alt_Name : domainb.mydomain.com >> SID : S-1-5-21-xxxxxxxxxxxxxxx >> Active Directory : Yes >> Native : Yes >> Primary : No >> root at member1# >> >> >> Although I am assuming that wbinfo is merely querying the domainA PDC >> or BDC. The PDC is also the WINS server. >> >> >> I have trying to configure idmapping for domainB on the member >> servers, using an LDAP backend, to keep the idmapping consistent >> across all servers. However, I figure idmapping won't come into >> play if winbind is not even seeing the domainB users. I am >> actually unclear if the member server is supposed to contact its own >> domain controller for trusted account information or if it is >> supposed to contact the trusted domain (domainB) AD controller. >> >> >> The nmblookup command indicates WINS resolution is working correctly. >> >> >> >> root at member1# nmblookup -U name_of_wins_server -R 'DOMAINB#1C' >> … >> answers: nmb_name=DOMAINB<1c> rr_type=32 rr_class=1 ttl=216591 >> answers 0 char ...... hex E000C0A8031A >> Got a positive name query response from ... >> ip_of_DomainB_AD DomainB<1c> >> root at member1# >> >> >> The log.wb-DOMAINB log shows the server locating the domain >> controller for the trusted domain. >> >> >> >> root at member1#testparm -v | grep winbind >> .... >> Server role: ROLE_DOMAIN_MEMBER >> Press enter to see a dump of your service definitions >> >> winbind separator = \ >> winbind cache time = 300 >> winbind reconnect delay = 30 >> winbind max clients = 200 >> winbind enum users = Yes >> winbind enum groups = Yes >> winbind use default domain = No >> winbind trusted domains only = No >> winbind nested groups = Yes >> winbind expand groups = 1 >> winbind nss info = template >> winbind refresh tickets = No >> winbind offline logon = No >> winbind normalize names = No >> winbind rpc only = No >> winbind max domain connections = 1 >> >> root at member1# >> >> >> >> >> The IDMAP entry in smb.conf is as follows >> >> idmap config DOMAINB:backend = ldap >> # idmap config DOMAINB:readonly = no >> idmap config DOMAINB:readonly = yes >> idmap config DOMAINB:default=no >> idmap config DOMAINB:ldap_base_dn >> ou=domainb,ou=idmap,o=mydomain.com >> idmap config DOMAINB:ldap_user_dn = cn=SomeLDAPAdminUser >> idmap config DOMAINB:ldap_url = ldap://pdc.mydomain.com >> idmap config DOMAINB:range = 30000-39999 >> #is following legit? >> idmap config DOMAINB:suffix=ou=domainb,ou=idmap >> >> >> >> Idmapping is required so that "getent passwd" and "getent group" can >> list windows users. But even if idmapping is not setup correctly, I >> should still see trusted users with "wbinfo -u" and "wbinfo -g." >> >> >> Appreciate any feedback >> >> Thanks >> >> >> >> >