Hello Samba Users, In my infrastructure, samba is set with a Windows Server 2012R2. I set kerberos service in the linux samba box and winbind to communicate with the Active Directory Windows 2012 R2 domain controler. Unix Attributes are retrieved from the AD database (rfc2307) via Winbind. I know that the current approche is to use Samba AD instead microsoft server. But I would like to know if someone succeeded in to configure a Linux samba box (with winbind) with the new Microsoft Windows server 2019 with AD Role ? EdG
On Tue, 19 Mar 2019 12:14:41 -0300 Edouard Guigné via samba <samba at lists.samba.org> wrote:> Hello Samba Users, > > In my infrastructure, samba is set with a Windows Server 2012R2. > I set kerberos service in the linux samba box and winbind to > communicate with the Active Directory Windows 2012 R2 domain > controler. Unix Attributes are retrieved from the AD database > (rfc2307) via Winbind. > > I know that the current approche is to use Samba AD instead microsoft > server. > > But I would like to know if someone succeeded in to configure a Linux > samba box (with winbind) with the new Microsoft Windows server 2019 > with AD Role ? > > EdG > >It all depends on what you mean by 'configure', if you mean that you are running Samba as a Unix domain member, then this should work. If you are trying to join Samba as an AD DC, then this will not work (yet). If you are running Samba as a Unix domain member and it isn't working, please post your smb.conf file. Rowland
Yes, I mean running samba as a Unix Domain Member. The domain should be manage by a Windows server 2019 AD. EdG Le 19/03/2019 à 12:31, Rowland Penny via samba a écrit :> On Tue, 19 Mar 2019 12:14:41 -0300 > Edouard Guigné via samba <samba at lists.samba.org> wrote: > >> Hello Samba Users, >> >> In my infrastructure, samba is set with a Windows Server 2012R2. >> I set kerberos service in the linux samba box and winbind to >> communicate with the Active Directory Windows 2012 R2 domain >> controler. Unix Attributes are retrieved from the AD database >> (rfc2307) via Winbind. >> >> I know that the current approche is to use Samba AD instead microsoft >> server. >> >> But I would like to know if someone succeeded in to configure a Linux >> samba box (with winbind) with the new Microsoft Windows server 2019 >> with AD Role ? >> >> EdG >> >> > It all depends on what you mean by 'configure', if you mean that you > are running Samba as a Unix domain member, then this should work. If > you are trying to join Samba as an AD DC, then this will not work (yet). > > If you are running Samba as a Unix domain member and it isn't working, > please post your smb.conf file. > > Rowland >
For the moment, Samba4 cannot participate as DC with Windows 2019 servers (unless you downgrade to schema 47, the one that comes with Windows 2008R2): https://wiki.samba.org/index.php/AD_Schema_Version_Support The developers are working on Windows 2012R2 support. So for now, anything above 2008R2 is experimental. On 2019-03-19 11:31 a.m., Rowland Penny via samba wrote:> On Tue, 19 Mar 2019 12:14:41 -0300 > Edouard Guigné via samba <samba at lists.samba.org> wrote: > >> Hello Samba Users, >> >> In my infrastructure, samba is set with a Windows Server 2012R2. >> I set kerberos service in the linux samba box and winbind to >> communicate with the Active Directory Windows 2012 R2 domain >> controler. Unix Attributes are retrieved from the AD database >> (rfc2307) via Winbind. >> >> I know that the current approche is to use Samba AD instead microsoft >> server. >> >> But I would like to know if someone succeeded in to configure a Linux >> samba box (with winbind) with the new Microsoft Windows server 2019 >> with AD Role ? >> >> EdG >> >> > It all depends on what you mean by 'configure', if you mean that you > are running Samba as a Unix domain member, then this should work. If > you are trying to join Samba as an AD DC, then this will not work (yet). > > If you are running Samba as a Unix domain member and it isn't working, > please post your smb.conf file. > > Rowland >-- Luc Lalonde, analyste ----------------------------- Département de génie informatique: École polytechnique de MTL (514) 340-4711 x5049 Luc.Lalonde at polymtl.ca ----------------------------- -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 833 bytes Desc: OpenPGP digital signature URL: <http://lists.samba.org/pipermail/samba/attachments/20190319/b3d808db/signature.sig>
Reasonably Related Threads
- Fwd: Re: Fwd: Extended acls with AD - problem with default/herited permissions
- Fwd: Extended acls with AD - problem with default/herited permissions
- Samba vs Windows server 2019
- Fwd: Re: Fwd: Extended acls with AD - problem with default/herited permissions
- Samba vs Windows server 2019