search for: adsdomain

Displaying 6 results from an estimated 6 matches for "adsdomain".

Did you mean: addomain
2007 Jul 12
1
BUG? 'valid users' doesn't allow groups from trusted domains
...hare. Here is the scenario as I experienced it (names have been changed to protect the innocent): Configuration: - Samba 3.0.21b as a member server in a real NT4 domain (security = domain) called 'NTDOMAIN' - NTDOMAIN has a two-way trust with Windows 2003 Active Directory domain 'ADSDOMAIN' - User 'fred' has an account on NTDOMAIN (NTDOMAIN+fred) and is a member of the 'sales' group on NTDOMAIN (@NTDOMAIN+sales) - User 'wilma' has an account on ADSDOMAIN (ADSDOMAIN+wilma) and is a member of the 'sales' group on ADSDOMAIN (@ADSDOMAIN+sales) If...
2004 Dec 13
1
auth. username rewriting?
Hello, Now, I'm faced with a problem: I need to be able to login using the same username that I bind against using ldapsearch, and not the sAMAccountName given to me via winbind. ie. to login using one of my AD usernames right now, I issue: su - ADSDOMAIN+username1 but the binddn I use to search the ldap directory is, say, username2: ldapsearch -x -W -D"username2" samaccountname=bla I'd like to be able to do: su - ADSDOMAIN+username2 and for winbind to recognize username1 and username2 as the same user account, and authenti...
2004 Nov 06
0
Access to share is denied for groups on samba 3 - ADS
...n explicitly set "valid user" can access the share. It should be accessible to "sambausers", but that doesn't work. I can also logon as ADS-user on the samba box and get a shell. In smb.conf: [p] comment = Documents path = /home/samba/p read only = No valid users = @"ADSDOMAIN\sambausers" # valid users = @"LIHH\SambaUsers" (doesn't work either) # valid users = ADSDOMAIN+username (this works) create mask = 0750 browsable = Yes I the log file /var/log/samba/log.xpclient I always get: user 'ADSDOMAIN+username' (from session setup) not permitted...
2006 Apr 09
1
Can pam_winbind be configured to issue Kerberos tickets on user validation?
Hi I have Samba 3 running on Fedora 4, configured to use pam_winbind to validate user logins against my W2K ADS. Logins are fully functional using names such as adsdomain.adsuser (I have the fullstop character configured as my winbind seperator). This is all working fine. What I would now like to do, is to have a Kerberos ticket from the ADS Kerberos realm issued to the user that has just logged in, without the user having to re-validate themselves using kinit....
2006 Apr 10
0
Can pam_winbind be configured to issue Kerberos tickets onuser validation?
> -----Original Message----- > > I've tried to use the pam_krb5 module, but as pam modules > validate the user as given, pam_krb5 is trying to match the > password to adsdomain.adsuser@ADSDOMAIN.REALM.... so it fails. > Pam_krb5 can be configured to convert winbind usernames back into principal names, by means of some regexp matching and template filling magic. It it 'underdocumented' - perhaps you even need to grab the source RPM and look there? I can'...
2004 Jan 05
0
Samba 3.0.1 ADS/Kerberos problems relating to Win2k/xp browsing to samba server
...o go to the Samba server from Win2k/XP clients, no problem, fully authenticated by the ADS infrastructure. Then I realized that the "winbind trusted domains only" function didn't actually seem to be working -- my understanding is that if I have it enabled, and two users such as "ADSDOMAIN.COM+joeuser" and a Unix user "joeuser (@uid: 513)", then as soon as "joeuser" trys to connect from his XP desktop to the Samba server, it should say "aha! - we already have a Unix joeuser @ uid 513, so I'll automap ADSDOMAIN.COM+joeuser to uid 513 (not some random...