search for: lxsmb

Displaying 4 results from an estimated 4 matches for "lxsmb".

2020 Apr 01
2
Missing domain user tickets with winbind
...he krb5 TGT for the domain user in the cred-cache. If the cred-cache is missing, it looks for it in the system krb5.keytab. Since winbind is configured with kerberos method "secrets and keytab", I would expect either the secrets.tdb or the krb5.keytab to have an entry for the domain user lxsmbadmin. Even with the domain user already logged in through ssh, I'm unable to get those in both those places. cred-cache file is not created in the first place. With the domain user already logged in through ssh, I expected that the kerberos TGT would already have been retrieved and stored loca...
2020 Apr 01
0
Missing domain user tickets with winbind
...-cache. If the cred-cache is > missing, it looks > for it in the system krb5.keytab. > > Since winbind is configured with kerberos method "secrets and > keytab", I > would expect either the secrets.tdb or the krb5.keytab to > have an entry for > the domain user lxsmbadmin. Even with the domain user already > logged in > through ssh, I'm unable to get those in both those places. > cred-cache file > is not created in the first place. > > With the domain user already logged in through ssh, I > expected that the > kerberos TGT would...
2020 Apr 01
0
Missing domain user tickets with winbind
...the cred-cache is missing, it looks > > for it in the system krb5.keytab. > > > > Since winbind is configured with kerberos method "secrets and keytab", I > > would expect either the secrets.tdb or the krb5.keytab to have an entry > for > > the domain user lxsmbadmin. Even with the domain user already logged in > > through ssh, I'm unable to get those in both those places. cred-cache > file > > is not created in the first place. > > > > With the domain user already logged in through ssh, I expected that the > > kerberos...
2020 Jun 16
1
GID to group name mapping failure
...such file or directory' error). I then joined the domain again, which went through successfully. Mounting the cifs share worked too. However, winbindd is unable to map the GID to the group name. I think that SID for both user and group may have changed from the last time I was domain joined. lxsmbadmin at lxsmb-canvm15:~/mnt/lxsmbcanacc1/share1/lxsmbadmin$ getent group 'domain users' domain users:x:10513: lxsmbadmin at lxsmb-canvm15:~/mnt/lxsmbcanacc1/share1/lxsmbadmin$ id uid=11195(lxsmbadmin) gid=10513 groups=10513,3001(BUILTIN\users),10520(group policy creator owners),10572(denie...