Displaying 7 results from an estimated 7 matches for "oldempid".
2016 Oct 24
1
password sync issues
Hi,
I have configured 2 ldap tree, one for unix account (ou=User) (below is
sample ldif)
dn: uid=2011150,ou=User,dc=acer,dc=in
empID: 2011150
username: test1
cn: test1
centre: PN
objectClass: inetOrgPerson
objectClass: posixAccount
objectClass: top
objectClass: shadowAccount
oldempid: 1150
mail: test1 at acer.in
givenName: test1
uid: 2011150
shadowLastChange: 15590
loginShell: /bin/bash
uidNumber: 11150
gidNumber: 11150
homeDirectory: /mbox4.2/test1
userPassword: {SHA}1SrgdEGUPa/U6KM43Kq9xTgnI7A=
and another for samba tree (ou=samba) - (below is sample tree)
dn: uid=test1,ou...
2016 Nov 07
1
samba with customized ldap backend
...mple I have created below ldif uid='user's empid'
dn: uid=102220,ou=People,dc=pn,ou=User,dc=cdac,dc=in
empID: 102220
username: micki
cn: Demo Account
centre: PN
objectClass: inetOrgPerson
objectClass: posixAccount
objectClass: top
objectClass: shadowAccount
objectClass: sambaSamAccount
oldempid: 2220
mail: micki at cdac.in
givenName: Demo Accoung
shadowLastChange: 15587
loginShell: /bin/bash
uidNumber: 5345
gidNumber: 5345
homeDirectory: /mbox1.1/micki
userPassword::
{SSHA256}v7vlA8YYjJ27IbPQQa8eaChdHFcpu6EGYWxZH1O7w13ZocmtLTb9nw==
sambaPwdLastSet: 1473165911
sambaLMPassword: 7e58f6a33f8...
2016 Nov 08
3
samba with customized ldap backend (fwd)
...mple I have created below ldif uid='user's empid'
dn: uid=102220,ou=People,dc=pn,ou=User,dc=cdac,dc=in
empID: 102220
username: micki
cn: Demo Account
centre: PN
objectClass: inetOrgPerson
objectClass: posixAccount
objectClass: top
objectClass: shadowAccount
objectClass: sambaSamAccount
oldempid: 2220
mail: micki at cdac.in
givenName: Demo Accoung
shadowLastChange: 15587
loginShell: /bin/bash
uidNumber: 5345
gidNumber: 5345
homeDirectory: /mbox1.1/micki
userPassword::
{SSHA256}v7vlA8YYjJ27IbPQQa8eaChdHFcpu6EGYWxZH1O7w13ZocmtLTb9nw==
sambaPwdLastSet: 1473165911
sambaLMPassword: 7e58f6a33f8...
2016 Nov 08
0
samba with customized ldap backend (fwd)
...9;
>
> dn: uid=102220,ou=People,dc=pn,ou=User,dc=cdac,dc=in
> empID: 102220
> username: micki
> cn: Demo Account
> centre: PN
> objectClass: inetOrgPerson
> objectClass: posixAccount
> objectClass: top
> objectClass: shadowAccount
> objectClass: sambaSamAccount
> oldempid: 2220
> mail: micki at cdac.in
> givenName: Demo Accoung
> shadowLastChange: 15587
> loginShell: /bin/bash
> uidNumber: 5345
> gidNumber: 5345
> homeDirectory: /mbox1.1/micki
> userPassword::
> {SSHA256}v7vlA8YYjJ27IbPQQa8eaChdHFcpu6EGYWxZH1O7w13ZocmtLTb9nw==
> sambaP...
2016 Nov 09
3
samba with customized ldap backend (fwd)
...;
>
> dn: uid=102220,ou=People,dc=pn,ou=User,dc=cdac,dc=in
> empID: 102220
> username: micki
> cn: Demo Account
> centre: PN
> objectClass: inetOrgPerson
> objectClass: posixAccount
> objectClass: top
> objectClass: shadowAccount
> objectClass: sambaSamAccount
> oldempid: 2220
> mail: micki at cdac.in
> givenName: Demo Accoung
> shadowLastChange: 15587
> loginShell: /bin/bash
> uidNumber: 5345
> gidNumber: 5345
> homeDirectory: /mbox1.1/micki
> userPassword::
> {SSHA256}v7vlA8YYjJ27IbPQQa8eaChdHFcpu6EGYWxZH1O7w13ZocmtLTb9nw==
> sambaP...
2016 Nov 10
0
samba with customized ldap backend (fwd)
...=pn,ou=User,dc=cdac,dc=in
>> empID: 102220
>> username: micki
>> cn: Demo Account
>> centre: PN
>> objectClass: inetOrgPerson
>> objectClass: posixAccount
>> objectClass: top
>> objectClass: shadowAccount
>> objectClass: sambaSamAccount
>> oldempid: 2220
>> mail: micki at cdac.in
>> givenName: Demo Accoung
>> shadowLastChange: 15587
>> loginShell: /bin/bash
>> uidNumber: 5345
>> gidNumber: 5345
>> homeDirectory: /mbox1.1/micki
>> userPassword::
>> {SSHA256}v7vlA8YYjJ27IbPQQa8eaChdHFcpu6EG...
2016 Oct 12
6
samba with customized ldap backend
I have to assume much, I'll try. So...
- No AD, that's some NT4 domain.
- No Winbind because Winbind is using samacccountname as user login and not
UID.
- Issue happens on Linux or UNIX clients.
The question is what tool (SSSD, pam_ldap / nss_ldap, nslcd...) are you
using to retrieve information from LDAP to forge users on system side.
Once you get an answer to this previous question