similar to: Migrating to new Samba - LDAP schema change

Displaying 20 results from an estimated 600 matches similar to: "Migrating to new Samba - LDAP schema change"

2005 Oct 11
1
Changing PDC Domain name
Hello all. What are the implications of changing the domain name for a PDC? If I understand correctly, the SID is based on the domain name, so if the domain name (workgroup) setting in smb.conf is changed, will that mean that a new SID will be generated? If so, then I assume that all user/group SIDs will have to be updated. If the domain name is changed, can I just state that this is an
2005 Oct 12
1
add machine script almost succeeds
All - I am in the process of writing my own "add machine script" to use with Samba 3.0.20a and our OpenLDAP setup. For the most part it seems to work fine. If I run the script from the command line, I can see that the entry has been added to LDAP. If I then go to the Windows machine and tell it to join the domain, after giving it the Admin login and password it connects up with no
2005 Dec 30
1
How to tell Samba not to use the passwd file
Hello all - I'm having a bit of a problem that I'm sure is being caused by my missing some trivial detail. But I haven't been able to find it, and I'm not even sure how I would construct the search to find relevant info in the archives. Here is the setup. I have Samba 3.0.20a running as a PDC against a LDAP back end. For the most part everything works fine. Users that are
2004 May 24
0
Virtual users
I'd like a bit of a Sanity Check to make sure I understand the process. We are setting up filesharing on a Linux server via Samba (3.0.2). We would like to give the users personal space (home directories), but we don't want to add them as Linux users (no entries in /etc/passwd). The users are defined in an LDAP directory. If I understand it correctly, in order to do this we will need
2004 Jun 27
0
Samba authentication/authorization via LDAP
Hello all I'm trying once again to get a Samba server set up on a Slackware Linux system for a small office (much less than 100 users). There will be multiple domains on this system (say foo.com, bar.com, ...) with the users scattered between these domains. We want to use LDAP to authenticate the users and provide authorization info. There are no Windows domain controllers available. All
2005 Jun 24
0
FileMaker lock problem
We have a customer system running Slackware Linux (kernel 2.4.25) and Samba. The customer was running Samba 2.2.8 but we recently upgraded them to Samba 3.0.13. The customer has a FileMaker database on a public share. Before the upgrade, the customer was able to have multiple concurrent access to the database. After the upgrade, only the first user to access the database was successful.
2004 Jul 07
4
Setting home path to a dir within a users Linux home dir
Is there a trick to append an additional directory level onto the defauly behavior of a [homes] share looking in /etc/passwd to find the users Linux home dir? It would offer a bit of protection if Windows clients ended up in say the WinHome directory within their Linux home directory when logging in from Windows so they are not tempted to tamper with their desktop settings files for Linux from
2005 Aug 08
1
2 nicks/firewall
So I have a freebsd machine setup, and it has 2 nick's in it. One is a REAL IP, and pulls in internet, the other is a a nat'ed nick, with samba running on it for the machines behind the firewall. Anyone know what to toss into my smb.conf to not let my outside nick xmit smbd/nmbd ? No one can connect via that interface, but people/viruses/whatever are still trying. Thanks! C.
2005 Jul 21
2
migrate existing Unix password to sambapassword
Hello -- Our existing Unix system has more than 500 users. The system currently uses OpenLDAP to authenticate users. We just added dozens of PCs running Windows to the network. We are going to set up the existing Unix server as a samba PDC server such that the users can log onto either their Unix account or Windows account. It seems a good idea to allow the users have the same password for
2019 Sep 18
3
Setting llvm::TargetOptions::GuaranteedTailCallOpt in LTO Code Generation
Hi Dwight Thanks for the feedback. For the issue you reported, there has been few reviews trying to tweak the -mllvm option when using legacy LTO interfaces (myself included) but it never got enough traction to moving forward. Note how -tailcallopt is implemented as a -mllvm flag means that it is a debug option and probably not well tested. The option is also not stable which means it can be
2015 Oct 09
2
Make a share owned by a service account available to members of an AD group
No joy. I added winbind to the passwd, shadow, and group lines and it is still not working. I also switched back to ad instead of rid (I deleted the Samba database files in /var/lib/samba and rejoined the domain when I switched), and still the same. If the account exists locally I can authenticate against AD and map the share. No local account and it fails. -Mark
2019 Sep 18
2
Setting llvm::TargetOptions::GuaranteedTailCallOpt in LTO Code Generation
Hi Dwight, Welcome to LLVM-dev! A few comments below. Cc'ing a few people who hopefully can add info on some of the specific issues here. Teresa On Wed, Sep 18, 2019 at 9:04 AM Dwight Guth via llvm-dev < llvm-dev at lists.llvm.org> wrote: > Hi, > > I am lead developer of a project that is using LLVM to implement an > ahead-of-time compiled functional language. We use llc
2015 Oct 09
4
Make a share owned by a service account available to members of an AD group
The only way it seems to work is if I do have both the local and AD user with the same name. But my goal here is to not require that, to have the AD account only. I have applied Unix attributes to the users. testuser uidNumber = 30089 and gidNumber = 100. However, when I try to query with wbinfo, I was unable to look that up: wbinfo -i "DEVELOPMENT\testuser" failed to call
2015 Oct 09
2
Make a share owned by a service account available to members of an AD group
Got it. I changed that section as follows: idmap config *:backend = tdb idmap config *:range = 5000-29999 idmap config DEVELOPMENT:backend = ad idmap config DEVELOPMENT:schema_mode = rfc2307 idmap config DEVELOPMENT:range = 30000-99999 It did not change the “map to guest = Bad Uid” issue, however. The error I see in the log file is
2019 Sep 18
2
Setting llvm::TargetOptions::GuaranteedTailCallOpt in LTO Code Generation
On Wed, Sep 18, 2019, 2:39 PM Steven Wu <stevenwu at apple.com> wrote: > > > On Sep 18, 2019, at 10:24 AM, Steven Wu <stevenwu at apple.com> wrote: > > Hi Dwight > > Thanks for the feedback. For the issue you reported, there has been few > reviews trying to tweak the -mllvm option when using legacy LTO interfaces > (myself included) but it never got enough
2015 Oct 11
2
Make a share owned by a service account available to members of an AD group
I made my configuration look identical to what is in the Samba Wiki, and still the same results: everything works perfectly as long as the user account is in both AD and the local passwd file. If I remove the account from the local passwd file, I cannot map the share. While looking around, I encountered this: https://bugzilla.samba.org/show_bug.cgi?id=9862. This bug refers to Samba 4.1 and
2019 Sep 16
2
Setting llvm::TargetOptions::GuaranteedTailCallOpt in LTO Code Generation
Hi, I am lead developer of a project that is using LLVM to implement an ahead-of-time compiled functional language. We use llc -tailcallopt to ensure that functions that end in a tail call are compiled to a tail call at the machine level, because we have a number of cases in our interpreter where functions with different function signatures call one another in deeply nested recursive calls. We
2015 Oct 13
2
Make a share owned by a service account available to members of an AD group
On 13/10/15 20:47, Tovey, Mark wrote: > I downloaded the source code for Samba 4.0.0, the same as is distributed with my OS. I applied the patch as described in Bug 9862, compiled and installed the code, and now it works as expected. Having the user account in AD only is sufficient, I no longer have to have the account also in the Linux server's passwd file. So indeed, it appears
2015 Oct 09
2
Make a share owned by a service account available to members of an AD group
So I made the primary group for the testuser account be smbgrp, and it's gidNumber is 30124. Still nothing. "getent passwd testuser" returns nothing unless testuser is in the local passwd file, and then it returns the attributes that are in the passwd file, not the AD system. Some time ago I put together a configuration that uses Linux SSSD to communicate with AD. That allows
2010 Mar 14
1
Error loading R Commander with version 2.10.1 on MacOS 10.5 or 10.6
Dear R Commander experts, I have now had multiple failures in loading R Commander with R version 2.10.1 (most recent one on the CRAN site) on a Mac running OS 10.5 or 10.6. The installation of R Commander seems to proceed normally, but when I try to start up R Commander, it never loads. It appears that it is loading the tcl/tk package that is failing even though I have started up X11 in advance.