similar to: Active Directory Groups within /etc/group

Displaying 20 results from an estimated 30000 matches similar to: "Active Directory Groups within /etc/group"

2015 Apr 16
2
Group Mapping: All Users from a Domain group should be able to write to a local group
Hello Mailinglist, I have created a local user "localuser" who is in the local group "localgroup" $ id uid=1001(localuser) gid=1001(localgroup) groups=1001(localgroup) My machine authenticates against Active Directory - works The AD-User "aduser" belongs to a domain group "adgroup" $ id uid=6161(aduser) gid=5513(dom?nen-benutzer)
2010 Apr 29
1
Samba and Active directory groups
Hi list, I have successfully authenticated active directory users with samba. Now I need to create some Active directory security groups and authenticate and redirect those users to a specific directory. Ex: IT_GROUP - user x , user y FIN_group - user a, user b If the user x , access the samba server, that user will be redirected to the specific directory (that's in the samba stanza). This
2006 May 26
0
Local groups with ADS users
Hi everybody, I've configured SAMBA for joining the ADs of the place where i work, and everything is working fine. This means that with "getent passwd" i see all the local and the ADS users, i am also able to log into my machine via ssh by using the pam_winbind module and so on. I've configured some directories that are shared by samba and are property of their owners and
2017 Nov 06
1
ntfs user mappings?
On Sun, 5 Nov 2017 16:14:33 -0700 Jeff Sadowski <jeff.sadowski at gmail.com> wrote: > Not bad but I wanted an ldap version because I was having issues > running ldbsearch as a normal user. > I had another thought, why am I reinventing the wheel, so came up with this: #!/bin/bash echo "#######################################################" echo "#
2015 Jan 29
0
rfc2307 deprecated in Windows 2012 R2?
@Hans-Kristian: I'd like to see it. How did you automate this? @Andrew: In another thread I suggested to set the rfc2307 info automatically when a domain is provisioned with --use-rfc2307. Possibly by an additional parameter. This would make things easier in my eyes. Thanks Tim Am 29. Januar 2015 22:02:14 MEZ, schrieb Hans-Kristian Bakke <hkbakke at gmail.com>: >It is actually
2015 Jan 29
3
rfc2307 deprecated in Windows 2012 R2?
It is actually rather easy to set the attributes via powershell, and that is probably the best way to add them in a Server 2012 R2 environment. I wrote a powershell script to do this automatically for users and groups in an entire domain that should be pretty generic to be reused. It also mirrors the logic used in automatic winbind UID/GID generation to be able to coexist in an environment where
2015 Jan 29
0
rfc2307 deprecated in Windows 2012 R2?
Something went wrong and the message got sent before it was finished. Here is the complete one: Ok, it's here: http://pastebin.com/JEnr5wUq The id_offset is that value because i initially didn't use rfc2307 attributes, but instead had idmap config EXAMPLE : range = 300000-499999 in smb.conf. To get identical uid/gids have to start with the same offset. If you have a fresh domain and
2015 Jan 29
2
rfc2307 deprecated in Windows 2012 R2?
Ok, it's here: http://pastebin.com/JEnr5wUq The id_offset is that value because i initially didn't use rfc2307 attributes, but instead On 29 January 2015 at 23:27, Tim <lists at kiuni.de> wrote: > @Hans-Kristian: > I'd like to see it. How did you automate this? > > @Andrew: > In another thread I suggested to set the rfc2307 info automatically when a > domain
2010 May 04
0
Query re winbind, primary group enumeration from Active Directory and Services For Unix
Query re winbind, primary group enumeration from Active Directory and Services For Unix I am wondering if anyone can explain to me how the GIDs work when using winbind to extract them from an ADS server. I have Unix servers running AIX 5.3 ML-10, an ADS server running Win 2003-SP2 with SFU 3.5 installed. I have been configuring the Unix servers as domain members and using winbind to extract the
2013 May 06
0
net rpc group add & by/pass the group scope value
Hi folks, Does anyone have a clue of how to by/pass the group scope value when creating a group in AD by using the net tools? I can delete an AD group, add/remove members from a group but I can't create a group. I reckon it's because of the group scope value (even Power Shell/New-ADGroup prompts for it) $ net -U $ADMIN_USER -S $DC_ADDRESS rpc group add $GROUP_NAME -c $OU Error
2015 Jan 30
0
rfc2307 deprecated in Windows 2012 R2?
I do not understand the point about issues with administrator beeing mapped to a "random" rfc2307 UID. You need to explain the details surrounding that part to me as my experience is that this is OK and even necessary. The only reason for not giving Administrator a "random" UID/GID that I can think of is perhaps if you are doing some mapping of Administrator to root, something
2015 Oct 09
0
Make a share owned by a service account available to members of an AD group
On 09/10/15 20:31, Tovey, Mark wrote: > The only way it seems to work is if I do have both the local and AD user with the same name. But my goal here is to not require that, to have the AD account only. To do what you want you need to use winbind (other ways if doing it are available, but this is the samba mailing list) and then use either the 'ad' or 'rid' backend,
2015 Jan 30
3
rfc2307 deprecated in Windows 2012 R2?
On 29/01/15 22:56, Hans-Kristian Bakke wrote: > Something went wrong and the message got sent before it was finished. > Here is the complete one: > > Ok, it's here: http://pastebin.com/JEnr5wUq > > The id_offset is that value because i initially didn't use rfc2307 > attributes, but instead had > > idmap config EXAMPLE : range = 300000-499999 > > in
2010 Mar 08
1
nss_winbind.so delivers first group only on Solaris 10
Hello, I'm trying to integrate some of our Solaris 10 10/09 hosts into Microsoft AD running on 2003/2008 R2 servers. After some compile trouble I finally managed to get the whole thing running including winbind in nsswitch.conf for users and groups and PAM for authentication. The problem is that winbind only reports the primary group of an AD user. 'wbinfo -r aduser' only reports
2006 Jul 27
1
Winbind cache
Hi all, we are having some troubles with the integration of some Solaris 9 Sparc servers on a Windows 2003 Server Active Directory domain. When we made the tests on a Solaris 9 Intel server, everything run successfully. After that we run some group membership tests, just changing users from one to another group on the W2K3 Server. We've seen on those tests that winbind was caching the
2019 Feb 08
2
Permission issue
Hi, We did a classicupgrade of our Ubuntu Server (4.3.11, TDB), the server DC5 also host shares. Post the migration we are seeing some permission issues. When trying to give permission to a domain group/user to folder/file we get the following chown "LIN\\myadmin:LIN\\adgroup" adtest/ chown: invalid user: 'LIN\\myadmin:LIN\\adgroup' wbinfo --ping-dc : checking the NETLOGON
2004 Oct 22
0
share permissions for AD groups
Hello, We have following environment Win2k AD with "endless" number of groups (should be more then 1000) , on the other site solaris9 samba3.0.7 compiled with all relevant optins , winbind , ads and so on , installations is ok , we joined AD domain w.o problems , getent * shows all like expected same for wbinfo The big problem remaining is , we want to restrict access to shares to
2004 Oct 22
0
AW: share permissions for AD groups
> Hello, > > We have following environment > > Win2k AD with "endless" number of groups (should be more then 1000) , on > the other site solaris9 samba3.0.7 compiled with all relevant optins , > winbind , ads and so on , installations is ok , we joined AD domain w.o > problems , getent * shows all like expected > same for wbinfo > > The big problem
2019 Feb 08
0
Permission issue
On Fri, 8 Feb 2019 06:22:05 +0000 Praveen Ghimire via samba <samba at lists.samba.org> wrote: > Hi, > > We did a classicupgrade of our Ubuntu Server (4.3.11, TDB), the > server DC5 also host shares. Post the migration we are seeing some > permission issues. > > When trying to give permission to a domain group/user to folder/file > we get the following > >
2008 Feb 20
0
samba, PAM and active directory
Hi, I want that users can log on (SSH and console) a Debian box can do it through Active Directory. I still want that root user can log on (SSH and console) so I created a wheel group for that. I can log on successfully with all AD and root users. However, I'd like to limit the AD users to the technology domain group. I've googled a lot: