Displaying 20 results from an estimated 5000 matches similar to: "Samba-3.0.24 patched drive mapping prompting for username/password and fails.."
2007 Jun 03
1
FW: Followup Restricting to a subset of the domain controllers on a site
-----Original Message-----
From: Wayne Rasmussen
Sent: Friday, June 01, 2007 11:01 AM
To: 'Gerald (Jerry) Carter'
Subject: RE: [Samba] Followup Restricting to a subset of the domain
controllers on a site
Noticed a couple of changes with Samba-3.0.25 and wondered if I am doing
something wrong or if it is a side-effect.
attached three files: smb.conf, samba-3.0.10.log, samba-3.0.25.log
2020 Oct 05
0
Samba SSSD authentication via userPrincipalName does not work because samba claims that the username does not exist.
On 05/10/2020 16:14, Markus Jansen via samba wrote:
> Dear all,
>
> i'm investigating the issue that I can't authenticate against a Samba (as Active-Directory Member) using the userPrincipalName (UPN). (Using Samba and sAMAccountName works fine.)
>
> After some research I'm quite sure that winbind is limited to the sAMAccountName and can't use UPN. So I deciced to
2020 Oct 05
2
Samba SSSD authentication via userPrincipalName does not work because samba claims that the username does not exist.
Dear all,
i'm investigating the issue that I can't authenticate against a Samba (as Active-Directory Member) using the userPrincipalName (UPN). (Using Samba and sAMAccountName works fine.)
After some research I'm quite sure that winbind is limited to the sAMAccountName and can't use UPN. So I deciced to use SSSD and configured the `ldap_user_name = userPrincipalName` in the
2020 Oct 15
1
Samba SSSD authentication via userPrincipalName does not work because samba claims that the username does not exist.
Am 14.10.20 um 16:19 schrieb Rowland penny via samba:
> On 14/10/2020 15:07, Markus Jansen via samba wrote:
>> Am 14.10.20 um 08:31 schrieb Nico Kadel-Garcia via samba:
>>> On Tue, Oct 13, 2020 at 10:30 AM Rowland penny via samba
>>> <samba at lists.samba.org> wrote:
>>>> On 13/10/2020 15:01, Markus Jansen via samba wrote:
>>>>> Thank you
2020 Oct 14
0
Samba SSSD authentication via userPrincipalName does not work because samba claims that the username does not exist.
On 14/10/2020 15:07, Markus Jansen via samba wrote:
> Am 14.10.20 um 08:31 schrieb Nico Kadel-Garcia via samba:
>> On Tue, Oct 13, 2020 at 10:30 AM Rowland penny via samba
>> <samba at lists.samba.org> wrote:
>>> On 13/10/2020 15:01, Markus Jansen via samba wrote:
>>>> Thank you very much for your hints.
>>>>
>>>> I got rid of SSSD
2020 Oct 14
2
Samba SSSD authentication via userPrincipalName does not work because samba claims that the username does not exist.
Am 14.10.20 um 08:31 schrieb Nico Kadel-Garcia via samba:
> On Tue, Oct 13, 2020 at 10:30 AM Rowland penny via samba
> <samba at lists.samba.org> wrote:
>> On 13/10/2020 15:01, Markus Jansen via samba wrote:
>>> Thank you very much for your hints.
>>>
>>> I got rid of SSSD and managed to get a successful kerberos
>>> authentication via wbinfo
2008 Mar 08
0
samba and active directory on win 2003
I use samba Version 3.0.25b-1.el5_1.4.
When I try to join the domain adtest.ro I receive the following error:
[root@zimbra samba]# net ads join -U Administrator
Administrator's password:
Using short domain name -- ADTEST
Failed to set servicePrincipalNames. Please ensure that
the DNS domain of this server matches the AD domain,
Or rejoin with using Domain Admin credentials.
Deleted account
2008 Mar 26
0
FW: samba and active directory on win 2003
Victor,
I just spent hours searching for the solution to the same problem you
are having using samba version 3.0.25b after an upgrade from version
3.0.10. the resolution for me was posted by Volker Lendecke:
"
> Make sure that the fully qualified domain name and your host name
> differ in the sense that you actually have a domain appended.
>
> Under Linux, "hostname"
2006 Nov 15
1
winbind: getent passwd displays the user, but SAMBA says Get_Pwnam_internals didn't find user
SAMBA 3.0.21c (domain is LINBOXTEXT)
Windows 2000 SP4 (domain is ADTEST)
Hello,
I've established an interdomain trust relationship between SAMBA and
Windows.
Samba domain users can log into the Windows domain, but Windows domain
users can't log to the SAMBA server.
For example, if I try to log as "ADTEST/dupond" from Windows to SAMBA,
SAMBA log says:
[2006/11/15 20:17:05,
2004 Mar 05
0
Cannot find KDC for requested realm while getting initial credentials
Have succesfully installed and configured samba on BSD up to the point
of joining the active directory domain.
The command <net ads join -Uadministrator> returned a message saying
that i had "sucessfully joined the domain" and a quick review of my ADDC
shows that my samba server has sucessfully joined and created an object
in AD. The command <wbinfo -u> returns a list
2014 Jun 23
1
NIS extensions - only 3 of 55 entries present
I have a test setup of samba 4.1.6 under ubuntu 14.04.
When I do the query shown at
https://wiki.samba.org/index.php/Using_RFC2307_on_a_Samba_DC#Check_if_NIS_Extensions_are_installed_in_your_Directory
it shows I have the ypServ30 container installed.
If I change this query to -s sub then I find 3 entries in that subtree
(see [1] below)
However the full schema in
2014 Jun 24
3
winbind: homeDirectory being ignored
Something strange here. User created using:
root at dc1:~# samba-tool user add user7 Abcd1234 --uid-number=1007
--home-directory=/home/user7 --login-shell=/bin/bash
User 'user7' created successfully
I can see the homeDirectory attribute in the entry. But the home
directory that winbind returns is just the template one:
root at adclient:~# getent passwd user7
2006 Nov 16
1
[3.0.23d] winbind: ads_connect for domain X failed: Operations error
SAMBA 3.0.23d (netbios name is PDC01, domain is LINBOXTEST)
Windows 2000 server SP4 in mixed mode (netbios name is MAFIA-L6FFST3UP,
domain is ADTEST / adtest.linbox.com)
Hello,
So I've successfully established a two ways interdomain trust
relationship between a SAMBA PDC and a Windows domain. It was working
fine: for example a windows user was able to connect on a share on the
SAMBA server.
2005 Nov 21
2
[Hardware] Good Server I/O on-the-cheap: ASL Monarch 811x with CentOS 4.2 ...
Since good server designs have come up in the past, I wanted to point
out a "low-cost" server option that has good I/O, and the vendor offers
_your_choice_ of not only Fedora Core or Red Hat Enterprise Linux, but
_also_ CentOS _shipped_ with it!
IN-A-NUTSHELL ...
Starting at just over $750, you can get a single Socket-939 Opteron 1xx
(dual-core is an option) system with up to 4GiB of
2019 Jun 14
1
Automatically assigning uidNumber / gidNumber attributes
> Domain Admins is mapped as ID_TYPE_BOTH in idmap.ldb on the DC, this makes Domain Admins a group and a user.
I looked on a brand new test DC (with nss-winbind), and it looks like
it doesn't work right with winbind:
root at dc1# ls -l /var/lib/samba/sysvol/ad-test.vx/Policies/
total 16
drwxrwx---+ 4 3000004 ADTEST\domain admins 4096 Jun 13 21:41
{31B2F340-016D-11D2-945F-00C04FB984F9}
2016 May 13
2
4.4.3 on CentOS 6: no guest login
I have built 4.4.3 on CentOS 6, with a fairly minimalist smb.conf,
provisioned the domain as per the wiki [1], and cannot get past test one:
[root at frodo ~]# smbclient -L localhost -U%
Domain=[ADTEST] OS=[Windows 6.1] Server=[Samba 4.4.3]
tree connect failed: NT_STATUS_CONNECTION_DISCONNECTED
I can get output if I specify a username, and give a password, but
anonymous access seems to be
2010 Jan 26
2
Kerberos integration in directory server
Hi,
Got some issues regarding Kerberos and Directory Server and hope someone can help me out.
Used these for the configiruation :
http://www.centos.org/docs/5/html/Deployment_Guide-en-US/ch-kerberos.html
http://www.redhat.com/docs/manuals/dir-server/8.1/install/index.html
Server : CentOS 5.4 with Kerberos and Directory Server installed
Client : CentOS 5.4
I use putty to connect to the client,
2016 May 13
0
4.4.3 on CentOS 6: no guest login
On 13/05/16 13:34, Tom Yates wrote:
> I have built 4.4.3 on CentOS 6, with a fairly minimalist smb.conf,
> provisioned the domain as per the wiki [1], and cannot get past test one:
>
> [root at frodo ~]# smbclient -L localhost -U%
> Domain=[ADTEST] OS=[Windows 6.1] Server=[Samba 4.4.3]
> tree connect failed: NT_STATUS_CONNECTION_DISCONNECTED
>
> I can get output if I
2014 Jan 14
2
Kerberos GSSAPI: Server not found in Kerberos database
Hello,
I have now spent 30 hours trying to get this working, so it's time to
get some professinoal help. :)
In a nutshell, I would like to have a sambda AD PDC that authenticates
both Windows and Debian. On Linux, I would like to use SSSD.
I have followed the steps on the wiki:
- https://wiki.samba.org/index.php/Samba_AD_DC_HOWTO
-
2016 Sep 02
0
Cooperation with the samba and the Windows ActiveDirectory
Hi Takano,
You wrote:
※The direction of the trust Samba server → Windows server
Which should mean, according to some MS book sitting on my desk, that you
want Samba domain to trust MS domain.
In the Samba FAQ, here:
https://wiki.samba.org/index.php/FAQ#Does_Samba_support_trust_relationship_with_AD.3F
you can read "Samba can be trusted, but can't trust yet."
According to that, if