Displaying 20 results from an estimated 10000 matches similar to: "net ads join must use AD Administrator account ?"
2008 Aug 05
2
Samba / AD integration
I have a quick question on hooking Samba to a large AD domain.
Following the excellent recipe at:
http://wiki.samba.org/index.php/Samba_&_Active_Directory
I see it states about half way down to join the machine to AD
"Now to join your machine to the active directory. You will need the
user-name and password to a Domain Administrator account to do this. The
command you need to join
2007 Dec 18
2
SAMBA ADS integration - windows user account rights
Hi all,
first of all is it possible to join a Linux machine to AD using a
windows user account that is not a member of the group Domain Admins?
Cause when I do this I get the following error while executing `net ads
join -d 3 -U syncuser`:
#net ads join -d 3 -U syncuser
[2007/12/11 13:47:12, 3] param/loadparm.c:lp_load(4953) lp_load:
refreshing parameters
[2007/12/11 13:47:12, 3]
2005 Nov 08
1
ADS Join and Insufficient Access
My agency is moving all users and computers to a new domain. Our current domain uses AD and the new domain will use AD. My current samba servers are running 3.0.20a with ADS security with winbind on Debian Stable (Sarge) with no problems.
I set up a test samba server using 3.0.20b, the new krb5.conf and smb.conf.
kinit works fine. ("Authenticated to Kerberos v5")
I prestage the server
2015 Apr 29
3
Cannot authenticate the administrator account
Back to the RE-provision workbench. :-)
2015 Apr 30
3
Cannot authenticate the administrator account
SUCCESS.........up to the point of kerberos tickets.
((What a difference a night's sleep can do for logic neurons.))
Everything works with the provisioning now except for kerberos.
The setup follows and ends with the kinit, klist, and kvno errors/failures:
[root at dc1 ~]# hostname -f
dc1.internal.example.com
[root at dc1 ~]# hostname -s
dc1
[root at dc1 ~]# hostname -d
internal.example.com
2015 Apr 29
4
Cannot authenticate the administrator account
Louis and Rowland -- thank you, Gents!
Making progress.
Kerberos is operational and handing out tickets, but I was only able to
test using:
kinit administrator at EXAMPLE.COM
vs. the Samba AD DC HOWTO: administrator at SAMDOM.EXAMPLE.COM
- - - - - - - - - - - - - - - - - - - - - - -
Per Rowland's dns naming example - my hostname output:
~]# hostname -s
samba
~]# hostname -f
2008 Feb 27
1
krb5.conf file in /var/lib/samba/smb_krb5; Samba 3.0.27a
Hello list,
I've upgraded from Samba 3.0.14a to 3.0.27a (Samba is a domain member of a
W2k3 native AD) and I see that in the /var/lib/samba/smb_krb5 directory a
krb5.conf file is created.
Is this krb5.conf file extracted from my original /etc/krb5.conf? Or is this
file created from the "password server =" entry in my smb.conf file?
My original /etc/krb5.conf contains the DC's in
2015 Apr 29
3
Cannot authenticate the administrator account
On 29/04/15 20:37, Sketch wrote:
> On Wed, 29 Apr 2015, Andrey Repin wrote:
>
>> Greetings, Sketch!
>>
>>>> workgroup = INTERNAL
>>>> realm = EXAMPLE.COM
>>>> netbios name = SAMBA
>>
>>> Looks that way to me. Your realm should include the workgroup name:
>>> INTERNAL.EXAMPLE.COM.
>>
>> Nothing is
2015 Apr 22
7
Cannot authenticate the administrator account
Are you sure you have the "correct" administrator password ..
?
this should work ,? echo ${SAMBA_NT_ADMIN_PASS}| smbclient //localhost/netlogon -U Administrator -c 'ls'
that does not involve kerberos yet..
?
Please run:
?
SETHOSTNAME=`hostname -s`
SETDNSDOMAIN=`hostname -d`
SETFQDN=`hostname -f`
host -t SRV _ldap._tcp.${SETDNSDOMAIN}.
host -t SRV
2015 Apr 30
2
Cannot authenticate the administrator account
Hai Mike,
in /etc/hosts
remove the line :
127.0.0.1 dc1.internal.example.com dc1
and try again.
Greetz,
Louis
>-----Oorspronkelijk bericht-----
>Van: 1100100 at gmail.com [mailto:samba-bounces at lists.samba.org]
>Namens Mike
>Verzonden: donderdag 30 april 2015 16:35
>Aan: samba
>Onderwerp: Re: [Samba] Cannot authenticate the administrator account
>
2015 Apr 22
3
Cannot authenticate the administrator account
Thanks, Rowland.
I'll give it some thought.
At this point, I may even go back to slackware or gentoo.
It is a bit much learning all the new system tools (systemd, systemctl,
firewalld, NetworkManager, etc.) while moving from a samba standalone
configuration to AD/DC, DNS, Kerberos, all for the first time.
I'm also considering calling Pantek.com - - - I've had some very good
2015 Apr 28
2
Cannot authenticate the administrator account
I wanted to follow up to the list in hopes it will help others with similar
configuration.
Per previous posts --
OS: CentOS 7.153
Samba: Version 4.1.17-SerNet-RedHat-11.el7
Samba provisioned to act as: AD DC following Samba Wiki: Samba AD DC HOWTO
Samba Internal DNS daemon deployed.
1. Disable selinux. Unless you have a solid understanding of how to
configure it for your environment, please
2008 Mar 18
1
kinit succeeded but ads_sasl_spnego_krb5_bind failed
Hi all,
I'm having trouble joining samba to active directory. My samba version is
3.0.28a-35 and krb is 1.6.1-17.el5. It's running on centos 5, kernel
version 2.6.18-53.1.14.el5. It's running on vmware server by the way if that
is of any significance.
The specific error that I get are as follows:
when testjoining the domain:
[2008/03/18 04:34:07, 0]
2004 Jul 19
1
Windows 2003 AD/Kerberos Ticket error
I'm attempting to configure Samba 3.0.4 to work with Windows 2003 Active
Directory, mapping users' home directories automatically. Currently we
use this method in production with Windows 2000 but wish to migrate to
2003. The problem seems to be Kerberos related. I was able to join the
Linux box (RedHat 9) to the AD. I can do a "kinit <username>"
successfully. Klist shows a
2017 Nov 06
2
net ads join fails with pre-created machine accounts
Hi folks,
we have recently tried to join several FreeBSD machines to your forest where the machine accounts where pre-created by the core admin team. We did as root:
# kinit 'machine-name$'
# net ads join ...
Unfortunately, it failed with an error that several attributes cannot be set which are available to domain admins only. It ultimately means that one cannot use pre-created
2007 May 31
0
Can not join via ADS using administrator account, succeeded using another account
Hello,
Yesterday I have used Samba to help me authenticate Windows uses
within the Squid Proxy server. ( FreeBSD-6.1 + Samba 3.0.25 )
The Kerberos setup went fine. However I got the
NT_STATUS_PROTOCOL_UNREACHABLE error code when trying to "net join"
the domain.
It seems this is Kerberos related. On the net some emails suggest
using "kdc = tcp/server.name" syntax to deal
2005 Sep 15
1
Minimum User Rights For "net ads join"
I have seen a number of cases where unix/linux administrators do not
have access to Windows Administrator rights to execute "net ads join".
Here is the result of testing that I have done to determine what the
minimum set of user rights is.
Case 1: Adding the object to the domain and joining the domain with
"net ads join"
In this case, an ordinary user "member of
2015 Apr 22
4
Cannot authenticate the administrator account
AD DC default shares are okay after provisioning -
smbclient -L localhost -U%:
Domain=[CONPAGO] OS=[Unix] Server=[Samba 4.1.17-SerNet-RedHat-11.el7]
Sharename Type Comment
--------- ---- -------
netlogon Disk
sysvol Disk
IPC$ IPC IPC Service (Samba
4.1.17-SerNet-RedHat-11.el7)
Domain=[CONPAGO]
2016 Oct 08
2
Administrator password expired - cannot change password
Hi,
my samba4 Administrator password has expired and I cannot change it.
I tried:
[root at host] {~} > samba-tool user setpassword Administrator
New Password:
Changed password OK
[root at host] {~} > kinit
administrator at DOMAINS's Password:
kinit: Password incorrect
Typing the right password. The password is still the old one and expired.
The password doesn't even change when
2005 Feb 08
3
Joining a domain with a non-administrator account
I'm trying to set it up so I can join the domain with a regular user
that is part of the domain admin group. I have a user dsonenberg that
is in the domain admin group(512), but I can't join the domain with that
account. For the record I can login with that account and Administrator
can join the domain. The PDC has an LDAP backend. Here's the log.
2005/02/08 10:26:25, 2]