Displaying 20 results from an estimated 10000 matches similar to: "Samba 4.2.15 and MIT Kerberos External Authentication"
2025 Apr 08
1
Samba 4.2.15 and MIT Kerberos External Authentication
Hello, I have been trying to get Samba 4.21.5 setup to use an external MIT
kerberos authentication system on Debian 12. I realize this feature is
still experimental, but I just wanted to confirm if I am missing a critical
detail as it seems to be correctly installed except that it's not passing
the credentials from the windows client correctly. I
I have Samba complied as per the doc with
2025 Apr 09
1
Samba 4.2.15 and MIT Kerberos External Authentication
>>* The local on
*>>* site domain is a realm that has a list of usernames and samba
*>>* accounts but authentication is off loaded onto an external realm and
*>>* there is a one way trust relationship where the local samba server
*>>* trusts the external realm -- all that is required is that there is a
*>>* local username and username map on local samba server.
2004 Jan 26
6
OpenSSH, OpenAFS, Heimdal Kerberos and MIT Kerberos
Rather then implementing kafs in MIT Kerberos, I would like to
suggest an alternative which has advantages to all parties.
The OpenSSH sshd needs to do two things:
(1) sets a PAG in the kernel,
(2) obtains an AFS token storing it in the kernel.
It can use the Kerberos credentials either obtained via GSSAPI
delegation, PAM or other kerberos login code in the sshd.
The above two
2009 Nov 12
2
Looking for AIX Users of Winbind -- Authorization and SSH Problems
Hi all,
I've got Samba with Winbind working on AIX 5.3 and 6.1 fairly well with
Active Directory 2003. In fact, I'd say short of 2 very important services,
it's working almost perfectly. Unfortunately, these 2 services are quite
critical, and without them I'm afraid we'll have to resort to some sort of
proprietary identity solution like Novell, which I'm not crazy about.
2020 Jul 28
2
kerberos ticket on login problem
I'm experimenting with smb + winbind.
My host is joined to AD and I can login to my host fine using my AD
credentials via SSH.?? The only issue is that I don't get a Kerberos
ticket generated.
In /etc/security/pam_winbind.conf I have:
krb5_auth = yes
krb5_ccache_type = KEYRING
In /etc/krb5.conf, I also have:
default_ccache_name = KEYRING:persistent:%{uid}
Using wbinfo -K jas, then
2008 Aug 06
1
winbindd behaving oddly
Hello folks,
Been beating my head with an winbind and pam just behaving oddly. I have following
various HOW-TO's, wiki's, and docs, and just can't seem to get past a wall. Here a
some of the issues:
- the 1st attempt at ssh'ing to a server gives me a 'Wrong Password' in the logs. Here's
an exact snippet:
Aug 6 18:45:40 mia21654bcu001 sshd[5371]: pam_winbind(sshd):
2008 Jan 03
1
require_membership_of being ignored?
Hi, I'm setting up a Gentoo samba server for home directories on a 2003 ADS
network.
I've decided to use pam_mkhomedir.to have the fileserver automagically create
their home when they first log in. But we don't want everyone to log in, just
the members of the AD group filesurfer-users.
The problem: Regardless of what I put as a require_membership_of= in the samba
pam file, any domain
2017 Dec 01
2
Restricting AD group logging on to Servers
> -----Original Message-----
> From: Rowland Penny [mailto:rpenny at samba.org]
> Sent: 01 December 2017 17:40
> To: samba at lists.samba.org
> Cc: Roy Eastwood
> Subject: Re: [Samba] Restricting AD group logging on to Servers
>
> On Fri, 1 Dec 2017 17:06:42 -0000
> Roy Eastwood via samba <samba at lists.samba.org> wrote:
>
> > Hi,
> > I have a
2013 Jan 24
3
require_membership_of is ignored
I have a RHEL 6.3 machine successfully bound to AD using winbind, and commands like wbinfo -u and wbinfo -g output the users and groups. I can also log in as any AD user.
The problem is, I can log on as any AD user.
require_membership_of is being ignored. I can put in a valid group with no spaces in the name, a group by SID, and either way, everyone can log in.
I've put this option in both
2011 Jun 17
2
Restricting logins using pam_winbind require_membership_of ?
Hi.
I have some shares on a server that are offered to specific Active Directory
user groups, but the business doesn't want those users to be able to login
to the server. If I were to add "require_membership_of" to pam_winbind to
limit logins and shut out the users I don't want, would it also have the
side effect of denying those users access to the shares as well?
Regards,
2017 Dec 01
2
Restricting AD group logging on to Servers
Hi,
I have a Debian Stretch system running a self-compiled version 4.7.3 of Samba. Having followed the Samba WiKi to allow AD users
to log onto the servers using PAM authentication, I now want to restrict access to specified group(s). So I created a linuxadmins
group and made some test users members of the group.
Initially I tried to restrict access by modifying /etc/security/access.conf
2013 Nov 28
4
SSH - Winbind and Keybased Auth
Hi Team,
We have a weird issue that we are trying to understand. We have winbind set up and working successfully for user authentication with passwords via ssh. We have pam.d/system-auth-ac and password-auth-ac (symlinked) set to require membership of a group which works great via password authentication.
However, if the user has a ssh key set up, they seem to bypass the group membership
2020 Jul 29
1
kerberos ticket on login problem
On 7/28/2020 4:11 PM, Jason Keltz wrote:
>
> On 7/28/2020 3:59 PM, Jason Keltz via samba wrote:
>> I'm experimenting with smb + winbind.
>>
>> My host is joined to AD and I can login to my host fine using my AD
>> credentials via SSH.?? The only issue is that I don't get a Kerberos
>> ticket generated.
>>
>> In
2005 Oct 26
1
Question about pam_winbind
I was looking at the documentation at samba.org and it says the following:
require_membership_of=[SID or NAME]
If this option is set, pam_winbind will only succeed if the user is a
member of the given SID or NAME. A SID can be either a group-SID, a
alias-SID or even a user-SID. It is also possible to give a NAME instead
of the SID. That name must have the form: /|MYDOMAIN\mygroup|/ or
2018 Jan 22
3
SAMBA 4.7.4 with MIT Keberos
Hello,
i installed a SAMBA 4.7.4 AD Server on Ubuntu 18.04 (BETA). SAMBA4 was
compiled from source. For MIT Keberos i also installed libkrb5-dev and
krb5-kdc and compiled with the "--with-system-mitkrb5" option.
The installation runs pretty good (some dependencies problem, solved
manually). But now im not able to test kerberos:
# kinit administrator
--> kinit: Cannot find KDC
2020 Jun 16
2
Samba as a domain member:
Yes:
# getent group GROUP
group:x:17573:
# getent group group2
group2:x:11010:
# getent group GROUP3
group3:x:21178:
# wbinfo --group-info GROUP
group:x:17573:
# wbinfo -n GROUP
S-1-5-21-948789634-15155995-928725530-7573 SID_DOM_GROUP (2)
2019 Nov 09
2
Fedora developer list is asking about progress for MIT Kerberos 5 compatibility
I've been involved in a thread over on the fedora-devel mailing list
about the experimental MIT Kerberos 5 compatibility for Samba. I'm
staring at https://wiki.samba.org/index.php/MIT_Build , and the list
of incompatibilities is daunting.
Is anyone over here doing the compatibility work and can comment on
progress? Or, perhaps, is this just fundamentally unworkable? The
experimental
2017 Mar 13
1
pam_winbind with trusted domain
Hi,
I am having problems using pam_winbind to log in as a user in a trusted domain. The arrangement is that Samba is joined to a local domain DOMLOCAL which has a trust setup with DOMREMOTE. getent passwd/group correctly enumerates users and groups from DOMLOCAL.
If I try getent passwd for the DOMREMOTE account no result is returned. pam_winbind has a requirement that the user is a member of
2020 Jun 17
1
Samba as a domain member:
Nice call. It almost worked except for a small error in 'man
pam_winbind' -- DOMAIN\\GROUP should actually be DOMAIN\GROUP in the
pam.d file.
Now, I'm a bit confused.
The pam module 'pam_winbind' is from the Samba suite.
OpenVPN is just passing on the authentication decision to Samba.
However, I was expecting to just use the group name without the domain
name since I have
2018 Jun 28
2
heidmal to mit adminstrator password expired
Hello,
I'm using samba as active directory with heidmal kerberos. I would like to
switch to MIT kerberos as this is the implementation my distrib has chosen.
I've made my kdc.conf according to these instructions:
https://wiki.samba.org/index.php/Running_a_Samba_AD_DC_with_MIT_Kerberos_KDC
But I can't authenticate it seems all my password are expired.
kinit administrator at