Displaying 20 results from an estimated 20000 matches similar to: "Winbind/idmap_nss search request to LDAP"
2014 Dec 18
0
IDMAP_NSS on member server
On 17/12/14 23:01, Gaiseric Vandal wrote:
> I have two Samba 3.6.24 domain controllers (Solaris 10.) On all
> machines unix accounts and groups are in the LDAP as well as idmap
> entries for trusted domains. Samba accounts on domain controllers are
> in LDAP so there is problem with consistency unix/windows id and group
> mapping on the domain controllers. The domain
2014 Dec 18
0
IDMAP_NSS on member server
On 17/12/14 22:01, Gaiseric Vandal wrote:
> I have two Samba 3.6.24 domain controllers (Solaris 10.) On all
> machines unix accounts and groups are in the LDAP as well as idmap
> entries for trusted domains. Samba accounts on domain controllers
> are in LDAP so there is problem with consistency unix/windows id and
> group mapping on the domain controllers. The domain
2014 Dec 18
0
IDMAP_NSS on member server
On 18/12/14 16:43, Gaiseric Vandal wrote:
> I think IDMAP_RID would not be the appropriate solution for me. Not
> only do I want consistent IDMapping across all servers - which this
> could do - but I want them to match the the existing unix uidNumber
> in LDAP.
You never said that you had uidNumber in LDAP!, in fact you seemed to
mention every winbind backend except the one that
2014 Dec 18
0
IDMAP_NSS on member server
On 18/12/14 17:24, Gaiseric Vandal wrote:
> I don't have an AD backend for this domain. The DC's are "classic"
> domain controllers, Samba 3.6 , with LDAP backend for all accounts.
> Would this still be an option?
>
>
>
>
> I tried adding
>
>
> idmap config MYDOMAIN:schema_mode = rfc2307
> idmap config MYDOMAIN:backend = ad
> idmap
2009 Mar 09
0
idmap_nss needed together with idmap_ldap?
Hi!
In my samba controlled domain, most users are stored in an LDAP
directory. The Unix boxes use nss_ldap but they also have a few local
users (mostly system-users) whose user-ids are not synchronized.
I've read the documentation about idmap_nss but I'm still not sure if
this is needed for my setup.
Will using idmap_nss in addition to idmap_ldap result in any benefit
(e.g. when mapping
2014 Dec 18
2
IDMAP_NSS on member server
I think IDMAP_RID would not be the appropriate solution for me. Not
only do I want consistent IDMapping across all servers - which this
could do - but I want them to match the the existing unix uidNumber in
LDAP.
Thanks for your help.
On 12/18/14 04:29, Rowland Penny wrote:
> On 17/12/14 22:01, Gaiseric Vandal wrote:
>> I have two Samba 3.6.24 domain controllers (Solaris
2014 Dec 18
2
IDMAP_NSS on member server
I don't have an AD backend for this domain. The DC's are "classic"
domain controllers, Samba 3.6 , with LDAP backend for all accounts.
Would this still be an option?
I tried adding
idmap config MYDOMAIN:schema_mode = rfc2307
idmap config MYDOMAIN:backend = ad
idmap config MYDOMAIN:range = 100-300
Didn't seem to work.
Thanks
On 12/18/14 11:57, Rowland
2014 Dec 17
4
IDMAP_NSS on member server
I have two Samba 3.6.24 domain controllers (Solaris 10.) On all
machines unix accounts and groups are in the LDAP as well as idmap
entries for trusted domains. Samba accounts on domain controllers are
in LDAP so there is problem with consistency unix/windows id and group
mapping on the domain controllers. The domain controllers are the
main file servers as well.
I am configuring a
2020 Oct 30
1
Samba as AD member & without winbind...
Am 30.10.20 um 11:30 schrieb Rowland penny via samba:
> On 30/10/2020 10:09, Thomas Besser via samba wrote:
>> Am 30.10.20 um 10:57 schrieb Rowland penny via samba:
>>> On 30/10/2020 09:20, Thomas Besser via samba wrote:
>>>> actually we have running samba 4.5.16 under Devuan 2.0 (Ascii) as AD
>>>> member without winbind configured. UID and GID
2005 Feb 02
1
PDC + SAMBA + LDAP
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Good Morning,
My test machine is Workstation 16178-AUDIT$. I've already included in
the ldap base, like you can see in the base:
smbldap# ldapsearch -D "cn=root,o=frigorifico-aurora,c=br" -b
"o=frigorifico-aurora,c=br" -x -W '(uid=16178-audit$)'
Enter LDAP Password:
# extended LDIF
#
# LDAPv3
# base
2005 May 26
1
Re: RE pdb_ldap.c, ldapsam_add_sam_account, existing poxisaccount
St?phane,
The book "Samba-3 by Example" is being reprinted very soon. Up to date builds
of the PDF are available on the Samba web site daily. This document can be
downloaded from:
http://www.samba.org/samba/docs/Samba-Guide.pdf
In chapter 5 I have fully documented how Samba-3 can be deployed with LDAP and
using the smbldap-tools. It works perfectly for me and in many sites that
2008 Jan 01
0
idmap_nss: Default domain not being used
I have an existing PDC which I am attempting to move across to a new
server. On the new server, I'm having trouble with idmap (using an LDAP
backend) and trusted domains. The smb.conf file is the same on both
servers. My idmap & winbind parameters are as follows:
ldap idmap suffix = ou=idmap
idmap backend = ldap:ldap://127.0.0.1
idmap uid = 10000-29000
idmap gid = 10000-29000
winbind
2010 Jun 26
2
dovecot ldap search result ordering?
I use openLDAP as dovecot pass/user db.
here is main part of dovecot-ldap.conf:
pass_attrs = mail=user, uid=userdb_home=/home/xadmin/%d/%$,userPassword=password
pass_filter = (&(objectClass=posixAccount)(uid=%u))
default_pass_scheme = SSHA
user_attrs = mail=user, uid=home=/home/xadmin/%d/%$
user_filter = (&(objectClass=posixAccount)(|(mail=%u)(mailAlias=%u)))
It works fine, but some
2007 Oct 10
0
strange uid=domain\5Cuser ldap search requests
Hello,
I have a Samba/OpenLDAP domain (PDB+BDC) and
a member Samba server hosting homes and profiles
which is identifying users with nss_ldap and is issuing some
strange ldap searches.
I have these messages in my slapd logs:
conn=14143 op=2 SRCH base="ou=XXX" scope=1 deref=0
filter="(&(objectClass=posixAccount)(uid=domain\5Cuser))"
conn=14143 op=2 SRCH attr=uid
2020 Sep 01
0
using %d as a variable in the ldap search base
If you already tested %d in the ou of the auth user bind, and it is not
working. I guess you are just left with options like
1. 3 different vm's
2. auth bind = no base, scope subtree that is parent of those 3 ou's and
then apply filters something like
pass_filter = (&(objectClass=posixAccount)(uid=%n)(ou:dn:=%d))
3. investigate if nslcd(/ssss?) has an option to use multiple queries
2020 Oct 30
3
Samba as AD member & without winbind...
On 30/10/2020 13:17, Ralph Boehme wrote:
> Am 10/30/20 um 12:39 PM schrieb Rowland penny via samba:
>> On 30/10/2020 11:20, Ralph Boehme wrote:
>>> Am 10/30/20 um 12:11 PM schrieb Rowland penny via samba:
>>>> On 30/10/2020 11:06, Ralph Boehme via samba wrote:
>>>>> Am 10/30/20 um 10:20 AM schrieb Thomas Besser via samba:
>>>>>> Can I
2005 Jun 12
3
kernel and netfilter patches already in Redhat AS 4 for IPSEC
I read LinuxFest NW 2005 Presentation pdf. On page 32, mentioned it
required patches on kernel 2.6.x and netfilter and It only said that
SuSE 9.2 and 9.3 had patches on it''s stock kernel. I''m using Redhat AS
4. Anybody knows does the stock kernel and netfilter had theses
patches patched ? or How should I know the kernel and netfilter had
these patches applied ?
thanks!
2020 Aug 31
0
using %d as a variable in the ldap search base
You have two ways of authenticating against ldap. I decided to use the
method where a single account has access to the user credentials.
(Advantage of this method, you can limit ldap lookups eg do not have to
do 2nd for the userdb)
debug_level = 1
uris = ldaps://ldap.local:8443
dn = cn=aaaa,cn=bbbbb,ou=ccccc,dc=dddd,dc=eeee,dc=local
dnpass = xxxx
base =
2020 Oct 30
0
Samba as AD member & without winbind...
Am 10/30/20 um 12:39 PM schrieb Rowland penny via samba:
> On 30/10/2020 11:20, Ralph Boehme wrote:
>> Am 10/30/20 um 12:11 PM schrieb Rowland penny via samba:
>>> On 30/10/2020 11:06, Ralph Boehme via samba wrote:
>>>> Am 10/30/20 um 10:20 AM schrieb Thomas Besser via samba:
>>>>> Can I configure winbind to use 'local' users and groups from
2018 Apr 03
0
Could not convert sid: NT_STATUS_NO_SUCH_USER
On Tue, 3 Apr 2018 10:51:09 +0200
Francesco Malvezzi via samba <samba at lists.samba.org> wrote:
> Il 21/02/18 16:20, L.P.H. van Belle ha scritto:
> > Hai,
> >
> > Thank you for having trust in my packages.. :-)
> > Now if you use my package, i suggest, do read the howto's also...
> > All you need for a good setup on debian stretch is there.
>