Vorraussetzung: weiterer Rechner ist samba-pdc oder samba-ldap-pdc
(nicht empfohlen)
samba
/etc/samba/smb.conf
:
[global] workgroup = kurs security = domain add user script = /usr/sbin/useradd -d /tmp %u [freigabe] path = /tmp writable = yes
Debian: samba winbind
CentOS: samba samba-common
openSuSE ab 11.4: samba-winbind
/etc/samba/smb.conf
:
[global] workgroup = kurs security = domain idmap uid = 20000 - 30000 idmap gid = 20000 - 30000 template shell = /bin/bash winbind use default domain = Yes # ab samba 3.4 notwendig: ( gibts da noch ne andere Lösung? ) map untrusted to domain = yes [freigabe] path = /tmp writable = yes
openSuSE ab 11.4:
/etc/init.d/smb stop /etc/init.d/nmb stop
CentOS 5:
/etc/init.d/smb stop
Debian 5:
/etc/init.d/samba stop
Bug in openSuSE 13.1 (PDC): AppArmor verhindert, dass auf dem PDC ein Benutzer angelegt werden kann. Lösung: auf dem PDC
systemctl stop apparmor.service
net rpc join -U smbadmin
openSuSE ab 11.4:
/etc/init.d/winbind restart /etc/init.d/smb start /etc/init.d/nmb start
CentOS 5:
/etc/init.d/smb start
Debian 5:
/etc/init.d/winbind restart /etc/init.d/samba start
wbinfo --own-domain wbinfo -t wbinfo -u wbinfo -a kurs\\iw%villa
/etc/nsswitch.conf
:
passwd: files winbind group: files winbind shadow: files winbind
oder
/etc/nsswitch.conf
:
passwd: compat group: compat shadow: compat passwd_compat: winbind group_compat: winbind shadow_compat: winbind
echo '+::::Samba User::' >> /etc/passwd echo '+:::' >> /etc/group echo '+::::::::' >> /etc/shadow
getent passwd iw
net rpc testjoin -U smbadmin