Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

idmap_adex(8) [suse man page]

IDMAP_ADEX(8)						    System Administration tools 					     IDMAP_ADEX(8)

NAME
idmap_adex - Samba's idmap_adex Backend for Winbind DESCRIPTION
The idmap_adex plugin provides a way for Winbind to read id mappings from an AD server that uses RFC2307 schema extensions. This module implements both the idmap and nss_info APIs and supports domain trustes as well as two-way cross forest trusts. It is a read-only plugin requiring that the administrator provide mappings in advance by adding the POSIX attribute information to the users and groups objects in AD. The most common means of doing this is using "Identity Services for Unix" support on Windows 2003 R2 and later. Note that you must add the uidNumber, gidNumber, and uid attributes to the partial attribute set of the forest global catalog servers. This can be done using the Active Directory Schema Management MMC plugin (schmmgmt.dll). NSS_INFO The nss_info plugin supports reading the unixHomeDirectory, gidNumber, loginShell, and uidNumber attributes from the user object and the gidNumber attribute from the group object to fill in information required by the libc getpwnam() and getgrnam() family of functions. Group membership is filled in according to the Windows group membership and not the msSFU30PosixMember attribute. Username aliases are implement by setting the uid attribute on the user object. While group name aliases are implemented by reading the displayname attribute from the group object. EXAMPLES
The following example shows how to retrieve idmappings and NSS data from our principal and trusted AD domains. [global] idmap backend = adex idmap uid = 1000-4000000000 idmap gid = 1000-4000000000 winbind nss info = adex winbind normalize names = yes AUTHOR
The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed. Samba 3.5 06/18/2010 IDMAP_ADEX(8)

Check Out this Related Man Page

IDMAP_AD(8)						    System Administration tools 					       IDMAP_AD(8)

NAME
idmap_ad - Samba's idmap_ad Backend for Winbind DESCRIPTION
The idmap_ad plugin provides a way for Winbind to read id mappings from an AD server that uses RFC2307/SFU schema extensions. This module implements only the "idmap" API, and is READONLY. Mappings must be provided in advance by the administrator by adding the uidNumber attributes for users and gidNumber attributes for groups in the AD. Winbind will only map users that have a uidNumber and whose primary group have a gidNumber attribute set. It is however recommended that all groups in use have gidNumber attributes assigned, otherwise they are not working. Currently, the ad backend does not work as the default idmap backend, but one has to configure it separately for each domain for which one wants to use it, using disjoint ranges. One usually needs to configure a writeable default idmap range, using for example the tdb or ldap backend, in order to be able to map the BUILTIN sids and possibly other trusted domains. The writeable default config is also needed in order to be able to create group mappings. This catch-all default idmap configuration should have a range that is disjoint from any explicitly configured domain with idmap backend ad. See the example below. IDMAP OPTIONS
range = low - high Defines the available matching UID and GID range for which the backend is authoritative. Note that the range acts as a filter. If specified any UID or GID stored in AD that fall outside the range is ignored and the corresponding map is discarded. It is intended as a way to avoid accidental UID/GID overlaps between local and remotely defined IDs. schema_mode = <rfc2307 | sfu | sfu20> Defines the schema that idmap_ad should use when querying Active Directory regarding user and group information. This can be either the RFC2307 schema support included in Windows 2003 R2 or the Service for Unix (SFU) schema. For SFU 3.0 or 3.5 please choose "sfu", for SFU 2.0 please choose "sfu20". Please note that primary group membership is currently always calculated via the "primaryGroupID" LDAP attribute. EXAMPLES
The following example shows how to retrieve idmappings from our principal and trusted AD domains. If trusted domains are present id conflicts must be resolved beforehand, there is no guarantee on the order conflicting mappings would be resolved at this point. This example also shows how to leave a small non conflicting range for local id allocation that may be used in internal backends like BUILTIN. [global] workgroup = CORP idmap config * : backend = tdb idmap config * : range = 1000000-1999999 idmap config CORP : backend = ad idmap config CORP : range = 1000-999999 AUTHOR
The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed. Samba 4.0 06/17/2014 IDMAP_AD(8)
Man Page