01-25-2010
Thanks for the reply. I am using gcc, I am not sure what makefile I am using, whichever the default one is that the configure script produces? I am not that familiar with the logistics of compiling from source, general make and configure errors I can deal with (typically missing/incorrect dependencies) but this I am unsure of. How do I determine the Makefile?
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi all,
I experienced a problem when making a LDAP search from Unix Netscape or Unix Mozilla adressbooks into my Active Directory LDAP db for email addresses.
I add my Domain Controller hostname and the LDAP root dir to search in.
For example:
Name: AD
LDAP server: gullvi
Search Root:... (0 Replies)
Discussion started by: tonlu
0 Replies
2. AIX
Hello all. I have never had any issues like this when compiling applications from source. When I try to compile samba-3.5.0pre2, configure runs with no issues, but when the time comes to make, this happens:
make: make 1254-025 There must be an existing description file or specify a target.
... (4 Replies)
Discussion started by: raidzero
4 Replies
3. Red Hat
Hi Friends,
I need your help to get some solution of one of my problem.
Ours is a mixed domain. Most of the servers are windows and very little linux servers. We are using the MS AD for authentication. My problem is, I want to authenticate linux servers against AD. I donot want to use any... (1 Reply)
Discussion started by: arumon
1 Replies
4. Solaris
Hi, FYI, I'm new in Solaris
I'm trying to use Kerberos on authenticating LDAP Client with the Active Directory on Windows Server 2003 on both Solaris 10 5/08 and Solaris 10 9/10 by referring to the pdf file kerberos_s10.pdf available at sun official site.
... (0 Replies)
Discussion started by: chongzh
0 Replies
5. AIX
The KRB5ALDAP compound load module is giving me fits. Everything looks like it should be working, but no.
Goal: Integrate AIX host with Active Directory using a KRB5ALDAP compound load module so that users can be created in AD and used in AIX, with unix attributes (registry values) being... (2 Replies)
Discussion started by: jgeiger
2 Replies
6. HP-UX
The situation: i have a AD server with samba4,all clients
ssh-kerberos works fine,except hpux :p wich works
only for few days..then i must re-export(sic!) the keys with
samba-tool domain exportkeytab 11.keytab --principal=host/hpux.fqdn
Why after few days ssh return error "server not found... (1 Reply)
Discussion started by: Linusolaradm1
1 Replies
7. AIX
Hi all,
I have installed samba 3.6.22 on AIX 7.1 and join a windows AD with success.
All seem to work fine, I have configured smb.conf, methods.cfg, kerberos, user .... the following command work fine wbinfo -u, wbinfo -g, wbinfo -i, wbinfo -s, wbinfo -S, lsuser, id...
The unique... (20 Replies)
Discussion started by: PhilippeA
20 Replies
8. UNIX for Beginners Questions & Answers
Hi,
How can we check users added through LDAP or AD. Users added through a group of AD or LDAP group. (2 Replies)
Discussion started by: Nishit
2 Replies
9. AIX
Hi. Ive recently upgraded Samba on an AIX server to Samba 4. The aim is to allow a specific group of Windows AD users to access some AIX file shares (with no requirement to enter passwords) - using AD to authenticate.
Currently I have:
Samba 4 installed ( and 3 daemons running)
Installed... (1 Reply)
Discussion started by: linuxsnake
1 Replies
10. AIX
I am running AIX 7.1 and currently we have samba 3.6.25 installed on the server. As it stands some AIX folders are shared that can be accessed by certain Windows users.
The problem is that since Windows 10 the guest feature no longer works so users have to manually type in their Windows login/pwd... (14 Replies)
Discussion started by: linuxsnake
14 Replies
LEARN ABOUT CENTOS
idmap_rfc2307
IDMAP_RFC2307(8) System Administration tools IDMAP_RFC2307(8)
NAME
idmap_rfc2307 - Samba's idmap_rfc2307 Backend for Winbind
DESCRIPTION
The idmap_rfc2307 plugin provides a way for winbind to read id mappings from records in an LDAP server as defined in RFC 2307. The LDAP
server can be stand-alone or the LDAP server provided by the AD server. An AD server is always required to provide the mapping between name
and SID, and the LDAP server is queried for the mapping between name and uid/gid. This module implements only the "idmap" API, and is
READONLY.
Mappings must be provided in advance by the administrator by creating the user accounts in the Active Directory server and the posixAccount
and posixGroup objects in the LDAP server. The names in the Active Directory server and in the LDAP server have to be the same.
This id mapping approach allows the reuse of existing LDAP authentication servers that store records in the RFC 2307 format.
IDMAP OPTIONS
range = low - high
Defines the available matching UID and GID range for which the backend is authoritative. Note that the range acts as a filter. If
specified any UID or GID stored in AD that fall outside the range is ignored and the corresponding map is discarded. It is intended as
a way to avoid accidental UID/GID overlaps between local and remotely defined IDs.
ldap_server = <ad | stand-alone >
Defines the type of LDAP server to use. This can either be the LDAP server provided by the Active Directory server (ad) or a
stand-alone LDAP server.
bind_path_user
Specifies the bind path where user objects can be found in the LDAP server.
bind_path_group
Specifies the bind path where group objects can be found in the LDAP server.
user_cn = <yes | no>
Query cn attribute instead of uid attribute for the user name in LDAP. This option is not required, the default is no.
cn_realm = <yes | no>
Append @realm to cn for groups (and users if user_cn is set) in LDAP. This option is not required, the default is no.
ldap_domain
When using the LDAP server in the Active Directory server, this allows to specify the domain where to access the Active Directory
server. This allows using trust relationships while keeping all RFC 2307 records in one place. This parameter is optional, the default
is to access the AD server in the current domain to query LDAP records.
ldap_url
When using a stand-alone LDAP server, this parameter specifies the ldap URL for accessing the LDAP server.
ldap_user_dn
Defines the user DN to be used for authentication. The secret for authenticating this user should be stored with net idmap secret (see
net(8)). If absent, an anonymous bind will be performed.
ldap_realm
Defines the realm to use in the user and group names. This is only required when using cn_realm together with a stand-alone ldap
server.
EXAMPLES
The following example shows how to retrieve id mappings from a stand-alone LDAP server. This example also shows how to leave a small non
conflicting range for local id allocation that may be used in internal backends like BUILTIN.
[global]
idmap config * : backend = tdb
idmap config * : range = 1000000-1999999
idmap config DOMAIN : backend = rfc2307
idmap config DOMAIN : range = 2000000-2999999
idmap config DOMAIN : ldap_server = stand-alone
idmap config DOMAIN : ldap_url = ldap://ldap1.example.com
idmap config DOMAIN : ldap_user_dn = cn=ldapmanager,dc=example,dc=com
idmap config DOMAIN : bind_path_user = ou=People,dc=example,dc=com
idmap config DOMAIN : bind_path_group = ou=Group,dc=example,dc=com
AUTHOR
The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open
Source project similar to the way the Linux kernel is developed.
Samba 4.0 06/17/2014 IDMAP_RFC2307(8)