11-23-2010
turn debugging on (log level 256) and see what attribute it is trying to update. it might not be userPassword. not familar with using SMB with LDAP but the logging would show you exactly what is wrong.
10 More Discussions You Might Find Interesting
1. Cybersecurity
Hi all,
I've just been handled the responsibility for a FTP-site. Having no experiens of UNIX at all. And now one of my users needs to have full access to the usr directory and all it's subdirectories, don't know why just trying to do what the boss tells me. The type of UNIX is FreeBSD and the... (4 Replies)
Discussion started by: -tri-
4 Replies
2. UNIX for Dummies Questions & Answers
Hello All,
I just inherent a new server with RedHat AS4 and ACL file system. I'm new to ACL and was trying to dump the system for backup and got errors that the ACL inodes would not be backed up. I have tried different command for backup such as star pax but found that there is a limitation of... (2 Replies)
Discussion started by: larryase
2 Replies
3. Linux
Hi, I want to know what does the "effective" comment means in the output of the getfacl and whether it has to do with the acl mask...
thanks (0 Replies)
Discussion started by: Gartlar
0 Replies
4. Solaris
Can i get the synopsis for add multiple users in single command for ACL access for a directory or a file
thanks in advance
dinu (3 Replies)
Discussion started by: dinu
3 Replies
5. UNIX for Advanced & Expert Users
Hi
I am searching a tool like "LDAP Administrator 2011.1"/ "LDAP-SQL" but for the CLI.
Wish to use LDAP-SQL in scripts (non Windows GUI environment)
http://ldapadministrator.com/resources/english/2011.1/images/sqlquery_large.png
Softerra LDAP Administrator 2011.1 - What's New
OS is... (2 Replies)
Discussion started by: slashdotweenie
2 Replies
6. UNIX for Advanced & Expert Users
Hi Friends,
I went through the ACL threads that were posted in the past but none were matching to my requirement . Hence starting a new thread .
Challenge :
user : a
group : Test1
user: b
group: Test2
Say under user a i create dir /tmp/debug with the privilege of 755 and also... (3 Replies)
Discussion started by: leobreaker
3 Replies
7. UNIX for Dummies Questions & Answers
Hi..
Could someone explain about setfacl,getfacl in unix and its uses.
Regards,
Suresh (1 Reply)
Discussion started by: suresh sunkara
1 Replies
8. UNIX for Beginners Questions & Answers
Folks,
Solaris 10 issue
When I add a new directory to a path, I only get the "group@" line in the ACL
The parent directory ACL is
drwxrws---+ 12 root teama 12 Jul 18 10:31 .
owner@:rwxp-DaARWc---:------:allow
group@:rwxp-DaARWc--s:fd----:allow
... (0 Replies)
Discussion started by: wilberforce
0 Replies
9. UNIX for Beginners Questions & Answers
hi,
i am facing problem with acls,
as a root i logged in and applied acl for directory(dir5),by using command
setfacl -m u:user1:rwx dir5
but when i logged in as user1 i am not able to access that folder even though i applied full permission to that directory as a root.can any one help me on... (2 Replies)
Discussion started by: cmanoj489
2 Replies
10. Solaris
I have very limited knowledge on LDAP configuration and have been trying fix one issue, but unsuccessful.
The server, I am working on, is Solaris-10 zone. sudoers is configured on LDAP (its not on local server). I have access to login directly on server with root, but somehow sudo is not working... (9 Replies)
Discussion started by: solaris_1977
9 Replies
LEARN ABOUT HPUX
idmap_ldap
IDMAP_LDAP(8) System Administration tools IDMAP_LDAP(8)
NAME
idmap_ldap - Samba's idmap_ldap Backend for Winbind
DESCRIPTION
The idmap_ldap plugin provides a means for Winbind to store and retrieve SID/uid/gid mapping tables in an LDAP directory service.
In contrast to read only backends like idmap_rid, it is an allocating backend: This means that it needs to allocate new user and group IDs
in order to create new mappings. The allocator can be provided by the idmap_ldap backend itself or by any other allocating backend like
idmap_tdb or idmap_tdb2. This is configured with the parameter idmap alloc backend.
Note that in order for this (or any other allocating) backend to function at all, the default backend needs to be writeable. The ranges
used for uid and gid allocation are the default ranges configured by "idmap uid" and "idmap gid".
Furthermore, since there is only one global allocating backend responsible for all domains using writeable idmap backends, any explicitly
configured domain with idmap backend ldap should have the same range as the default range, since it needs to use the global uid / gid
allocator. See the example below.
IDMAP OPTIONS
ldap_base_dn = DN
Defines the directory base suffix to use when searching for SID/uid/gid mapping entries. If not defined, idmap_ldap will default to
using the "ldap idmap suffix" option from smb.conf.
ldap_user_dn = DN
Defines the user DN to be used for authentication. If absent an anonymous bind will be performed.
ldap_url = ldap://server/
Specifies the LDAP server to use when searching for existing SID/uid/gid map entries. If not defined, idmap_ldap will assume that
ldap://localhost/ should be used.
range = low - high
Defines the available matching uid and gid range for which the backend is authoritative. If the parameter is absent, Winbind fails over
to use the "idmap uid" and "idmap gid" options from smb.conf.
IDMAP ALLOC OPTIONS
ldap_base_dn = DN
Defines the directory base suffix under which new SID/uid/gid mapping entries should be stored. If not defined, idmap_ldap will default
to using the "ldap idmap suffix" option from smb.conf.
ldap_user_dn = DN
Defines the user DN to be used for authentication. If absent an anonymous bind will be performed.
ldap_url = ldap://server/
Specifies the LDAP server to which modify/add/delete requests should be sent. If not defined, idmap_ldap will assume that
ldap://localhost/ should be used.
EXAMPLES
The follow sets of a LDAP configuration which uses two LDAP directories, one for storing the ID mappings and one for retrieving new IDs.
[global]
idmap backend = ldap:ldap://localhost/
idmap uid = 1000000-1999999
idmap gid = 1000000-1999999
idmap alloc backend = ldap
idmap alloc config : ldap_url = ldap://id-master/
idmap alloc config : ldap_base_dn = ou=idmap,dc=example,dc=com
NOTE
In order to use authentication against ldap servers you may need to provide a DN and a password. To avoid exposing the password in plain
text in the configuration file we store it into a security store. The "net idmap " command is used to store a secret for the DN specified
in a specific idmap domain.
AUTHOR
The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open
Source project similar to the way the Linux kernel is developed.
Samba 3.5 06/18/2010 IDMAP_LDAP(8)