Sponsored Content
Full Discussion: NFS, AD, AutoFS
Operating Systems Linux Red Hat NFS, AD, AutoFS Post 302940571 by cjhilinski on Tuesday 7th of April 2015 08:57:45 AM
Old 04-07-2015
The problem with that MS link is that it never mentions the use of Active Directory. The Win2008R2 documentation says it can use either mapping or ADDS (or even AD lightweight LDAP).

Interestingly, I have a RH7 machine that uses the same AD stuff for authentication. It mounts NFS shares from a Solaris 10 machine (using NFSv3), and everything works just fine. All of the shares, etc., are given the proper permissions.
 

10 More Discussions You Might Find Interesting

1. AIX

Autofs

Hi Guys, Autofs works fine on AIX 5.2, but the same thing is not getting mounted automatically on AIX 5.3.. Is there ant difference for autofs confiiguration between 5.2 and 5.3 Thanks & Regards Manu (0 Replies)
Discussion started by: b_manu78
0 Replies

2. Solaris

disabling nfs and autofs in solaris 9

Hi, I want to permanently disable nfs and autofs in solaris 9, (2 Replies)
Discussion started by: manoj.solaris
2 Replies

3. Solaris

autofs vs nfs

I've a sun server, 3 sun workstations and plan to do backup on certain directory in each workstations monthly. As it's only require to mount as NFS on those workstations once a month. So I plan to configure such requirement using autofs. What are the considerations need to take care in such... (4 Replies)
Discussion started by: KhawHL
4 Replies

4. Solaris

autofs

hi tell me difference between direct automount and indirect automount. thanks you (1 Reply)
Discussion started by: sijocg
1 Replies

5. Solaris

Autofs

what are all the advantages of direct map and indirect map in 'AUTOFS' and which one is better for our usage (2 Replies)
Discussion started by: dinu
2 Replies

6. UNIX for Dummies Questions & Answers

NFS issue with autofs in CentOS 6.3

I am running CentOS 6.3 as a VM on a host which has the same installation. I configured my NFS server and I am guessing it works. I say guessing because I can mount the desired folder with mount command on my client machine. So, when I run: mount -t nfs -o vers=3 vm2.domain.com:/nethome /nethit... (7 Replies)
Discussion started by: bashily
7 Replies

7. Red Hat

How to mount NFS using automounter(autofs)?

I have an nfs at 192.168.1.10:/home/vm1/Desktop/nfs and will like to mount locally to /home/vm1/Desktop/nfs-mount using automounter...need help doing do What i did $cat /etc/auto.master /home/vm1/Desktop /etc/auto.nfs $cat /etc/auto.nfs nfs-bind -fstype=nfs ... (3 Replies)
Discussion started by: nokia3310
3 Replies

8. Red Hat

Autofs issue

Hi I'm trying to use autofs to mount a directory structure. I have a directory with sub directories in it and all of them mounted on their respective filesystems /dbname /dev/mapper/vg_dbname-Home /dbname/oracle00 /dev/mapper/vg_dbname-Data00... (3 Replies)
Discussion started by: maverick_here
3 Replies

9. Red Hat

RHEL 7.1 autofs permissions do not match NFS servers

RHEL 7.1 client using autofs to mount a NIS map of home directories being exported by a Solaris 10x86 nfs server. The owner and group are correct on the NFS server, but on the RHEL client, the owner and group end up being nobody nobody. The USERS and GROUPS are NIS maps as well. They are... (2 Replies)
Discussion started by: mrmurdock
2 Replies

10. Fedora

Autofs problem

Hi all, I'm having trouble getting autofs working on a new install of Scientific Linux 7.2. I have the files /etc/auto.master, /etc/auto/homes and /etc/auto.misc and /auto.direct setup, and they are copies of files on a working SL 6 machine. I can include the contents of the files at the end... (0 Replies)
Discussion started by: HuntWilliamR
0 Replies
IDMAP_RFC2307(8)					    System Administration tools 					  IDMAP_RFC2307(8)

NAME
idmap_rfc2307 - Samba's idmap_rfc2307 Backend for Winbind DESCRIPTION
The idmap_rfc2307 plugin provides a way for winbind to read id mappings from records in an LDAP server as defined in RFC 2307. The LDAP server can be stand-alone or the LDAP server provided by the AD server. An AD server is always required to provide the mapping between name and SID, and the LDAP server is queried for the mapping between name and uid/gid. This module implements only the "idmap" API, and is READONLY. Mappings must be provided in advance by the administrator by creating the user accounts in the Active Directory server and the posixAccount and posixGroup objects in the LDAP server. The names in the Active Directory server and in the LDAP server have to be the same. This id mapping approach allows the reuse of existing LDAP authentication servers that store records in the RFC 2307 format. IDMAP OPTIONS
range = low - high Defines the available matching UID and GID range for which the backend is authoritative. Note that the range acts as a filter. If specified any UID or GID stored in AD that fall outside the range is ignored and the corresponding map is discarded. It is intended as a way to avoid accidental UID/GID overlaps between local and remotely defined IDs. ldap_server = <ad | stand-alone > Defines the type of LDAP server to use. This can either be the LDAP server provided by the Active Directory server (ad) or a stand-alone LDAP server. bind_path_user Specifies the bind path where user objects can be found in the LDAP server. bind_path_group Specifies the bind path where group objects can be found in the LDAP server. user_cn = <yes | no> Query cn attribute instead of uid attribute for the user name in LDAP. This option is not required, the default is no. cn_realm = <yes | no> Append @realm to cn for groups (and users if user_cn is set) in LDAP. This option is not required, the default is no. ldap_domain When using the LDAP server in the Active Directory server, this allows to specify the domain where to access the Active Directory server. This allows using trust relationships while keeping all RFC 2307 records in one place. This parameter is optional, the default is to access the AD server in the current domain to query LDAP records. ldap_url When using a stand-alone LDAP server, this parameter specifies the ldap URL for accessing the LDAP server. ldap_user_dn Defines the user DN to be used for authentication. The secret for authenticating this user should be stored with net idmap secret (see net(8)). If absent, an anonymous bind will be performed. ldap_realm Defines the realm to use in the user and group names. This is only required when using cn_realm together with a stand-alone ldap server. EXAMPLES
The following example shows how to retrieve id mappings from a stand-alone LDAP server. This example also shows how to leave a small non conflicting range for local id allocation that may be used in internal backends like BUILTIN. [global] idmap config * : backend = tdb idmap config * : range = 1000000-1999999 idmap config DOMAIN : backend = rfc2307 idmap config DOMAIN : range = 2000000-2999999 idmap config DOMAIN : ldap_server = stand-alone idmap config DOMAIN : ldap_url = ldap://ldap1.example.com idmap config DOMAIN : ldap_user_dn = cn=ldapmanager,dc=example,dc=com idmap config DOMAIN : bind_path_user = ou=People,dc=example,dc=com idmap config DOMAIN : bind_path_group = ou=Group,dc=example,dc=com AUTHOR
The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed. Samba 4.0 06/17/2014 IDMAP_RFC2307(8)
All times are GMT -4. The time now is 08:47 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy