Sponsored Content
Operating Systems AIX Samba 3.6 on AIX 7.1 - Windows 10 Access to AIX file shares using Active Directory authentication Post 303039944 by linuxsnake on Friday 18th of October 2019 11:14:58 AM
Old 10-18-2019
UPDATE: I now finally have Samba Shares working on AIX 7.1.... However this was only after using a smbmap user list (To map individual Windows user to the root account on my AIX box)

For the Windows to Unix Mapping I added this to samba.conf
Code:
username map = /home/robot/smbmap

Inside smbmap we have this:
Quote:
root = ROBOT\joe.bloggs
The root user is then defined in the file share in smb.conf as follows:
Code:
[shared]
path = /tmp
browseable = yes
read only = No
writable = yes
valid users = root
public = yes
force user = root
force group = system

Now when joe.bloggs opens the AIX file share from Windows he is mapped to the local root user and has access to the file share.

Now the only issue I have is that I don't want to have to add 10 + separate Windows users manually into the smbmap file. Currently I have tested with one account joe.bloggs.
Is there a way to configure samba so that if a Windows user is part of a specific windows group such as "domain admins" that they will automatically be mapped to the local AIX root user?

I'm sure there is an easier way than manually adding 10 + Windows AD usernames to the smbmap file manually.......

I also have an issue with wbinfo. I can run wbinfo -u and wbinfo -g commands fine and they return a list of all windows domain users and groups.
But if I try and query a list of users in a specific Windows group using wbinfo --group-info="domain users" this fails.

Code:
failed to call wbcGetgrnam: WBC_ERR_DOMAIN_NOT_FOUND
Could not get info for group domain users


Last edited by linuxsnake; 10-21-2019 at 05:02 AM..
 

9 More Discussions You Might Find Interesting

1. Linux

How to Unite Redhat 9 Linux with Windows 2003 Active Directory authentication

Dear All, How to configure a Redhat 9 client to windows 2003 server. I have windows 2003 server which act has domain controller in my office. I have been asked to use redhat 9 has client. how to configure so that redhat 9 can authenticate with windows 2003 server .I have username created in... (0 Replies)
Discussion started by: solaris8in
0 Replies

2. AIX

How to share a directory in AIX to access from Solaris and windows?

Hi All, I am basically new to this forum as well as AIX. To share some huge files between 2 servers I thought of creating a shared Directory in my AIX machine to access it in Solaris. I am very new to this AIX. Help me out how can u share a directory in AIX to access (mount) it on Solaris. Hope... (2 Replies)
Discussion started by: babuchoudary_g
2 Replies

3. SCO

Authentication problems with Active Directory/Samba/Winbind/Pam

Hi all. I'm having real trouble authenticating users against active directory for my SCO UnixWare 7.1.4 box running samba 3.0.24 (installed via Maintenance pack 4). I can list AD users/groups (after overcoming several hiccups) with wbinfo -g / wbinfo -u. I can use id to get a view an ad user ie:... (0 Replies)
Discussion started by: silk600
0 Replies

4. UNIX for Advanced & Expert Users

Compiling Samba from Source on AIX, Active Directory, LDAP, Kerberos

Hello, I asked this question in the AIX subforum but never received an answer, probably because the AIX forum is not that heavily trafficked. Anyway, here it is.. I have never had any issues like this when compiling applications from source. When I try to compile samba-3.5.0pre2, configure runs... (9 Replies)
Discussion started by: raidzero
9 Replies

5. UNIX for Dummies Questions & Answers

control permissions for Active Directory users on AIX

Hello, I've configured an user authentication against Active Directory (Windows Server 2008 R2) on AIX V6 with LDAP. It works fine. And here's my problem: How can I control ldap user permissions on the local AIX machine? E.g. an AD user should be able to write all files of local sys... (1 Reply)
Discussion started by: xia777
1 Replies

6. AIX

Authenticate AIX users from MS Active Directory

First, let me start off saying this is not spam. This is me trying to help out other AIX Admins with MS AD servers. If it is not applicable to you, someone else will find it useful. As long as the "KDC" service is running on your AD server, these steps should work. There should be no... (3 Replies)
Discussion started by: kah00na
3 Replies

7. Solaris

solaris samba configuration without wins service from authentication window server/Active directory

Hi All, We are using solaris samba server for our company project to provide access to code to our development team.Recently our ICT has disabled wins service on Active directory due which user are not able to connect to samba share and they are getting error "No logon server available" as samba... (2 Replies)
Discussion started by: sahil_shine
2 Replies

8. AIX

Samba 3.6.22 on AIX 7.1 with Windows AD (Kerberos and winbind)

Hi all, I have installed samba 3.6.22 on AIX 7.1 and join a windows AD with success. All seem to work fine, I have configured smb.conf, methods.cfg, kerberos, user .... the following command work fine wbinfo -u, wbinfo -g, wbinfo -i, wbinfo -s, wbinfo -S, lsuser, id... The unique... (20 Replies)
Discussion started by: PhilippeA
20 Replies

9. AIX

AIX 7.1 - Samba 4 File Shares and Integration with Active Directory Issues

Hi. Ive recently upgraded Samba on an AIX server to Samba 4. The aim is to allow a specific group of Windows AD users to access some AIX file shares (with no requirement to enter passwords) - using AD to authenticate. Currently I have: Samba 4 installed ( and 3 daemons running) Installed... (1 Reply)
Discussion started by: linuxsnake
1 Replies
WBINFO(1)							   User Commands							 WBINFO(1)

NAME
wbinfo - Query information from winbind daemon SYNOPSIS
wbinfo [-a user%password] [--all-domains] [--allocate-gid] [--allocate-uid] [-D domain] [--domain domain] [-g] [--getdcname domain] [--get-auth-user] [-G gid] [-h] [-i user] [-I ip] [-K user%password] [-m] [-n name] [-N netbios-name] [--own-domain] [-p] [-r user] [-s sid] [--separator] [--sequence] [--set-auth-user user%password] [-S sid] [-t] [-u] [--uid-info uid] [--user-domgroups sid] [--user-sids sid] [-U uid] [-V] [-Y sid] [--verbose] DESCRIPTION
This tool is part of the samba(7) suite. The wbinfo program queries and returns information created and used by the winbindd(1M) daemon. The winbindd(1M) daemon must be configured and running for the wbinfo program to be able to return information. OPTIONS
-a|--authenticate username%password Attempt to authenticate a user via winbindd. This checks both authenticaion methods and reports its results. Note Do not be tempted to use this functionality for authentication in third-party applications. Instead use ntlm_auth(1). --allocate-gid Get a new GID out of idmap --allocate-uid Get a new UID out of idmap --all-domains List all domains (trusted and own domain). --domain name This parameter sets the domain on which any specified operations will performed. If special domain name '.' is used to represent the current domain to which winbindd belongs. Currently only the --sequence, -u, and -g options honor this parameter. -D|--domain-info domain Show most of the info we have about the domain. -g|--domain-groups This option will list all groups available in the Windows NT domain for which the samba(7) daemon is operating in. Groups in all trusted domains will also be listed. Note that this operation does not assign group ids to any groups that have not already been seen by winbindd(1M). --get-auth-user Print username and password used by winbindd during session setup to a domain controller. Username and password can be set using --set-auth-user. Only available for root. --getdcname domain Get the DC name for the specified domain. -G|--gid-to-sid gid Try to convert a UNIX group id to a Windows NT SID. If the gid specified does not refer to one within the idmap gid range then the operation will fail. -i|--user-info user Get user info. -I|--WINS-by-ip ip The -I option queries winbindd(1M) to send a node status request to get the NetBIOS name associated with the IP address specified by the ip parameter. -K|--krb5auth username%password Attempt to authenticate a user via Kerberos. -m|--trusted-domains Produce a list of domains trusted by the Windows NT server winbindd(1M) contacts when resolving names. This list does not include the Windows NT domain the server is a Primary Domain Controller for. -n|--name-to-sid name The -n option queries winbindd(1M) for the SID associated with the name specified. Domain names can be specified before the user name by using the winbind separator character. For example CWDOM1/Administrator refers to the Administrator user in the domain CWDOM1. If no domain is specified then the domain used is the one specified in the smb.conf(4) workgroup parameter. -N|--WINS-by-name name The -N option queries winbindd(1M) to query the WINS server for the IP address associated with the NetBIOS name specified by the name parameter. --own-domain List own domain. -p|--ping Check whether winbindd is still alive. Prints out either 'succeeded' or 'failed'. -r|--user-groups username Try to obtain the list of UNIX group ids to which the user belongs. This only works for users defined on a Domain Controller. -s|--sid-to-name sid Use -s to resolve a SID to a name. This is the inverse of the -n option above. SIDs must be specified as ASCII strings in the traditional Microsoft format. For example, S-1-5-21-1455342024-3071081365-2475485837-500. --separator Get the active winbind separator. --sequence Show sequence numbers of all known domains --set-auth-user username%password Store username and password used by winbindd during session setup to a domain controller. This enables winbindd to operate in a Windows 2000 domain with Restrict Anonymous turned on (a.k.a. Permissions compatible with Windows 2000 servers only). -S|--sid-to-uid sid Convert a SID to a UNIX user id. If the SID does not correspond to a UNIX user mapped by winbindd(1M) then the operation will fail. -t|--check-secret Verify that the workstation trust account created when the Samba server is added to the Windows NT domain is working. -u|--domain-users This option will list all users available in the Windows NT domain for which the winbindd(1M) daemon is operating in. Users in all trusted domains will also be listed. Note that this operation does not assign user ids to any users that have not already been seen by winbindd(1M) --uid-info UID Get user info for the user conencted to user id UID. --user-domgroups SID Get user domain groups. --user-sids SID Get user group SIDs for user. -U|--uid-to-sid uid Try to convert a UNIX user id to a Windows NT SID. If the uid specified does not refer to one within the idmap uid range then the operation will fail. --verbose Print additional information about the query results. -Y|--sid-to-gid sid Convert a SID to a UNIX group id. If the SID does not correspond to a UNIX group mapped by winbindd(1M) then the operation will fail. -V Prints the program version number. -h|--help Print a summary of command line options. EXIT STATUS
The wbinfo program returns 0 if the operation succeeded, or 1 if the operation failed. If the winbindd(1M) daemon is not working wbinfo will always return failure. VERSION
This man page is correct for version 3.0 of the Samba suite. SEE ALSO
winbindd(1M) and ntlm_auth(1) AUTHOR
The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed. wbinfo and winbindd were written by Tim Potter. The conversion to DocBook for Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 was done by Alexander Bokovoy. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +--------------------+----------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +--------------------+----------------------+ |Availability | SUNWsmbar, SUNWsmbau | +--------------------+----------------------+ |Interface Stability | External | +--------------------+----------------------+ NOTES
Source for Samba is available on http://opensolaris.org. Samba(7) delivers the set of four SMF(5) services as can be seen from the following example: $ svcs samba wins winbind swat STATE STIME FMRI disabled Apr_21 svc:/network/samba:default disabled Apr_21 svc:/network/winbind:default disabled Apr_21 svc:/network/wins:default disabled Apr_21 svc:/network/swat:default where the services are: "samba" runs the smbd daemon managing the CIFS sessions "wins" runs the nmbd daemon enabling the browsing (WINS) "winbind" runs the winbindd daemon making the domain idmap "swat" Samba Web Administration Tool is a service providing access to browser-based Samba administration interface and on-line documentation. The service runs on software loopback network interface on port 901/tcp, i.e. opening "http://localhost:901/" in browser will access the SWAT service on local machine. Please note: SWAT uses HTTP Basic Authentication scheme where user name and passwords are sent over the network in clear text. In the SWAT case the user name is root. Transferring such sensitive data is advisable only on the software loopback network interface or over secure networks. Samba 3.0 01/19/2009 WBINFO(1)
All times are GMT -4. The time now is 11:05 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy