Sponsored Content
Operating Systems AIX Samba 3.6 on AIX 7.1 - Windows 10 Access to AIX file shares using Active Directory authentication Post 303040187 by linuxsnake on Thursday 24th of October 2019 03:59:54 PM
Old 10-24-2019
I tried these settings and disabled username map = /home/robot/smbmap in smb.conf but still when I try and access the samba share from Windows it will not allow me access to the directory. Logs look quite clean but no access to any share. It seems to find my windows account in Kerberos, authenticates OK but for some reason doesn't give me access to the share

So I re-enabled the username map and found myself a workaround for the time being.

I am using ldapsearch command to query the Windows Active Directory to extract all users that are a member of a specific Windows AD group and then writing the output after reformatting into /home/robot/smbmap using awk to create the correctly formatted permission file. So it writes in around 50 user accounts who are allowed access into the file. This allows access to the AIX shares fine as all of these users are mapped to the AIX root user account. Ill set it as a cron job to run once a week or month.

But frustrating that I have to do it this way. Ill see if I can post on the IBM forum as well. Thanks
 

9 More Discussions You Might Find Interesting

1. Linux

How to Unite Redhat 9 Linux with Windows 2003 Active Directory authentication

Dear All, How to configure a Redhat 9 client to windows 2003 server. I have windows 2003 server which act has domain controller in my office. I have been asked to use redhat 9 has client. how to configure so that redhat 9 can authenticate with windows 2003 server .I have username created in... (0 Replies)
Discussion started by: solaris8in
0 Replies

2. AIX

How to share a directory in AIX to access from Solaris and windows?

Hi All, I am basically new to this forum as well as AIX. To share some huge files between 2 servers I thought of creating a shared Directory in my AIX machine to access it in Solaris. I am very new to this AIX. Help me out how can u share a directory in AIX to access (mount) it on Solaris. Hope... (2 Replies)
Discussion started by: babuchoudary_g
2 Replies

3. SCO

Authentication problems with Active Directory/Samba/Winbind/Pam

Hi all. I'm having real trouble authenticating users against active directory for my SCO UnixWare 7.1.4 box running samba 3.0.24 (installed via Maintenance pack 4). I can list AD users/groups (after overcoming several hiccups) with wbinfo -g / wbinfo -u. I can use id to get a view an ad user ie:... (0 Replies)
Discussion started by: silk600
0 Replies

4. UNIX for Advanced & Expert Users

Compiling Samba from Source on AIX, Active Directory, LDAP, Kerberos

Hello, I asked this question in the AIX subforum but never received an answer, probably because the AIX forum is not that heavily trafficked. Anyway, here it is.. I have never had any issues like this when compiling applications from source. When I try to compile samba-3.5.0pre2, configure runs... (9 Replies)
Discussion started by: raidzero
9 Replies

5. UNIX for Dummies Questions & Answers

control permissions for Active Directory users on AIX

Hello, I've configured an user authentication against Active Directory (Windows Server 2008 R2) on AIX V6 with LDAP. It works fine. And here's my problem: How can I control ldap user permissions on the local AIX machine? E.g. an AD user should be able to write all files of local sys... (1 Reply)
Discussion started by: xia777
1 Replies

6. AIX

Authenticate AIX users from MS Active Directory

First, let me start off saying this is not spam. This is me trying to help out other AIX Admins with MS AD servers. If it is not applicable to you, someone else will find it useful. As long as the "KDC" service is running on your AD server, these steps should work. There should be no... (3 Replies)
Discussion started by: kah00na
3 Replies

7. Solaris

solaris samba configuration without wins service from authentication window server/Active directory

Hi All, We are using solaris samba server for our company project to provide access to code to our development team.Recently our ICT has disabled wins service on Active directory due which user are not able to connect to samba share and they are getting error "No logon server available" as samba... (2 Replies)
Discussion started by: sahil_shine
2 Replies

8. AIX

Samba 3.6.22 on AIX 7.1 with Windows AD (Kerberos and winbind)

Hi all, I have installed samba 3.6.22 on AIX 7.1 and join a windows AD with success. All seem to work fine, I have configured smb.conf, methods.cfg, kerberos, user .... the following command work fine wbinfo -u, wbinfo -g, wbinfo -i, wbinfo -s, wbinfo -S, lsuser, id... The unique... (20 Replies)
Discussion started by: PhilippeA
20 Replies

9. AIX

AIX 7.1 - Samba 4 File Shares and Integration with Active Directory Issues

Hi. Ive recently upgraded Samba on an AIX server to Samba 4. The aim is to allow a specific group of Windows AD users to access some AIX file shares (with no requirement to enter passwords) - using AD to authenticate. Currently I have: Samba 4 installed ( and 3 daemons running) Installed... (1 Reply)
Discussion started by: linuxsnake
1 Replies
smbadm(1M)						  System Administration Commands						smbadm(1M)

NAME
smbadm - configure and manage CIFS local groups and users, and manage domain membership SYNOPSIS
smbadm add-member -m member [[-m member] ...] group smbadm create [-d description] group smbadm delete group smbadm disable-user username smbadm enable-user username smbadm get [[-p property] ...] group smbadm join -u username domain smbadm join -w workgroup smbadm list smbadm remove-member -m member [[-m member] ...] group smbadm rename group new-group smbadm set -p property=value [[-p property=value] ...] group smbadm show [-m] [-p] [group] DESCRIPTION
The smbadm command is used to configure CIFS local groups and to manage domain membership. You can also use the smbadm command to enable or disable SMB password generation for individual local users. CIFS local groups can be used when Windows accounts must be members of some local groups and when Windows style privileges must be granted. Solaris local groups cannot provide these functions. There are two types of local groups: user defined and built-in. Built-in local groups are predefined local groups to support common admin- istration tasks. In order to provide proper identity mapping between CIFS local groups and Solaris groups, a CIFS local group must have a corresponding Solaris group. This requirement has two consequences: first, the group name must conform to the intersection of the Windows and Solaris group name rules. Thus, a CIFS local group name can be up to eight(8) characters long and contain only lowercase characters and numbers. Second, a Solaris local group has to be created before a CIFS local group can be created. Built-in groups are standard Windows groups and are predefined by the CIFS service. The built-in groups cannot be added, removed, or renamed, and these groups do not follow the CIFS local group naming conventions. When the CIFS server is started, the following built-in groups are available: Administrators Group members can administer the system. Backup Operators Group members can bypass file access controls to back up and restore files. Power Users Group members can share directories. Solaris local users must have an SMB password for authentication and to gain access to CIFS resources. This password is created by using the passwd(1) command when the pam_smb_password module is added to the system's PAM configuration. See the pam_smb_passwd(5) man page. The disable-user and enable-user subcommands control SMB password-generation for a specified local user. When disabled, the user is pre- vented from connecting to the Solaris CIFS service. By default, SMB password-generation is enabled for all local users. To reenable a disabled user, you must use the enable-user subcommand and then reset the user's password by using the passwd command. The pam_smb_passwd.so.1 module must be added to the system's PAM configuration to generate an SMB password. Escaping Backslash Character For the add-member, remove-member, and join (with -u) subcommands, the backslash character () is a valid separator between member or user names and domain names. The backslash character is a shell special character and must be quoted. For example, you might escape the back- slash character with another backslash character: domain\username. For more information about handling shell special characters, see the man page for your shell. OPERANDS
The smbadm command uses the following operands: domain Specifies the name of an existing Windows domain to join. group Specifies the name of the CIFS local group. username Specifies the name of a Solaris local user. SUB-COMMANDS The smbadm command includes these subcommands: add-member -m member [[-m member] ...] group Adds the specified member to the specified CIFS local group. The -m member option specifies the name of a CIFS local group member. The member name must include an existing user name and an optional domain name. Specify the member name in either of the following formats: [domain]username [domain/]username For example, a valid member name might be sales erry or sales/terry, where sales is the Windows domain name and terry is the name of a user in the sales domain. create [-d description] group Creates a CIFS local group with the specified name. You can optionally specify a description of the group by using the -d option. delete group Deletes the specified CIFS local group. The built-in groups cannot be deleted. disable username Disables SMB password-generation capabilities for the specified local user. A disabled local user is prevented from accessing the sys- tem by means of the CIFS service. When a local user account is disabled, you cannot use the passwd command to modify the user's SMB password until the user account is reenabled. enable username Enables SMB password-generation capabilities for the specified local user. After the password-generation capabilities are reenabled, you must use the passwd command to generate the SMB password for the local user before he can connect to the CIFS service. The passwd command manages both the Solaris password and SMB password for this user if the pam_smb_passwd module has been added to the system's PAM configuration. get [[-p property=value] ...] group Retrieves property values for the specified group. If no property is specified, all property values are shown. join -u username domain Joins a Windows domain or a workgroup. The default mode for the CIFS service is workgroup mode, which uses the default workgroup name, WORKGROUP. An authenticated user account is required to join a domain, so you must specify the Windows administrative user name with the -u option. If the password is not specified on the command line, the user is prompted for it. This user should be the domain administrator or any user who has administrative privileges for the target domain. username and domain can be entered in any of the following formats: username[+password] domain domainusername[+password] domain/username[+password] username@domain ...where domain can be the NetBIOS or DNS domain name. If a machine trust account for the system already exists on a domain controller, any authenticated user account can be used when join- ing the domain. However, if the machine trust account does not already exist, an account that has administrative privileges on the domain is required to join the domain. join -w workgroup Joins a Windows domain or a workgroup. The -w workgroup option specifies the name of the workgroup to join when using the join subcommand. list Shows information about the current workgroup or domain. The information typically includes the workgroup name or the primary domain name. When in domain mode, the information includes domain controller names and trusted domain names. Each entry in the ouput is identified by one of the following tags: - [*] - Primary domain - [.] - Local domain - [-] - Other domains - [+] - Selected domain controller remove-member -m member [[-m member] ...] group Removes the specified member from the specified CIFS local group. The -m member option specifies the name of a CIFS local group member. The member name must include an existing user name and an optional domain name. Specify the member name in either of the following formats: [domain]username [domain/]username For example, a valid member name might be sales erry or sales/terry, where sales is the Windows domain name and terry is the name of a user in the sales domain. rename group new-group Renames the specified CIFS local group. The group must already exist. The built-in groups cannot be renamed. set -p property=value [[-p property=value] ...] group Sets configuration properties for a CIFS local group. The description and the privileges for the built-in groups cannot be changed. The -p property=value option specifies the list of properties to be set on the specified group. The group-related properties are as follows: backup=[on|off] Specifies whether members of the CIFS local group can bypass file access controls to back up file system objects. description=description-text Specifies a text description for the CIFS local group. restore=[on|off] Specifies whether members of the CIFS local group can bypass file access controls to restore file system objects. take-ownership=[on|off] Specifies whether members of the CIFS local group can take ownership of file system objects. show [-m] [-p] [group] Shows information about the specified CIFS local group or groups. If no group is specified, information is shown for all groups. If the -m option is specified, the group members are also shown. If the -p option is specified, the group privileges are also shown. EXIT STATUS
The following exit values are returned: 0 Successful completion. >0 An error occurred. ATTRIBUTES
See the attributes(5) man page for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWsmbsu | +-----------------------------+-----------------------------+ |Utility Name and Options |Uncommitted | +-----------------------------+-----------------------------+ |Utility Output Format |Not-An-Interface | +-----------------------------+-----------------------------+ |smbadm join |Obsolete | +-----------------------------+-----------------------------+ SEE ALSO
passwd(1), groupadd(1M), idmap(1M), idmapd(1M), kclient(1M), share(1M), sharectl(1M), sharemgr(1M), smbd(1M), smbstat(1M), smb(4), smbauto- home(4), attributes(5), pam_smb_passwd(5), smf(5) SunOS 5.11 8 Jan 2009 smbadm(1M)
All times are GMT -4. The time now is 06:39 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy