Sponsored Content
Full Discussion: Domain Administrator
Operating Systems Linux Domain Administrator Post 39783 by sstevens on Saturday 30th of August 2003 12:53:54 PM
Old 08-30-2003
Domain Administrator

I used to have a Cobalt RaQ4 server that allows the server administrator to set up site administrators for each domain. The site administrators can add more users to that domain, and he can also write files to the users' directories.

I now have a RedHat 9.0 box running Linux 2.4.20 with Apache 2.0. I'd like to be able to do the same site administrative things on this server.

I logged on to both servers via SSH and did
Code:
ls -al

The Cobalt told me the users directory and all the users inside have the permissions 2775 (drwxrwsr-x). After making my users directory on the RH have the same permissions, I was able to write files to the users directories! Woohoo!

So now my question is, how do I set up Apache to create user directories with these permissions by default so that I don't have to go through the entire server and change each directory, and manually change each user we add to each domain.

Sorry this post is so long, I just want to give you as much info as possible so you know exactly what is going on. If it helps, I'm using Plesk 6 to manage the domains and users.

Thanks!

Last edited by sstevens; 08-30-2003 at 02:17 PM..
 

7 More Discussions You Might Find Interesting

1. AIX

Auditing User administrator

Background: I a trying to audit user administration on a AIX box. I am trying to make sure that any changes made by the System administrator to the user accounts (Add users, changing their attributes or deleting users) are accompanied by authorization i.e. the system admin does not make any... (0 Replies)
Discussion started by: gladiator
0 Replies

2. AIX

Administrator responsibilities

HELLOW ALL Can any one tell me what are the Requirements for any system administrator to be a system administrators (After taking all the courses for IBM or the the track that requires only during your job). (1 Reply)
Discussion started by: magasem
1 Replies

3. What is on Your Mind?

I want to become a System Administrator

Has anyone got any advice on how I can get a job as a Unix/Solaris system administrator? My current job is supporting an application that runs on Solaris servers. I have very minimal Solaris/Unix skills but would like to expand on them with the aim of getting a junior sys admin role. I have... (4 Replies)
Discussion started by: Sepia
4 Replies

4. What is on Your Mind?

Unix Administrator and Linux Administrator transition

Hello Unix Experts, I'm going to be graduating with a CIS (Computer Information Systems) degree in the coming year. I have been offered an internship with a job title of Unix Administrator under a well known company. I understand that Unix is used for high-end servers in many large... (1 Reply)
Discussion started by: brentmd24
1 Replies

5. Windows & DOS: Issues & Discussions

How to: Linux BOX in Windows Domain (w/out joining the domain)

Dear Expert, i have linux box that is running in the windows domain, BUT did not being a member of the domain. as I am not the System Administrator so I have no control on the server in the network, such as modify dns entry , add the linux box in AD and domain record and so on that relevant. ... (2 Replies)
Discussion started by: regmaster
2 Replies

6. What is on Your Mind?

Know your System Administrator

Couldn't resist: www.gnu.org/fun/jokes/know.your.sysadmin.html (1 Reply)
Discussion started by: radoulov
1 Replies

7. Red Hat

RedHat administrator certification

Hi All, I want to get certified as RedHat administrator and i though why not to use this wonderfull forum to ask this question. Can someone please let me know some good institues in 'Mumbai' from where i can take RedHat courses and get certified. Also it will be of great help if i can get... (0 Replies)
Discussion started by: omkar.jadhav
0 Replies
ipa-adtrust-install(1)						 IPA Manual Pages					    ipa-adtrust-install(1)

NAME
ipa-adtrust-install - Prepare an IPA server to be able to establish trust relationships with AD domains SYNOPSIS
ipa-adtrust-install [OPTION]... DESCRIPTION
Adds all necessary objects and configuration to allow an IPA server to create a trust to an Active Directory domain. This requires that the IPA server is already installed and configured. Please note you will not be able to estabilish an trust to an Active Directory domain unless the realm name of the IPA server matches its domain name. ipa-adtrust-install can be run multiple times to reinstall deleted objects or broken configuration files. E.g. a fresh samba configuration (smb.conf file and registry based configuration can be created. Other items like e.g. the configuration of the local range cannot be changed by running ipa-adtrust-install a second time because with changes here other objects might be affected as well. OPTIONS
-d, --debug Enable debug logging when more verbose output is needed --ip-address=IP_ADDRESS The IP address of the IPA server. If not provided then this is determined based on the hostname of the server. --netbios-name=NETBIOS_NAME The NetBIOS name for the IPA domain. If not provided then this is determined based on the leading component of the DNS domain name. Running ipa-adtrust-install for a second time with a different NetBIOS name will change the name. Please note that changing the Net- BIOS name might break existing trust relationships to other domains. --no-msdcs Do not create DNS service records for Windows in managed DNS server. Since those DNS service records are the only way to discover domain controllers of other domains they must be added manually to a different DNS server to allow trust realationships work prop- erly. All needed service records are listed when ipa-adtrust-install finishes and either --no-msdcs was given or no IPA DNS service is configured. Typically service records for the following service names are needed for the IPA domain which should point to all IPA servers: o _ldap._tcp o _kerberos._tcp o _kerberos._udp o _ldap._tcp.dc._msdcs o _kerberos._tcp.dc._msdcs o _kerberos._udp.dc._msdcs o _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs o _kerberos._tcp.Default-First-Site-Name._sites.dc._msdcs o _kerberos._udp.Default-First-Site-Name._sites.dc._msdcs --add-sids Add SIDs to existing users and groups as a final step of the ipa-adtrust-install run. If there a many existing users and groups and a couple of replicas in the environment this operation might lead to a high replication traffic and a performance degradation of all IPA servers in the environment. To avoid this the SID generation can be run after ipa-adtrust-install is run and scheduled indepen- dently. To start this task you have to load an edited version of ipa-sidgen-task-run.ldif with the ldapmodify command info the directory server. -U, --unattended An unattended installation that will never prompt for user input -U, --rid-base=RID_BASE First RID value of the local domain. The first Posix ID of the local domain will be assigned to this RID, the second to RID+1 etc. See the online help of the idrange CLI for details. -U, --secondary-rid-base=SECONDARY_RID_BASE Start value of the secondary RID range, which is only used in the case a user and a group share numerically the same Posix ID. See the online help of the idrange CLI for details. -A, --admin-name=ADMIN_NAME The name of the user with administrative privileges for this IPA server. Defaults to 'admin'. -a, --admin-password=password The password of the user with administrative privileges for this IPA server. Will be asked interactively if -U is not specified. The credentials of the admin user will be used to obtain Kerberos ticket before configuring cross-realm trusts support and afterwards, to ensure that the ticket contains MS-PAC information required to actually add a trust with Active Directory domain via 'ipa trust-add --type=ad' command. --enable-compat Enables support for trusted domains users for old clients through Schema Compatibility plugin. SSSD supports trusted domains natively starting with version 1.9. For platforms that lack SSSD or run older SSSD version one needs to use this option. When enabled, slapi-nis package needs to be installed and schema-compat-plugin will be configured to provide lookup of users and groups from trusted domains via SSSD on IPA server. These users and groups will be available under cn=users,cn=compat,$SUFFIX and cn=groups,cn=compat,$SUFFIX trees. SSSD will normalize names of users and groups to lower case. In addition to providing these users and groups through the compat tree, this option enables authentication over LDAP for trusted domain users with DN under compat tree, i.e. using bind DN uid=administrator@ad.domain,cn=users,cn=compat,$SUFFIX. LDAP authentication performed by the compat tree is done via PAM 'system-auth' service. This service exists by default on Linux systems and is provided by pam package as /etc/pam.d/system-auth. If your IPA install does not have default HBAC rule 'allow_all' enabled, then make sure to define in IPA special service called 'system-auth' and create an HBAC rule to allow access to anyone to this rule on IPA masters. As 'system-auth' PAM service is not used directly by any other application, it is safe to use it for trusted domain users via com- patibility path. EXIT STATUS 0 if the installation was successful 1 if an error occurred IPA
Aug 23 2011 ipa-adtrust-install(1)
All times are GMT -4. The time now is 10:08 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy