10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi,
I would like to configure samba with PEM (with LDAP). I've already found, on the server, configured the PAM Authentication(with LDAP) for ssh. I wanted to know if it was possible to configure PAM for to authenticate to another LDAP only for SAMBA.
Is possibile duplicate the... (2 Replies)
Discussion started by: mark888
2 Replies
2. Proxy Server
Hi guys. First, sorry for my english, I´m tried to write the best form but sure I´m not do it.
I´m tried to configure the native ldap client on Solaris 10 but yet dosen't work. May be the problem is in the pam.conf or something like that.
This is the line I was applied to configure the... (7 Replies)
Discussion started by: sultano
7 Replies
3. Emergency UNIX and Linux Support
Hi all
We have squid-2.5.STABLE11-3.FC4 running in our environment.
LDAP authentication works fine. Active Directory 2003 Users are prompted to enter credentials every time they access the net. The system works perfectly, but I need to configure Squid to block users in a specific AD group.... (1 Reply)
Discussion started by: wbdevilliers
1 Replies
4. Solaris
My environmnet : solaris 10 u 7 sparc
To configure DNS bind use Ldap as zone record database, I use bind 9.7.0 and sun directory 5.2
I do follow http://imil.net/docs/Configuring_DNS_zones_with_LDAP.txt
and stuck at make install
Error from bind log "database: error: unsupported database... (0 Replies)
Discussion started by: tien86
0 Replies
5. UNIX for Advanced & Expert Users
Hello, I asked this question in the AIX subforum but never received an answer, probably because the AIX forum is not that heavily trafficked. Anyway, here it is..
I have never had any issues like this when compiling applications from source. When I try to compile samba-3.5.0pre2, configure runs... (9 Replies)
Discussion started by: raidzero
9 Replies
6. Debian
Hi everybody,
I run a Debian samba-ldap server. Every thing works fine, but the only problem i have is
this error in my samba logs:
groupdb/mapping.c:pdb_create_builtin_alias(802)
pdb_create_builtin_alias: Could not add group mapping entry for alias 544 (NT_STATUS_GROUP_EXISTS)
... (0 Replies)
Discussion started by: magge
0 Replies
7. UNIX for Advanced & Expert Users
I'm having troubles setting up a client(with Ubuntu 8.10) for a ldap+samba server. I can't authenticate through the client with gdm, the messages I have in /etc/auth.log at the client is
Dec 4 14:21:56 myuser-mydesktop gdm: nss_ldap: failed to bind to LDAP server ldap://192.168.0.1: Invalid... (5 Replies)
Discussion started by: capibolso
5 Replies
8. HP-UX
Hello All,
I am a newbee in HP UX wanted to know how to configure DNS,NFS,NIS,LDAP and LVM(mirror,sparing and multipathing) in HP UX 11iv2 and v3 and i did go through some of the docs on hp.com but i think those are for experience UX users and i am new to this so if some one could just mention... (1 Reply)
Discussion started by: coolsami
1 Replies
9. IP Networking
Well, that's my question, I'm looking for a tutorial or something to start & work with samba, any help would be much appericiated. (1 Reply)
Discussion started by: AshkanAlmaspour
1 Replies
10. Cybersecurity
Hello
I am able to connect from Linux machine to Windows machine, but i can not connect from Windows to Linux. Even i can print also from linux to windows... what could be the problem... pl help.
thanks (5 Replies)
Discussion started by: twadkar
5 Replies
IDMAP_RFC2307(8) System Administration tools IDMAP_RFC2307(8)
NAME
idmap_rfc2307 - Samba's idmap_rfc2307 Backend for Winbind
DESCRIPTION
The idmap_rfc2307 plugin provides a way for winbind to read id mappings from records in an LDAP server as defined in RFC 2307. The LDAP
server can be stand-alone or the LDAP server provided by the AD server. An AD server is always required to provide the mapping between name
and SID, and the LDAP server is queried for the mapping between name and uid/gid. This module implements only the "idmap" API, and is
READONLY.
Mappings must be provided in advance by the administrator by creating the user accounts in the Active Directory server and the posixAccount
and posixGroup objects in the LDAP server. The names in the Active Directory server and in the LDAP server have to be the same.
This id mapping approach allows the reuse of existing LDAP authentication servers that store records in the RFC 2307 format.
IDMAP OPTIONS
range = low - high
Defines the available matching UID and GID range for which the backend is authoritative. Note that the range acts as a filter. If
specified any UID or GID stored in AD that fall outside the range is ignored and the corresponding map is discarded. It is intended as
a way to avoid accidental UID/GID overlaps between local and remotely defined IDs.
ldap_server = <ad | stand-alone >
Defines the type of LDAP server to use. This can either be the LDAP server provided by the Active Directory server (ad) or a
stand-alone LDAP server.
bind_path_user
Specifies the bind path where user objects can be found in the LDAP server.
bind_path_group
Specifies the bind path where group objects can be found in the LDAP server.
user_cn = <yes | no>
Query cn attribute instead of uid attribute for the user name in LDAP. This option is not required, the default is no.
cn_realm = <yes | no>
Append @realm to cn for groups (and users if user_cn is set) in LDAP. This option is not required, the default is no.
ldap_domain
When using the LDAP server in the Active Directory server, this allows to specify the domain where to access the Active Directory
server. This allows using trust relationships while keeping all RFC 2307 records in one place. This parameter is optional, the default
is to access the AD server in the current domain to query LDAP records.
ldap_url
When using a stand-alone LDAP server, this parameter specifies the ldap URL for accessing the LDAP server.
ldap_user_dn
Defines the user DN to be used for authentication. The secret for authenticating this user should be stored with net idmap secret (see
net(8)). If absent, an anonymous bind will be performed.
ldap_realm
Defines the realm to use in the user and group names. This is only required when using cn_realm together with a stand-alone ldap
server.
EXAMPLES
The following example shows how to retrieve id mappings from a stand-alone LDAP server. This example also shows how to leave a small non
conflicting range for local id allocation that may be used in internal backends like BUILTIN.
[global]
idmap config * : backend = tdb
idmap config * : range = 1000000-1999999
idmap config DOMAIN : backend = rfc2307
idmap config DOMAIN : range = 2000000-2999999
idmap config DOMAIN : ldap_server = stand-alone
idmap config DOMAIN : ldap_url = ldap://ldap1.example.com
idmap config DOMAIN : ldap_user_dn = cn=ldapmanager,dc=example,dc=com
idmap config DOMAIN : bind_path_user = ou=People,dc=example,dc=com
idmap config DOMAIN : bind_path_group = ou=Group,dc=example,dc=com
AUTHOR
The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open
Source project similar to the way the Linux kernel is developed.
Samba 4.0 06/17/2014 IDMAP_RFC2307(8)