Hi. Ive recently upgraded Samba on an AIX server to Samba 4. The aim is to allow a specific group of Windows AD users to access some AIX file shares (with no requirement to enter passwords) - using AD to authenticate.
Currently I have:
Samba 4 installed ( and 3 daemons running)
Installed... (1 Reply)
Could you please let me know, how to install and configure samba as domain controller like Active Directory (AD Server in Windows Server)?
And how to configure the Window clients and Linux clients through Samba AD Domain Controller.
Note: OS is Ubuntu or CentOS. (8 Replies)
The situation: i have a AD server with samba4,all clients
ssh-kerberos works fine,except hpux :p wich works
only for few days..then i must re-export(sic!) the keys with
samba-tool domain exportkeytab 11.keytab --principal=host/hpux.fqdn
Why after few days ssh return error "server not found... (1 Reply)
Hi All, We are using solaris samba server for our company project to provide access to code to our development team.Recently our ICT has disabled wins service on Active directory due which user are not able to connect to samba share and they are getting error "No logon server available" as samba... (2 Replies)
Hello, I asked this question in the AIX subforum but never received an answer, probably because the AIX forum is not that heavily trafficked. Anyway, here it is..
I have never had any issues like this when compiling applications from source. When I try to compile samba-3.5.0pre2, configure runs... (9 Replies)
Hi all.
I'm having real trouble authenticating users against active directory for my SCO UnixWare 7.1.4 box running samba 3.0.24 (installed via Maintenance pack 4). I can list AD users/groups (after overcoming several hiccups) with wbinfo -g / wbinfo -u. I can use id to get a view an ad user ie:... (0 Replies)
KRB5-SYNC(8) krb5-sync KRB5-SYNC(8)NAME
krb5-sync - Synchronize passwords and status with Active Directory
SYNOPSIS
krb5-sync [-d | -e] [-p password] user
krb5-sync -f file
DESCRIPTION
krb5-sync provides a command-line interface to the same functions provided by the password and status synchronization plugin. It can push
a new password to Active Directory (actually, to any password store that supports the Kerberos set-password protocol) or activate or
deactivate an account in Active Directory.
To synchronize passwords, provide the -p option and specify the password. Note that the password is given on the command line and must be
quoted if it contains special characters, and the password will be exposed to any other users on the system where this command is run.
This is useful primarily for testing and should not be used with production passwords. Synchronization to Active Directory will be
attempted based on the configuration in krb5.conf (see below).
To enable or disable an account, provide the -e or -d option respectively. These options can also be provided in conjunction with the -p
option to take both actions at once.
In either case, user should be the principal name for which these actions should be taken. user may be either unqualified or in the local
realm; either way, the Active Directory realm in which to make changes will be taken from the krb5.conf configuration.
Alternately, krb5-sync also supports processing actions from a file. To do this, use the -f flag and give the file on the command line.
The format of the file should be as follows:
<account>
ad
password | enable | disable
<password>
where the fourth line is present only if the <action> is "password". <account> should be the unqualified name of the account. The second
line should be the string "ad" to push the change to Windows Active Directory. The third line should be one of "password", "enable", or
"disable", corresponding to the -p, -e, and -d options respectively. The "enable" and "disable" actions are only supported for AD.
The file format is not particularly forgiving. In particular, all of the keywords are case-sensitive and there must not be any whitespace
at the beginning or end of the lines (except in the password, and only if that whitespace is part of the password), just a single newline
terminating each line.
When the -f option is given, the file will be deleted if the action was successful but left alone if the action failed.
The configuration block in krb5.conf should look something like this:
krb5-sync = {
ad_keytab = /etc/krb5kdc/ad-keytab
ad_principal = service/sync@WINDOWS.EXAMPLE.COM
ad_realm = WINDOWS.EXAMPLE.COM
ad_admin_server = dc1.windows.example.com
ad_ldap_base = ou=People
}
If the configuration required for an action is not given, that action will not be performed but will apparently succeed from the
perspective of the krb5-sync utility. Therefore, if this utility reports success but no change is happening, double-check the
configuration to ensure that all required options are present.
The "ad_keytab" option specifies the location of a keytab for authenticating to the other realm, the "ad_principal" option specifies the
principal to authenticate as (using the key in the keytab), and the "ad_realm" option specifies the foreign realm. "ad_admin_server" is
the host to contact via LDAP to push account status changes. "ad_ldap_base" specifies the base tree inside Active Directory where account
information is stored. Omit the trailing "dc=" part; it will be added automatically from "ad_realm".
OPTIONS -d Disable the specified user in Active Directory. Requires that all of the ad_* options be set in krb5.conf. This option may not be
specified at the same time as -e.
-e Enable the specified user in Active Directory. Requires that all of the ad_* options be set in krb5.conf. This option may not be
specified at the same time as -e.
-f file
Rather than perform a particular action based on a username given on the command line, read a queue file and take action based on it.
The format of the queue file is described above. If the action fails, the file will be left alone. If the action succeeds, the file
will be deleted.
-p password
Change the user's password to password in Active Directory.
EXAMPLES
Disable the account "jdoe" in Active Directory (using the AD configuration found in krb5.conf):
krb5-sync -d jdoe
Change the password of the account "testuser" in Active Directory to "changeme":
krb5-sync -p changeme testuser@EXAMPLE.COM
The same, except also enable the account in Active Directory:
krb5-sync -e -p changeme testuser
Note that the realm for the user given on the command line is optional and ignored.
Given a file named jdoe-ad-1168560492 containing:
jdoe
ad
password
changeme
the command:
krb5-sync -f jdoe-ad-1168560492
will change jdoe's password to "changeme" in Active Directory and then delete the file.
SEE ALSO
The current version of this program is available from its web page at http://www.eyrie.org/~eagle/software/krb5-sync/
<http://www.eyrie.org/~eagle/software/krb5-sync/>.
AUTHOR
Russ Allbery <rra@stanford.edu>
2.2 2012-01-10 KRB5-SYNC(8)