On Mon, Jul 16, 2012 at 2:45 PM, Musayev, Ilya <imusa...@webmd.net> wrote:
> Antoine,
> Thanks for the detailed feedback. I missed your response for second.
> I was thinking of using Unix Services for Windows – but we need to automate
> the GID and UID assignment, and convert existing user to use new setup.

Define "automate the GID/UID assignment"?

This is a common issue to having both Windows clients/services and
IETF/POSIX (UNIX/Linux) clients/services.

I.e.,
- NTuser schema for Windows
- IETF RFC2307 (among others) for IETF/POSIX (UNIX/Linux)

Understand when Microsoft adopted Michigan LDAP for AD, they decided
to pull the existing SAM (Workgroup = local registry, Domain = local
registry of the PDC, later first DC in AD, that became "network
wide").  This is commonly referred to as NTuser schema, NTDOM, etc...
It is utterly different, along with other AD schema, from IETF/POSIX
standards/attributes and related objects.

Now you can install IETF RFC2307 schema on Windows c/o NT5
(2000/XP/2003) Services for UNIX (SFU), now NT6 (Vista/7/2008/8/2012)
Subsystem for UNIX Applications (SUA).  Even 2003R2 and later make it
easy to integrate, with some caveats.  But that still doesn't remove
the requirement that someone actually _manage_ the IETF RFC2307.  If
your Windows team doesn't have someone who understand that reality,
then no "client side" solution is going to solve that alone.

So that's why I ask, what do you mean by "automated"?  Especially in
the context, "convert existing user to use new setup."  A lot of times
this means a schema change to add IETF RFC2307, and Windows admins get
that "deer in headlights" and often bark back, "the UNIX guys just
need to use Samba and not bother us."

[ Professional Note:  If I had a dollar for every time some AD
architect said "you UNIX people just need to learn Samba," I'd be a
millionaire.  At the same time, having more, current Microsoft
certifications and Samba publication credits has helped establish some
authority when I'm faced with such attitudes. ]

A lot of people look to Centrify or Likewise solutions, because it
often runs on and modifies the DCs, if not the schema (depending on
the product or solution), and helps Windows admins manage them.  But
you can do so without those solutions as well.  Otherwise you have to
set up Winbindd with exactly mappings on each and every IETF/POSIX
(UNIX/Linux) system -- assuming it has a PAM or other pluggable system
that works with Winbindd in the first place.  That means pushing down
the same configuration files, plus hoping the Windows admins don't
break things.

I.e., maintaining consistency at the end UNIX/Linux systems, instead
of AD, because UNIX/Linux doesn't use NT-only SAM/SID information,
etc...  ;)

Or you can do what a lot of Enterprises were doing for AD, and kept
doing after AD.  They have their enterprise managed by LDAP, and then
they selectively synchronize to/from AD, and other LDAP trees.  The
Windows attributes/objects are managed in AD trees, the IETF/POSIX
objects managed in LDAP trees.  This is not cake, and it takes
architecture and planning.

Which is where Identity, Policy, Audit (IPA) aka Red Hat Enterprise
Identity Management (IdM) come in.  It is designed to be the "canned"
IETF/POSIX (UNIX/Linux) complement to AD.  At the same time, because
it's still IETF LDAP and MIT Kerberos underneath, it can work with
legacy systems too (unlike AD).  And it's designed for basic
synchronization to AD, passwords in 2.x, transitive trusts in 3.x (3.0
just hit Beta earlier this month).  RHEL 6.2 IdM is IPA 2.1, RHEL 6.3
IdM is IPA 2.2.

Again, for most UNIX/Linux departments, it's often just much easier to
maintain your own trees, because the Windows folk just don't get the
difference between NTuser and IETF schema.  They don't understand why
they have to assign UNIX home directory paths and other attributes,
and don't want to.  That's why most have separate trees, because the
AD admins don't want to be bothered.  Password synchronization is
easy, and has been going around for the past decade.  And select
attribute/object exchange is not impossible to setup as well.

IPA 3.x is taking it a step further so UNIX/Linux systems in an IPA
MIT Kerberos realm can use resources in AD trees, and Windows systems
in an AD MS Kerberos domain can access those under IPA trees.  It's
never going to be perfect.  I mean, Integrated Windows Authentication
(IWA), NTLMv2 and other aspects of federated services may not be
completely transparent, but it's going to get much better with IPA
3.x.  The only thing the AD/Windows admins will really need to be
bothered with is a login so you can register/bind to the AD domain.

Because most AD/Windows admins don't know the first thing why IETF
RFC2307 exists, and they don't want to be bothered with it.


--
Bryan J Smith - Professional, Technical Annoyance
http://www.linkedin.com/in/bjsmith

_______________________________________________
rhelv5-list mailing list
rhelv5-list@redhat.com
https://www.redhat.com/mailman/listinfo/rhelv5-list

Reply via email to