Hi Jordan,

Jordan Brown wrote:
Sorry, I didn't connect the dots between this message and your previous one, and hadn't realized you were the guy with the "split" environment.

I appologize also. I didn't see your reply to my original post due to a mail filter. Oops. After I read your response today, I searched more on the website and I saw you had replied there too. I was actually typing in a reply to that when I saw this message. I think I'll try to put everything in here, so we can end the split thread.

This new thread was posted after reading more through the documentation, and I thought I might ask more pointed questions.

Kyle McDonald wrote:
Jordan Brown wrote:
If you can guarantee that for all users and groups the UNIX and AD names are the same (or that there is no corresponding user/group on the other side), you can configure Directory based name mapping to use one of the standard AD attributes, probably sAMAccountName. sAMAccountName is what the user interface calls the "Pre-Windows 2000 Logon Name".

That's the rub. At the moment the IT run AD database (Win2003R2 with the integrates SFU schema) has them all the same, but their advice is not to assume they always will though.

If it were me, I'd make it a rule that the names have to be the same in the two environments. It'll make life much easier for everybody, and it sounds like you don't have a legacy of misalignment that you must live with.

I know. And I think that's the plan, but I don't think they want to box themselves in. So given that they're willing to always put both usernames (and all the UNIX info) into the AD directory, I think that's the next best thing.
I'm just not sure how where I need to configure the mess of domain/realm names.

DNS for xyz.COM and CORP.xyz.COM is run by the IT dept, and served by the W2k3R2 AD servers. From there they have delegated DNS responsibilities to me for eng.xyz.COM, and lab.xyz.COM. All the Windows client machines are in the CORP.xyz.Domain and all the users login as CORP\username.

So is the right AD domain CORP.xyx.COM? or xyz.COM?
Ditto for the Kerberos realm?

Sorry, I didn't connect the dots between this message and your previous one, and hadn't realized you were the guy with the "split" environment.

I am not completely sure, but I think you want to do something along these lines:

- Add eng.xyz.com and lab.xyz.com as new domains in the same forest as corp.xyz.com. (You might make them all subdomains of xyz.com, but I don't think it's required.) - Have your Solaris system join whatever domain you want it to be in, probably either eng.xyz.com or lab.xyz.com. This should match where the system appears in DNS.

- Continue to copy NIS maps from corp.xyz.com and publish them (updated as required) in your local NIS domain.

Net, you'll be autonomous for NIS purposes - you can do whatever you like to the maps - but for AD purposes you will be close personal friends with corp.xyz.com and CORP\username users will be able to log in through CIFS.

That sounds good.

So Do I create these eng.xyz.com and lab.xyz.com sub domains on Solaris some how? Or do I ask IT to do that on the AD servers?

Does making these new AD domains also make new Kerberos realms?

Can I choose to make the Kerberos Realms myself? Can I host the ENG.XYZ.COM realm on Solaris? and just ask the IT dept to trust it?
The DNS I run has all my SOlaris and linux machines in 'lab' and 'eng' DNS subdomains, so naturally I have those domains listed first in the /etc/resolv.conf config. I read something about needing to put the AD first in the resolv.conf? is that true?
That will make local DNS lookups pretty inefficient.

Do you mean the domain search list, or the servers?

I mean the search directive.

The OS CIFS Administration Guide, p33 states that the AD domain must be the only value of the 'domain' directive, or the first value of the 'search' directive in the /etc/resolv.conf.

I don't think the search list matters here. Put whatever in your search list will make life easier for you.

In a sense, the server list shouldn't matter. All servers should be able to resolve all requests, either because they know the answer or because they can figure out who to ask.

What do you mean by a 'server list'??

If your servers are *not* all capable of answering all questions - for instance, for some purposes my test systems live in a DNS domain that our IT organization doesn't know about, and so queries about them need to go to my DNS servers and not the IT DNS servers - then you need to ensure that your resolv.conf lists *only* the servers that know about your domains. It would be bad if you had some servers in the list that could answer a particular question and some that could not; you could see intermittent failures depending on which servers are up at any given moment.

Oh, you mean the 'nameserver' directive in the resolv.conf?

Yes, all these domains are fully delegated both forward and reverse.
Unless the other DNS servers are on the other side of the world, I wouldn't really worry about efficiency. DNS queries are pretty fast and light. Even if the servers *are* on the other side of the world, I wouldn't be very concerned; Solaris caches name service lookups and so you shouldn't see much cost anyway.

I know. I'd just rather try the most likely name first. Also I think the first value of 'search' and 'domain' can have an effect on other things.


Now from the other thread ( I think I got rid of redundancies with above, but if I missed any just ignore them:)

>
> If it's the bundled one, I believe it's called Identity Management for UNIX (IDMU). > Direct support for some of the IDMU features is coming in, I believe, build 124. That will > eliminate the need for rules per se, and will use IDMU data to directly map from Windows
> identities to/from UIDs and GIDs.
>

It is the one bundled in Win2003R2.

The sun Docs suggest that the LDAP UNIX username and groupname fileds are normally are named 'unixUserName' and 'unixGroupName', like I see in this AD for 'unixHomeDirectory'

However MS (or maybe my IT Dept?) has decided to name the fields 'uid' and 'gid' (which in unix are normally numbers) and put the uid and gid numbers in uidNumber and gidNumber.

Does that sound right?

So am I correct to think that I need to enter 'uid' and 'gid' into the SMF properties to instruct idmap where to find the unix equivalents of the windows usernames?

How does it know which field has the Windows username? in my LDAP dump it was 'samaccountname'. Do i need o put that in the SMF properties also?

>
> This is where we reach the edges of my competence. I don't know how to set
> up a semi-autonomous domain like you're trying to do, where some of the
> data is managed centrally but you have your own local set of data too.
>
For NIS I have no problems there. I didn't do it myself, but I remember being on project teams at Sun where we did similiar things (our LDAP defined groups of users for webservers to authenticate against, but the passwords were 'reffered' on to ITops's LDAP servers for password verification.)

> > Idea 2 - Switch to LDAP.
>
> That does seem to me the "modern" way to do it, but
> I'm not very familiar with using LDAP as a UNIX name
> service and not at all familiar with trying to do this
> kind of semi-autonomous configuration.

That's OK. I think straight LDAP can do it. (It's kind of like how NIS+ let you link a parent domain's maps into a child domain.) It remains to be seen if Windows does something to make it not work though.

Though through more reading, and your answers in the other thread, I think I need to consider Kerberos more.

I'm not sure how I would handle Kerberos in Idea 1 (Stick with NIS.,) but it seems like if I go through the work to add a LDAP sub-domain (to the DNS subdomain I have) I probably should also setup a Kerberos (sub-)realm?

That pretty well defines where I ultimately want to end up. But it also looks like it won't be something I'll be able to do overnight.

So the question now, is which pieces depend on which others, and/or which will need to be totally re-done later, so I can decide what to do now vs. later??

>
> I suspect that wild card rule mapping is the right
> answer with builds prior to 124, and that the direct IDMU support is more
> appropriate to builds 124 and later.
>

Ok. I'll definitely look more into build 124.

For now maybe I'll figure out what I need to do to get Kerberos setup enough to get this one server joined to the domain, and it's shares working, and then once I have 124 in my hands, I'll look into setting up the rest.

>
> At the moment at least, "join" affects only CIFS
> interactions.  It has no impact on traditional UNIX
> operations - login, NFS, et cetera.
>
OK. Good to know.

> On the other hand, using LDAP (even from AD) as your
> UNIX name service doesn't directly affect CIFS operations.
>
Also good to know.

So can a solaris machine even tell if it's LDAP server is really also an LDAP server?

>
> I believe, but I am not sure of the details, that if
> your CIFS clients join the domain they will not have
> to prompt you for a password when they connect to
> the file server.

Ok. That shouldn't normally be a problem, since most (all?) of the CIFS clients should be Windows desktops or servers and members of the domain already.
>
> > 3) Does Rule based mapping still require joining
> the AD Domain?
>
> When you're not joined to an AD domain, the only kind
> of user that exists is a "local" UNIX user (which includes users from NIS
> and LDAP, except that setting them up for CIFS access is unsupported), and
> so mapping isn't really directly applicable.
>
So when not joined to the domain, you can only map users from the /etc/passwd file?

> > 4) Can a host in the 'eng' DNS subdomain join the 'CORP' AD domain?
> > (Given how the resolv.conf works I don't think so.)
>
> I'm not sure.  It does seem like shaky ground, and
> likely to get shakier if we ever do more integration between the CIFS and UNIX
> sides of the house.
>
Why?

What exactly is planned for this integration?

I imagine something that can make Solaris machines look like nearly full fledged windows clients?

Does it also include allowing Solaris Servers to act as AD slaves or masters? or serve AD sub-domains?

  -Kyle
_______________________________________________
cifs-discuss mailing list
[email protected]
http://mail.opensolaris.org/mailman/listinfo/cifs-discuss

Reply via email to