All,
Is this the appropriate alias for the question below.
Else, can I be pointed to the correct group for help on naming service
and setup of solaris as an ldap client to Active Directory
Intent.
- demonstrate opensolaris interop with AD.
-- user login via console, via SSH
- All users in AD
- kerberos for authentication
- attribute retrieval, password policy enforcement
Current
Kerberos
- I have kerberos configuration of my solaris server working against AD
(using kclient)
Name services.
- I can retrieve some attributes using
- getent passwd tus...@test.com
Pam.conf
- I've set this up to use kerberos for login, but this is not working
-----
<snipped>
-----
login auth required pam_unix_cred.so.1
login auth sufficient pam_krb5.so.1
----
<snipped>
----
Q) Do I need to setup "ldapclient" for this to work ?
thank you
sundeep
On 05/13/10 11:01 AM, Jordan Brown wrote:
sundeep dhall wrote:
Afshin,
I checked with my customer on this.
It seems they are interested in being able to delegate authentication
to the solaris server to AD using kerberos and
on the solaris server, they have scripts that would query the uid,
primary gid, secondary gid for the user.
and then execute using those permissions.
I am not sure that I fully understand the customer's needs, but it
seems like they're reinventing our existing LDAP and Kerberos
infrastructure.
If you just want to be able to log in using account information stored
in AD, you don't have to write any scripts. You just have to
configure your AD correctly (with IDMU) and set up LDAP and Kerberos
on the Solaris system. That's not as easy as it should be, but it can
be done.
Today they use SAMBA to achieve the authentication portion.
They do not need access to samba-like shares on the solaris server
Is this narrow requirement set possible in the current implementation
using b134 ?
- If so, would I only need to use the "kclient" script to setup the
authentication to AD ?
sundeep
On 5/11/2010 5:21 PM, Afshin Salek wrote:
Afshin
On 05/11/10 02:54 PM, sundeep dhall wrote:
Afshin,
I am coming to grips with the various terms, so please bear with me.
What I want to currently prototype is the following:-
- osol server authentication using kerberos against AD. User repo only
on AD
- retrieval of user and group attributes from AD.
-- ie getent or other similar calls on solaris would give me the uid,
gid set on AD
- password resets done on AD would be reflected on the osol side when
the user attempts to authenticate.
It seems that this setup was originally done using a script called
ADjoin (now deprecated) and is now done vis kclient
Q) Does this much work today ? either in 2009.06 or later ?
I am presuming that what you describe as not currently supported is
the
following
- AD is domain controller and is used for authentication
- OpenSolaris server is a CIFS (SMB) server operating in domain mode
Yes, that is what I'm referring to. So I'm not sure what you are
referring to as "osol server authentication using kerberos against AD".
Is there any SMB file access involved here in your prototype? What kind
of access to Osol are you trying to authenticate against AD using
Kerberos?
If that is so, then I presume that the CIFS capability works today in
workgroup mode where users repository is on the osol side.
There is no AD or kerberos is involved in workgroup mode. SMB server
performs the authentication against the local /var/smb/smbpasswd
Afshin
Please validate
thank you
sundeep
On 05/11/10 04:37 PM, Afshin Salek wrote:
Kerberos authentication for SMB users connecting to Solaris SMB
server
is under development, so it's not currently supported.
Afshin
On 05/11/10 02:27 PM, sundeep dhall wrote:
Hi Alan,
Thank you for the flag.
I am downloading b134 from genunix.org
I have setup AD on Win2008r2 as well as DNS
The intent is to show that users will be created in AD
Once osol is integrated with the AD as a kerberos client for
authentication, users will be able to login into osol via their auth
to AD.
I have skimmed through the docs on setting up kerberos client for AD
http://docs.sun.com/app/docs/doc/819-3321/ggtwg?l=en&a=view
Q1)I am presuming that perhaps prior to this, the only step
required on
the osol side would be to
setup nsswitch.conf and resolv.conf.
Is that correct ?
Q2) How does the CIFS setup on domain-mode work in conjunction to
the
above methodology ?
http://docs.sun.com/app/docs/doc/820-2429/configuredomainmodetask?l=en&a=view
Is that a 2ndary step I could do to show CIFS file sharing, or do
the
latter steps call kclient internally ?
thank you
sundeep
On 05/11/10 03:20 PM, Alan Wright wrote:
On 05/11/10 08:34 AM, sundeep dhall wrote:
All,
Intent is to demonstrate OpenSolaris2009.06 authentication with
AD on
Win2008r2 and UID, GID access based on user creation in AD
For use with Windows, it would be better to upgrade to something
more recent than OpenSolaris 2009.06. The SMB support in 2009.06
is broken.
Alan
I am reading up on the following for kclient
http://docs.sun.com/app/docs/doc/819-3321/setup-341?a=view
But my question is more on the AD side.
I have setup AD on the demo machine.
Q) In 2003, there was a SFU that enabled the AD to have the schema
for unix
Is a similar setting required for 2008 ?
Pointers to where this needs to be done would be appreciated.
thank you
sundeep
_______________________________________________
cifs-discuss mailing list
cifs-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/cifs-discuss
_______________________________________________
cifs-discuss mailing list
cifs-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/cifs-discuss
_______________________________________________
cifs-discuss mailing list
cifs-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/cifs-discuss
_______________________________________________
cifs-discuss mailing list
cifs-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/cifs-discuss