Hi Bryan,
And why having winbind as part of the samba exam and not as part
of the auth exam would prevent this?
Because Winbindd on the Samba exam will take away from SMB and other
network file service concepts such as access controls and authorization.
And winbondd outside samba will require covering NetBIOS concepts that
have nothing to do with other auth and naming services. If winbindd is a
specific incarnation of a general concept, it should be tested together
where it has the bigger change of being used, and not artifially as part
of it's "general' category of tools. This way you actually loose focus.
It may look like a better focus for you who already maters the
technology and has years of expertize, but it wont't be the best focus
for LPICP candidates. It's a big mistake to suppose LPICP-3 will already
be enterprise network admins; those who already are won't look after
LPIC except if they need the paper to fulfill some bureucratic
requirement, in which case they will do the test the next day and pass.
Else LPIC missed its goals.
LPIC-3 candidates will have a specifc work focus: manage file services
for windows workstations; manage file services for linux workstations;
manage directory services for whatever service rely on then; manage
network security; and so on. We have to provide a minimum set of tests
and objectives for each professional focus, and not try to create a
certification for the guru who masters it all.
"Common denominators" to object authentication and naming go on the
auth/dir/name exam.
Otherwise we'll quickly find ourselves covering, recovering and even
more recovering the same "common denominators" and more and more exams.
Your proposal has nothing to do with "common denominators". You want to
join all services that are somewhat related to authentication, user
management and naming in the same test. This is nice in theory but not
practical, because you end up with a too big foundation that in the end
allows candidates to implement nothing, just infrastructure for the
services users demand.
And in the real world, how many companies use winbind without other
samba services?
ISP/ASPs do! Seen it many times for Apache!
And didn't those companies required people with other samba skills
besides winbindd? Didn't those companies had other servers who provided
file acess using either samba or Windows? Would those companies have
choosen winbind if they were a true linux-unix-only shop?
If I put winbind together with other auth services on the same tests,
passing becomes harder for pros who do not want windows integration. And
pros who need only the windows integration or just the windows file
services will miss a tool they'll probably need.
Put in another way, which scenario is more common:
1. a samba admin that adds winbind because his company centralizes user
accounts in MS ADS; or
2. an apache admin that uses winbind as a way to replicate users among a
group of internet servers, and has no file servers elsewhere that serve
windows clients?
I've also seen UNIX/Linux file servers that used it for authentication
against an ADS domain, but did _not_ provide SMB (only NFS or AFS)
Every time I seen that there were also other servers that provided SMB.
At
the same time, I've seen ADS integration _without_ Winbindd. They used
PassSync or other synchronization tool instead, and keep the objects
local to the UNIX/Linux network.
Will LPI certify PassSync and other proprietary tools you can use for a
Linux network, like Novell eDirectory? I think LPI will ask only for
software commonly bundled with Linux distros, if not only open source
software. So there's no point arguing you could do ADS integration
without winbind. Whoever does ADS integraton will most of the time use
winbind, and that's what LPI certifies: common scenarios.
I consider the "standalone" and "local-only" focus to have nothing to do
with "enterprise."
I don't think LPI customers agree with your definition of what
"enterprise" means. You see only the extremes, local/standalone systems
and the perfectly integrated network. Reality presents more options, and
won't help to say a customer he made a bad choice.
I'm not suggesting that. You keep thinking that I'm suggesting that.
Why? Because you're designing the Samba-only exam for 1-2 auth/dir/name
scenarios. And then every other exam for 1-2 auth/dir/name.
I don't know from where you took that conclusion. Just because I don't
think all possible auth/dir/etc scenarios should be together in just one
core exam I won't have duplication. I see nothing wrong with having an
apache administrator that needs to use NTLM or ADS-based authenticatoin
and tell him "take the samba exam".
I'm trying to _avoid_ "scenarios" all-together!
You want no certificatoin at all, because it's all about "scenarios",
that is, real tasks real admins need to perform in real networks.
I'm trying to say things like ...
- "Here's how you configure Kerberos' KDC, setup principles, etc..."
Nice for core
- "Here's how you configure NTLM authentication with Winbindd."
Nice for samba -- does all Linux sysadmin have to understand what NTLM
is? Don't you think someone can be a very good
apache/squid/nfs/procmail/mysql/imapd/ldap/cups sysadmin, and having
very few or even no knowledge about windows networking?
- "Here's how you map to native SAM objects."
Again nice for samba, not for the general linux sysadmin
- "Here's how you can store native SAM objects in TDB, LDAP, etc..."
Samba specific, it doesn't make sense to test for this outside of the
samba exam.
- "Here's how you leverage native UNIX/Linux network objects."
Good for core
- "Here's how you can configure local UNIX/Linux name switch."
Core, no doubt.
That _removes_ scenarios entirely! We don't want to be testing
"scenarios." We do _not_ want to be testing "cookbook" methods. We
want to be testing _tasks_ -- tasks that, when put together as a whole,
"do something" _across_ an "enterprise."
Where are the "tasks" when you put together all authentication services
without any service that makes use of them? One thing is factoring out
common concepts and practices, like PAM and NSS, another entirelly
differnent thing is creating a category like "auth" and forgetting about
real-world uses of the technology in that category.
If you say Kerberos could be on core, I concede, because understanding
Kerberos operation requires much less concepts than understanding
Windows authentication, and Kerberos has nuch broader use than nmbd and
winbindd without smbd.
On the other side, how could someone manage a winbind server and not
knowing the remaining samba stuff?
Quite easily!
You authenticate the system into the native SAM (Windows) domain.
And you know nothing about that a SAM is and what a Windows domain is.
Nothing about domains memberships and how you find the DC. Too much
windows-specific stuff for a general core exam.
You configure your smb.conf for only Winbindd components.
Will you be able to touch smb.conf and not knowing smbd and nmbd?
You start the service without smbd!
You do _not_ have to run smbd!
Hell, you can even run nmbd _without_ smbd too!
Just because you *can* run nmbd and winbindd without running smbd you
will *force( everyone to understand nmbd and winbindd, while very few
will do that and not have smbd running elsewhere?
And vice-versa in _all_ cases.
Just because smbd, nmbd and winbindd are not mutually exclusive doesn't
mean they have _any_ dependency on each other what-so-ever! ;->
Yes, they have lots of common dependencies, that no other services share
with them. If not the Samba team would provide them as separate,
isolated packages just like they provide rsync outside of samba. They
are the only one Linux services that require understanding NetBIOS, SAM,
ADS, the Network Browser and MS-RPC.
[]s, Fernando Lozano
_______________________________________________
lpi-examdev mailing list
[email protected]
http://list.lpi.org/mailman/listinfo/lpi-examdev