I've used redhat 389 directory server for this, the samba setup I had
was a bit different though, so I had to add a samba schema.  The only
thing I had to find was a ldap client that could hash the SID,
ldapadmin was good, but only works on windows.



On Wed, Jan 12, 2011 at 10:27 AM, Bohmer, Andre ten
<[email protected]> wrote:
> Hi,
>
> Until now we had to manage a few user accounts per Linux server. We create a
> local account with the same name as the Windows Active directory
> samAccountName and authenticated via Kerberos. But now we’re on the brink of
> rolling out large high performance servers with lot's of users which also
> share storage across different Linux servers. So it would be much easier to
> grant users access based on AD group membership,  but also it's significant
> to maintain the same uid/guid across all servers.
>
> Some googling around show a combination of samba, winbind, ldap, Kerberos
> and Microsoft Services for Unix, but also RedHat Directory Server which
> seems to do it's own uid/guid mapping  without the need of a  AD schema
> update.
>
> Any thoughts on what would suite/works best?
>
> Regards,
> Andre
>
> ---
> J.M.G. ten Böhmer
> Wageningen UR, SC FB IT - Infrastructure
> The Netherlands
>
>
>
> _______________________________________________
> rhelv5-list mailing list
> [email protected]
> https://www.redhat.com/mailman/listinfo/rhelv5-list
>
>

_______________________________________________
rhelv5-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhelv5-list

Reply via email to