On 07/17/13 15:02, Donny Brooks wrote:
On Wednesday, July 17, 2013 01:53 PM CDT, Gaiseric Vandal <gaiseric.van...@gmail.com> wrote:
On 07/17/13 14:32, Donny Brooks wrote:
On Wednesday, July 17, 2013 10:11 AM CDT, Gaiseric Vandal <gaiseric.van...@gmail.com> wrote:
According to the net man page


          In order for Samba to be joined or unjoined remotely an account
must be
          used that is either member of the Domain Admins group, a member
of the
          local Administrators group or a user that is granted the
          SeMachineAccountPrivilege privilege.




The simplest thing is probably to have the Domain IT group be a member
of the local admin group on each machine.  I don't know if you would
need to grant them the  SeMachineAccountPrivilege.



On 07/17/13 09:44, Donny Brooks wrote:
On Saturday, July 13, 2013 04:43 AM CDT, Marc Muehlfeld <sa...@marc-muehlfeld.de> wrote:
Hello Donny,

Am 12.07.2013 21:34, schrieb Donny Brooks:
On the old domain, which was setup before I got here,
    > our IT section was in an ldap group that allowed us to
    > join PC's to the domain ...

http://wiki.samba.org/index.php/Samba_AD_DC_HOWTO/AD_Delegation#Delegating_.27Joining_Computers_to_the_domain.27-permissions




    > ... and when the prompt came up in windows to
    > install software we could log in as ourselves.

What do you mean by this? Do you want to have a group of users
automatically in the "administrator" group on your workstations?

http://community.spiceworks.com/how_to/show/2123-add-an-active-directory-group-to-the-local-administrator-group-of-workstation-s

If you mean something else, please give some more details.



Regards,
Marc





Yes, on the old domain we had all of our IT staff in a group that was able to join pcs to the domain and install software by inputting their domain credentials when prompted. Looking at the first link that is for Samba 4.X. We are on Samba 3.5.10 so that does not apply.

--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba
Looks like I need to do this here: http://www.samba.org/samba/docs/man/Samba-HOWTO-Collection/groupmapping.html

And map our itgroup to the Domain Admins group. Although we do have a Domain 
Admins group in ldap. Should that cause an issue?
Group mapping is to make sure Windows groups map to the correct unix
group.      This is not like mapping a Windows user name to a different
unix user name (e.g Windows Administrator = Unix root.)

With LDAP, group mapping is usually simpler since the LDAP object for a
group usually has the Samba SID and the unix group id.     The "net
groupmap list" command is useful for validating this.   You want to make
sure that you do see group mapping for "Domain Admins" and "Domain
Users" and other well known groups.  You are more likely to have to use
the "net groupmap add" command when you don't have LDAP.


Well known groups have to specific relative ID's.  The domain admin
group HAS to have a relative ID of 512 in the SID.    You have to make
sure the Administrator is in the group.   That behavior changes with
versions newer than 3.0.x




#net  groupmap list
....
Domain Admins (S-1-5-21-xxxx-xxxxx-xxxxx-512) -> Domain Admins
...
# getent group "Domain Admins"
Domain Admins::512:Administrator
#


I don't think you have a samba issue.  I think you have a general
"windows" issue about the most practical way to provide IT group with
sufficient privileges to manage computers with out giving too much access.


Depending on the size of your IT department, and the necessity to
audit/control you makes what change, each IT user may need two accounts,
one that is a regular account and one that is a member of the domain
admins and local admins  group.  (e.g. donny and donny_admin.)    this
way they can do whatever they need, but they don't run as admin for
routine tasks, and you can track who made what change (if need be)  or
limit who has full  admin rights.





It is correctly mapped and is 512. Nothing changed on the windows side during 
the domain change other than removing the machines from the old domain and 
rejoining them to the new one. We don't have to have the accounting trail that 
two accounts would give us right now. I just want to be able to tell my other 
people they can join computers to the domain and perform software upgrades with 
their own credentials.


OK
I am looking at your original post again. I don't think you said which version you had been using.

net rpc rights grant 'MDAH\Domain Admins' SeMachineAccountPrivilege -S 
enterprise -U superusername



Is the superuser name the domain Administrator account? The problem seems to involve the superusername user, not the Domain Admins group. I think with older version of samba, the Administrator account was implicit, and you could map the windows Administrator to the unix root account and all was OK. With the current version I think you need you create an Administrator samba user (it doesn't have to be called Administrator but I would do that just to keep things simple) and add that user to the Domain Admins group.

Does "pdbedit -Lv Administrator" or "pbedit -Lv superusername" work?

You could add the user IT users to the domain admins group. Then you have all the privileges you need. You should NOT need to grant SeMachineAccountPrivilege to the Domain Admins group.

Can you post a sanitized version of the Domain Admin group LDIF?




--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba

Reply via email to