Robert Cohen wrote:
On 20/2/08 4:11 PM, "Neal A. Lucier" <[EMAIL PROTECTED]> wrote:
Robert Cohen wrote:

Ok, I thought winbind was only relevant if you were using AD as a NSS (name
service source). We have all the users in the name service from LDAP or
NIS+. We're only getting the passwords from AD.

I guess this could be an unusual combination and could be whats causing our
problems...


This is exactly what we are doing, and until 3.0.25 setting up idmap to work in this environment was a bit convoluted, but now it is extremely simple, mainly because an "nss" backend was introduced to idmap. Generally speaking idmap is for authorization; however, there is some interplay with authentication.

So, to be clear, your nsswitch on the machine is only look at LDAP or NIS+, and in AD you have all the same users with the same username?

You need IDmap to map the uid of the owner of the files (which is coming from LDAP/NIS+) to the SID of the user that is accessing via Samba (which is coming from AD). There are many ways to do this, by putting the SID in LDAP, the uid in AD, using local .tdb files, or a local mapping. The simpliest (given that my assumptions about your environment are correct) is:

winbind use default domain = yes
idmap domains = XX
idmap config XX:backend = nss
idmap config XX:readonly = yes
idmap config XX:default = no

The only setting I'm not sure exactly what is does is the ":default = no", but IIRC that says if someone from another domain that is not defined by "idmap domains = " tries to connect than idmap should not use this backend as the default backend.

see: http://www.samba.org/~idra/samba3_newidmap.pdf


And allow trusted domains = no doesn't make any difference.


Sorry, I was thinking of "winbind trusted domains only" which has been obsoleted by the idmap_nss backend.

Neal
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/listinfo/samba

Reply via email to