[EMAIL PROTECTED] wrote:
As I said, I did a fresh install of opensuse 10.3, samba, ldap.

During the process, I filled the ldap database directly with an ldif file built
using smbldap tools.

(one item in that file -->

dn: cn=Domain Admins,ou=Groups,dc=ldap_hathor,dc=nwk
objectClass: top
objectClass: posixGroup
objectClass: sambaGroupMapping
gidNumber: 512
cn: Domain Admins
memberUid: root
sambaSID: S-1-5-21-3134345319-2430187646-2919245149-512
sambaGroupType: 2
displayName: Domain Admins
description: Netbios Domain Administrators
#sambaPrimaryGroupSID: SID of the user group (512 = Admins group)
#description: Netbios Domain Administrators
 )

So you mean by doing this it is not necessary to map the native existing unix
group "ntadmin" (gid 71) with "Domain Admins" ?
(ntadmin appear in /etc/group and "Domain Admins" not)

When you do getent group you're getting what's in the local /etc/group and what's defined in the ldap group membership. See gidNumber above. Using /etc/nsswitch.conf to define ldap lookups extends the /etc/passwd and /etc/group membership so passwd and group uid/gid's can be defined system wide and used by any unix machine.

So yes. Users belonging to group 512 are "Domain Admins". You need to add users to this group when you want them to have related security privileges. You should be able to chgrp 512 filename and have it show as "Domain Admins" when you ls the directory. I haven't used the smbldap tools package, but it looks like the most common windows groups have already been defined for you. All you need to do is avoid using the ldap passwd & group uid/gids in the local files. Yast tools will probably not allow you to generate duplicates.

And yes, you only need to map groups when the unix name doesn't match the windows name and you don't want samba to create the account on the fly using whatever idmap backend you pick. Your idmap backend should probably be idmap_ldap and accounts generated then become available system wide using the same uid/gid's and network file sharing offers the same membership security regardless of client machine access.

This is probably in a FAQ somewhere where the answer would be more structured. I use the following to resolve my issues:
http://us6.samba.org/samba/docs/man/Samba-HOWTO-Collection/
http://us6.samba.org/samba/docs/man/Samba-Guide/

Since samba is evolving almost daily, sometime the Howto syntax has been modified in the current manifestation of the command. Always refer to the current command documentation to resolve any discrepancies.

Doug


Reading the samba documentation was not very clear for me.

jcdole


Selon Douglas VanLeuven <[EMAIL PROTECTED]>:
It looks like you already have an existing unix group called "Domain
Admins" being pulled in from ldap.  When that is true, there is no need
for groupmap and indeed it would appear it is illegal to map a windows
group that matches an existing unix group to another unix group.

Doug


[EMAIL PROTECTED] wrote:
Hello.

After fresh install.

Samba and ldap seems to run normally ( I can join win2k workstation to
linux
samba pdc ).

Using yast I create a system group named domadmin

But I am unable to map "Domain Admins" to domadmin
I am unable to map "Domain Admins" to existing ntadmin group

I am unable to mofify mapping "Domain Admins" to domadmin group

Thank you for helping.

LINUX-SRV: # net groupmap add ntgroup="Domain Admins" unixgroup=domadmin
rid=512 type=d
adding entry for group Domain Admins failed!
LINUX-SRV: #

LINUX-SRV: # net groupmap add ntgroup="Domain Admins" unixgroup=ntadmin
rid=512
type=d
adding entry for group Domain Admins failed!
LINUX-SRV: #

LINUX-SRV: # net groupmap modify ntgroup="Domain Admins" unixgroup=domadmin
Can't map to an unknown group type.
LINUX-SRV: #

LINUX-SRV:~ # net groupmap modify ntgroup="Domain Admins"
unixgroup=domadmin
type=d
Could not update group database
LINUX-SRV: #

LINUX-SRV:~ net groupmap list
request done: ld 0x555555c881e0 msgid 1
request done: ld 0x555555c881e0 msgid 2
Domain Admins (S-1-5-21-3134345319-2430187646-2919245149-512) -> Domain
Admins
request done: ld 0x555555c881e0 msgid 3
Domain Users (S-1-5-21-3134345319-2430187646-2919245149-513) -> Domain
Users
request done: ld 0x555555c881e0 msgid 4
Domain Guests (S-1-5-21-3134345319-2430187646-2919245149-514) -> Domain
Guests
request done: ld 0x555555c881e0 msgid 5
Domain Computers (S-1-5-21-3134345319-2430187646-2919245149-515) -> Domain
Computers
request done: ld 0x555555c881e0 msgid 6
Administrators (S-1-5-32-544) -> Administrators
request done: ld 0x555555c881e0 msgid 7
Account Operators (S-1-5-32-548) -> Account Operators
request done: ld 0x555555c881e0 msgid 8
Print Operators (S-1-5-32-550) -> Print Operators
request done: ld 0x555555c881e0 msgid 9
Backup Operators (S-1-5-32-551) -> Backup Operators
request done: ld 0x555555c881e0 msgid 10
Replicators (S-1-5-32-552) -> Replicators
request done: ld 0x555555c881e0 msgid 11
Users (S-1-5-32-545) -> 15000
LINUX-SRV: #

LINUX-SRV: # getent group
at:!:25:
..............
..............
domadmin:x:114:
root:x:0:
...............
..............
users:x:100:
+::0:
request done: ld 0x618d10 msgid 1
Domain Admins:*:512:root,user_admin
Domain Users:*:513:
Domain Guests:*:514:
Domain Computers:*:515:
Administrators:*:544:
Account Operators:*:548:
Print Operators:*:550:
Backup Operators:*:551:
Replicators:*:552:
request done: ld 0x618d10 msgid 2
It looks like you already have an existing unix group called "Domain
Admins" being pulled in from ldap.  When that is true, there is no need
for groupmap and indeed it would appear it is illegal to map a windows
group that matches an existing unix group to another unix group.

Doug




--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/listinfo/samba

Reply via email to