Darn. That was the 'Send' button instead of the 'Save Now' :( My previous email wasn't the version that I intended to send to the list; I had some proofreading to do and I was just writing down things as they came to mind. Sorry if not everything is crystal clear :P
Maxim Burgerhout ma...@wzzrd.com ---------------- EB11 5E56 E648 9D99 E8EF 05FB C513 6FD4 1302 B48A On Fri, Dec 2, 2011 at 17:39, Maxim Burgerhout <ma...@wzzrd.com> wrote: > I have been doing Active Directory authentication projects for years now, > and I have always tried *not* to use Winbind. I initially used the nss_ldap > / pam_krb5 combination, but have recently adopted sssd.The reason for this > have varied over time, but the most important ones are, in not particular > order: > > - in environments with several different flavors of Linux, it's wasn't > always possible to use Winbind the same way on all machines; RHEL3's Samba > for example was not quite up to the task. The nss_ldap / pam_krb5 > combination is pretty much distro agnostic and will just about always work. > > - I am comfortable debugging Kerberos and LDAP issues, or at least I am > much more comfortable debugging them than I am debugging Samba / Winbind > issues; both protocols are well-known and well documented > > - Kerberos and LDAP are native protocols and native authentication > mechanisms; AD might be a bit quirky at times in it's implementation, I > find it good enough to use a DC as it were an LDAP server and KDC, nothing > more (which it basically is, of course), so why not use it that way? > > - I find the fact that you need to assign UID's and GID's to groups a > plus. Most of the time, only a minute subset of the users in AD need to be > able to log into my Linux boxes. Having to manually edit accounts to grant > people access to Linux boxes is a convenient way of separating Linux admins > from other admins. Besides, like the control freak I am, I like to put > Linux admins in one range of UID's, DBA's in another range, etc. :) > > - I have seen winbind fail in too many, too exotic ways over the years. > > - in my experience (but this is old experience, I admit that readily), > using winbind gave a slow login sequence compared to nss_ldap and pam_krb5 > > By the way, the reason for me to start using sssd over nss_ldap / pam_krb5 > is the fact that sssd can do ticket management for you and simplifies and > centralizes configuration. > > Keep up the good work! > > Regards, > > > Maxim Burgerhout > ma...@wzzrd.com > ---------------- > EB11 5E56 E648 9D99 E8EF 05FB C513 6FD4 1302 B48A > > > > > On Fri, Dec 2, 2011 at 15:08, Stephen Gallagher <sgall...@redhat.com>wrote: > >> When we originally designed SSSD, we looked at it as a solution for >> dealing with LDAP and Kerberos identity and authentication for Linux and >> UNIX clients. With our initial approach, we decided to include only >> marginal support for Microsoft's Active Directory as a source of user >> information (only supporting it when it is enabled for use with >> posixAccount and posixGroup object classes). >> >> Our original assumption was that for complicated deployments relying on >> Active Directory, users would prefer to continue using Winbind. It has a >> very long history and is specifically designed around managing the >> peculiarities of Microsoft's LDAP implementation. >> >> Of late, it has become apparent that many users are opting to "jump >> ship" from winbind to SSSD for use with Active Directory. This has been >> shown by a sharp uptick in community bug reports with Active Directory >> servers. >> >> Up until now, our plans around Active Directory have circulated around >> including a "Winbind Provider" into SSSD, similar to the LDAP provider >> but making use of the original winbind features found in the Samba >> project. However, it's beginning to seem like users are expressing an >> interest to move AWAY from that solution. >> >> This may result in a change in our strategy going forward. I'm looking >> for users to describe to us the reasons why they're choosing SSSD (in >> its current incarnation) over winbind. What I'm trying to sort out is >> whether there are specific *issues* with winbind that SSSD is solving >> for users. In other words, I'm trying to determine whether our decision >> to write and support a winbind provider backend is misplaced. >> >> It may be that if SSSD's LDAP provider is offering a significant >> advantage over winbind, we will consider dropping (or deferring) our >> efforts to integrate winbind and instead put that effort into adding >> Active Directory-specific features into the LDAP provider. For example, >> we might reprioritize bugs https://fedorahosted.org/sssd/ticket/995 and >> https://fedorahosted.org/sssd/ticket/996 >> >> So please, share with us your stories for why you prefer SSSD over >> winbind and help us choose our direction for SSSD's future. >> >> _______________________________________________ >> Freeipa-interest mailing list >> freeipa-inter...@redhat.com >> https://www.redhat.com/mailman/listinfo/freeipa-interest >> > >
_______________________________________________ sssd-devel mailing list sssd-devel@lists.fedorahosted.org https://fedorahosted.org/mailman/listinfo/sssd-devel