On Wed, 2008-03-05 at 14:15 -0800, Natalie Li wrote:
> John Connett wrote:
> 
> >On Fri, 2008-02-29 at 07:10 -0800, Ross wrote:
> >  
> >
> >>Update:  It appears it's not even that, testing the CIFS server on another 
> >>machine, it looks like you just need a reboot after setting it up.  So the 
> >>whole process to enable CIFS on a brand new b82 box is:
> >>
> >>- Install snv_82.  Configure kerberos, networking and DNC when prompted.
> >>- Once installed, start the CIFS server and join the domain:
> >>   # svcadm enable -r smb/server
> >>   # smbadm join -u domain-user domain-name
> >>- Reboot server
> >>
> >>And then just create zfs filesystems and set sharesmb=on as needed.
> >>    
> >>
> >
> >I have been trying to join a snv 83a SPARC system to a domain, so far
> >without success.
> >
> Did you see any error messages in the syslog after you ran the smbadm 
> join CLI?  Is it a multiple domain controllers environment?
> 
> >  The system had a text mode initial install just
> >preserving the slice that holds a zpool.  Networking and kerberos were
> >configured during the install.  What is DNC?
> >
> >  
> >
> I'm not so sure if the domain join failure has anything to do with the 
> installation.  As long as you configure your DNS and Kerberos similar to 
> what mentioned in the Admin Guide prior to joining your system to a 
> domain, you should be good to go.  The "How to Configure an AD Client" 
> section of the CIFS admin guide might be helpful.
> 
> http://docs.sun.com/app/docs/doc/820-2429/configureadtask?a=view
> 
> Note that both 'ads_domain' and 'ads_enable' properties are obsolete as 
> of snv_81. Thus, you don't have to set those via sharectl.
> 
> >Do I need to modify the kerberos configuration post-installation?
> >
> Yes. See above.

Here's what I have:
======================================================================
bash-3.2# cat /etc/krb5/krb5.conf
[libdefaults]
        default_realm = uk.example.net

[realms]
        uk.example.net = {
        kdc = uknt-70.uk.example.net
        kdc = uknt-72.uk.example.net
        admin_server = uknt-70.uk.example.net
        kpasswd_server = uknt-70.uk.example.net
        kpasswd_protocol = SET_CHANGE
        }

[domain_realm]
        .uk..net = UK.EXAMPLE.NET

[logging]
        default = FILE:/var/krb5/kdc.log
        kdc = FILE:/var/krb5/kdc.log
        kdc_rotate = {

# How often to rotate kdc.log. Logs will get rotated no more
# often than the period, and less often if the KDC is not used#
frequently.

        period = 1d


# how many versions of kdc.log to keep around (kdc.log.0,
kdc.log.1, ...)
        version = 10
}
[appdefaults]
        kinit = {
        renewable = true
        forwardable= true
        }
bash-3.2# 
======================================================================

Here's what happened on the command line:

bash-3.2# smbadm join -u Administrator uk.example.net
Enter domain password: 
Joining 'uk.example.net' ... this may take a minute ...
failed to join domain 'uk.example.net' (LOGON_FAILURE)
bash-3.2# 

I found the following in /var/adm/messages:

Mar  5 22:48:04 tequila idmap[314]: [ID 840489 daemon.error] idmapd:
Couldn't open and SASL bind LDAP connections to any domain controllers;
discovery of some items will fail
Mar  5 22:48:05 tequila last message repeated 3 times
Mar  5 22:50:44 tequila smbd[401]: [ID 871254 daemon.error] smbd: failed
joining uk.example.net (LOGON_FAILURE)

> >  How
> >about NTP, LDAP or PAM?
> >  
> >
> I'm not sure what the question here is.  You can always use NTP for time 
> synchronization. You won't be able to acquire a Kerberos TGT ticket if 
> your time is off by 5 minutes or so.

I wasn't sure whether the 'smbadm join' does additional configuration in
the background.  There are several Domain Controllers and I configured
NTP to use the time servers on two of them.  Synchronization should be
well within 5 minutes.

> >How does it compare with Scott Lowe's "Solaris 10-AD Integration"?
> >
> >http://blog.scottlowe.org/2007/04/25/solaris-10-ad-integration-version-3/
> >
> >I'm guessing that the LDAP configuration would need to be modified to
> >specify the account in Active Directory that will be used to bind to
> >Active Directory for LDAP queries.
> >  
> >
> Yes.  During domain join, a security context to an LDAP service on the 
> specified AD server is established for the user account (i.e. the 
> username argument of the smbadm join CLI).  After the system is joined 
> to a domain, the computer account will be used to bind to AD for any 
> subsequent LDAP requests.
> 
> >Does idmap support using LDAP queries to extract UNIX attributes from
> >Active Directory?
> >  
> >
> I'll let the Winchester folks to answer any idmap related questions.
> 
> Natalie
> 
> >Thanks in anticipation
> >--
> >John Connett
> >
> >_______________________________________________
> >storage-discuss mailing list
> >[email protected]
> >http://mail.opensolaris.org/mailman/listinfo/storage-discuss
> >  
> >
> 

_______________________________________________
storage-discuss mailing list
[email protected]
http://mail.opensolaris.org/mailman/listinfo/storage-discuss

Reply via email to