On Wed, 2008-03-05 at 14:15 -0800, Natalie Li wrote:
> John Connett wrote:
>
> >On Fri, 2008-02-29 at 07:10 -0800, Ross wrote:
> >
> >
> >>Update: It appears it's not even that, testing the CIFS server on another
> >>machine, it looks like you just need a reboot after setting it up. So the
> >>whole process to enable CIFS on a brand new b82 box is:
> >>
> >>- Install snv_82. Configure kerberos, networking and DNC when prompted.
> >>- Once installed, start the CIFS server and join the domain:
> >> # svcadm enable -r smb/server
> >> # smbadm join -u domain-user domain-name
> >>- Reboot server
> >>
> >>And then just create zfs filesystems and set sharesmb=on as needed.
> >>
> >>
> >
> >I have been trying to join a snv 83a SPARC system to a domain, so far
> >without success.
> >
> Did you see any error messages in the syslog after you ran the smbadm
> join CLI? Is it a multiple domain controllers environment?
>
> > The system had a text mode initial install just
> >preserving the slice that holds a zpool. Networking and kerberos were
> >configured during the install. What is DNC?
> >
> >
> >
> I'm not so sure if the domain join failure has anything to do with the
> installation. As long as you configure your DNS and Kerberos similar to
> what mentioned in the Admin Guide prior to joining your system to a
> domain, you should be good to go. The "How to Configure an AD Client"
> section of the CIFS admin guide might be helpful.
>
> http://docs.sun.com/app/docs/doc/820-2429/configureadtask?a=view
>
> Note that both 'ads_domain' and 'ads_enable' properties are obsolete as
> of snv_81. Thus, you don't have to set those via sharectl.
>
> >Do I need to modify the kerberos configuration post-installation?
> >
> Yes. See above.
Here's what I have:
======================================================================
bash-3.2# cat /etc/krb5/krb5.conf
[libdefaults]
default_realm = uk.example.net
[realms]
uk.example.net = {
kdc = uknt-70.uk.example.net
kdc = uknt-72.uk.example.net
admin_server = uknt-70.uk.example.net
kpasswd_server = uknt-70.uk.example.net
kpasswd_protocol = SET_CHANGE
}
[domain_realm]
.uk..net = UK.EXAMPLE.NET
[logging]
default = FILE:/var/krb5/kdc.log
kdc = FILE:/var/krb5/kdc.log
kdc_rotate = {
# How often to rotate kdc.log. Logs will get rotated no more
# often than the period, and less often if the KDC is not used#
frequently.
period = 1d
# how many versions of kdc.log to keep around (kdc.log.0,
kdc.log.1, ...)
version = 10
}
[appdefaults]
kinit = {
renewable = true
forwardable= true
}
bash-3.2#
======================================================================
Here's what happened on the command line:
bash-3.2# smbadm join -u Administrator uk.example.net
Enter domain password:
Joining 'uk.example.net' ... this may take a minute ...
failed to join domain 'uk.example.net' (LOGON_FAILURE)
bash-3.2#
I found the following in /var/adm/messages:
Mar 5 22:48:04 tequila idmap[314]: [ID 840489 daemon.error] idmapd:
Couldn't open and SASL bind LDAP connections to any domain controllers;
discovery of some items will fail
Mar 5 22:48:05 tequila last message repeated 3 times
Mar 5 22:50:44 tequila smbd[401]: [ID 871254 daemon.error] smbd: failed
joining uk.example.net (LOGON_FAILURE)
> > How
> >about NTP, LDAP or PAM?
> >
> >
> I'm not sure what the question here is. You can always use NTP for time
> synchronization. You won't be able to acquire a Kerberos TGT ticket if
> your time is off by 5 minutes or so.
I wasn't sure whether the 'smbadm join' does additional configuration in
the background. There are several Domain Controllers and I configured
NTP to use the time servers on two of them. Synchronization should be
well within 5 minutes.
> >How does it compare with Scott Lowe's "Solaris 10-AD Integration"?
> >
> >http://blog.scottlowe.org/2007/04/25/solaris-10-ad-integration-version-3/
> >
> >I'm guessing that the LDAP configuration would need to be modified to
> >specify the account in Active Directory that will be used to bind to
> >Active Directory for LDAP queries.
> >
> >
> Yes. During domain join, a security context to an LDAP service on the
> specified AD server is established for the user account (i.e. the
> username argument of the smbadm join CLI). After the system is joined
> to a domain, the computer account will be used to bind to AD for any
> subsequent LDAP requests.
>
> >Does idmap support using LDAP queries to extract UNIX attributes from
> >Active Directory?
> >
> >
> I'll let the Winchester folks to answer any idmap related questions.
>
> Natalie
>
> >Thanks in anticipation
> >--
> >John Connett
> >
> >_______________________________________________
> >storage-discuss mailing list
> >[email protected]
> >http://mail.opensolaris.org/mailman/listinfo/storage-discuss
> >
> >
>
_______________________________________________
storage-discuss mailing list
[email protected]
http://mail.opensolaris.org/mailman/listinfo/storage-discuss