John Connett wrote:

>On Wed, 2008-03-05 at 14:15 -0800, Natalie Li wrote:
>  
>
>>John Connett wrote:
>>
>>    
>>
>>>On Fri, 2008-02-29 at 07:10 -0800, Ross wrote:
>>> 
>>>
>>>      
>>>
>>>>Update:  It appears it's not even that, testing the CIFS server on another 
>>>>machine, it looks like you just need a reboot after setting it up.  So the 
>>>>whole process to enable CIFS on a brand new b82 box is:
>>>>
>>>>- Install snv_82.  Configure kerberos, networking and DNC when prompted.
>>>>- Once installed, start the CIFS server and join the domain:
>>>>  # svcadm enable -r smb/server
>>>>  # smbadm join -u domain-user domain-name
>>>>- Reboot server
>>>>
>>>>And then just create zfs filesystems and set sharesmb=on as needed.
>>>>   
>>>>
>>>>        
>>>>
>>>I have been trying to join a snv 83a SPARC system to a domain, so far
>>>without success.
>>>
>>>      
>>>
>>Did you see any error messages in the syslog after you ran the smbadm 
>>join CLI?  Is it a multiple domain controllers environment?
>>
>>    
>>
>>> The system had a text mode initial install just
>>>preserving the slice that holds a zpool.  Networking and kerberos were
>>>configured during the install.  What is DNC?
>>>
>>> 
>>>
>>>      
>>>
>>I'm not so sure if the domain join failure has anything to do with the 
>>installation.  As long as you configure your DNS and Kerberos similar to 
>>what mentioned in the Admin Guide prior to joining your system to a 
>>domain, you should be good to go.  The "How to Configure an AD Client" 
>>section of the CIFS admin guide might be helpful.
>>
>>http://docs.sun.com/app/docs/doc/820-2429/configureadtask?a=view
>>
>>Note that both 'ads_domain' and 'ads_enable' properties are obsolete as 
>>of snv_81. Thus, you don't have to set those via sharectl.
>>
>>    
>>
>>>Do I need to modify the kerberos configuration post-installation?
>>>
>>>      
>>>
>>Yes. See above.
>>    
>>
>
>Here's what I have:
>======================================================================
>bash-3.2# cat /etc/krb5/krb5.conf
>[libdefaults]
>        default_realm = uk.example.net 
>
It should be "default_realm = UK.EXAMPLE.NET"

>
>[realms]
>        uk.example.net = {   
>
It should be "UK.EXAMPLE.NET = {"

>           
>       kdc = uknt-70.uk.example.net
>        kdc = uknt-72.uk.example.net
>        admin_server = uknt-70.uk.example.net
>        kpasswd_server = uknt-70.uk.example.net
>        kpasswd_protocol = SET_CHANGE
>        }
>
>[domain_realm]
>        .uk..net = UK.EXAMPLE.NET
>
>[logging]
>        default = FILE:/var/krb5/kdc.log
>        kdc = FILE:/var/krb5/kdc.log
>        kdc_rotate = {
>
># How often to rotate kdc.log. Logs will get rotated no more
># often than the period, and less often if the KDC is not used#
>frequently.
>
>        period = 1d
>
>
># how many versions of kdc.log to keep around (kdc.log.0,
>kdc.log.1, ...)
>        version = 10
>}
>[appdefaults]
>        kinit = {
>        renewable = true
>        forwardable= true
>        }
>  
>

Kerberos realm should be composed of all upper-case letters.  However, 
this is not the root cause of your problem.

>bash-3.2# 
>======================================================================
>
>Here's what happened on the command line:
>
>bash-3.2# smbadm join -u Administrator uk.example.net
>Enter domain password: 
>Joining 'uk.example.net' ... this may take a minute ...
>failed to join domain 'uk.example.net' (LOGON_FAILURE)
>bash-3.2# 
>
>I found the following in /var/adm/messages:
>
>Mar  5 22:48:04 tequila idmap[314]: [ID 840489 daemon.error] idmapd:
>Couldn't open and SASL bind LDAP connections to any domain controllers;
>discovery of some items will fail
>Mar  5 22:48:05 tequila last message repeated 3 times
>Mar  5 22:50:44 tequila smbd[401]: [ID 871254 daemon.error] smbd: failed
>joining uk.example.net (LOGON_FAILURE)
>  
>
Please disable the packet signing on your domain controller and try 
again.  There is an open bug for this issue which only happens on sparc 
system.
{See CR 6615461).

Natalie

>  
>
>>> How
>>>about NTP, LDAP or PAM?
>>> 
>>>
>>>      
>>>
>>I'm not sure what the question here is.  You can always use NTP for time 
>>synchronization. You won't be able to acquire a Kerberos TGT ticket if 
>>your time is off by 5 minutes or so.
>>    
>>
>
>I wasn't sure whether the 'smbadm join' does additional configuration in
>the background.  There are several Domain Controllers and I configured
>NTP to use the time servers on two of them.  Synchronization should be
>well within 5 minutes.
>
>  
>
>>>How does it compare with Scott Lowe's "Solaris 10-AD Integration"?
>>>
>>>http://blog.scottlowe.org/2007/04/25/solaris-10-ad-integration-version-3/
>>>
>>>I'm guessing that the LDAP configuration would need to be modified to
>>>specify the account in Active Directory that will be used to bind to
>>>Active Directory for LDAP queries.
>>> 
>>>
>>>      
>>>
>>Yes.  During domain join, a security context to an LDAP service on the 
>>specified AD server is established for the user account (i.e. the 
>>username argument of the smbadm join CLI).  After the system is joined 
>>to a domain, the computer account will be used to bind to AD for any 
>>subsequent LDAP requests.
>>
>>    
>>
>>>Does idmap support using LDAP queries to extract UNIX attributes from
>>>Active Directory?
>>> 
>>>
>>>      
>>>
>>I'll let the Winchester folks to answer any idmap related questions.
>>
>>Natalie
>>
>>    
>>
>>>Thanks in anticipation
>>>--
>>>John Connett
>>>
>>>_______________________________________________
>>>storage-discuss mailing list
>>>[email protected]
>>>http://mail.opensolaris.org/mailman/listinfo/storage-discuss
>>> 
>>>
>>>      
>>>
>
>  
>

_______________________________________________
storage-discuss mailing list
[email protected]
http://mail.opensolaris.org/mailman/listinfo/storage-discuss

Reply via email to