diff options
author | John Terpstra <jht@samba.org> | 2005-05-27 23:07:33 +0000 |
---|---|---|
committer | Gerald W. Carter <jerry@samba.org> | 2008-04-23 08:46:40 -0500 |
commit | 029f9f8d12bb42cc76a395f51a475004a97dabf3 (patch) | |
tree | ed9061c1123881532aeb55a69a5836127a6a5b96 /docs/Samba-Guide/SBE-AddingUNIXClients.xml | |
parent | 217b7a88eafdbeb2415c2c8390094e129180e64b (diff) | |
download | samba-029f9f8d12bb42cc76a395f51a475004a97dabf3.tar.gz samba-029f9f8d12bb42cc76a395f51a475004a97dabf3.tar.bz2 samba-029f9f8d12bb42cc76a395f51a475004a97dabf3.zip |
Progress update.
(This used to be commit 64f544e566cea56c88091d5443971c39d8c9355c)
Diffstat (limited to 'docs/Samba-Guide/SBE-AddingUNIXClients.xml')
-rw-r--r-- | docs/Samba-Guide/SBE-AddingUNIXClients.xml | 148 |
1 files changed, 55 insertions, 93 deletions
diff --git a/docs/Samba-Guide/SBE-AddingUNIXClients.xml b/docs/Samba-Guide/SBE-AddingUNIXClients.xml index 646e0ecd20..0135be8a26 100644 --- a/docs/Samba-Guide/SBE-AddingUNIXClients.xml +++ b/docs/Samba-Guide/SBE-AddingUNIXClients.xml @@ -78,9 +78,8 @@ <sect1> <title>Dissection and Discussion</title> - <para><indexterm> - <primary>winbind</primary> - </indexterm> + <para> + <indexterm><primary>winbind</primary></indexterm> Recent Samba mailing-list activity is witness to how many sites are using winbind. Some have no trouble at all with it, yet to others the problems seem insurmountable. Periodically there are complaints concerning an inability to achieve identical user and group IDs between Windows and UNIX environments. @@ -101,42 +100,29 @@ the immediate technical problem, but also can understand how needs may change. </para> - <para><indexterm> - <primary>integrate</primary> - </indexterm> + <para> + <indexterm><primary>integrate</primary></indexterm> There are a few facts we should note when dealing with the question of how best to integrate UNIX/Linux clients and servers into a Windows networking environment: </para> <itemizedlist> - <listitem><para><indexterm> - <primary>Domain Controller</primary> - </indexterm><indexterm> - <primary>authoritative</primary> - </indexterm><indexterm> - <primary>accounts</primary> - <secondary>authoritative</secondary> - </indexterm><indexterm> - <primary>PDC</primary> - </indexterm><indexterm> - <primary>BDC</primary> - </indexterm> + <listitem><para> + <indexterm><primary>Domain Controller</primary></indexterm> + <indexterm><primary>authoritative</primary></indexterm> + <indexterm><primary>accounts</primary><secondary>authoritative</secondary></indexterm> + <indexterm><primary>PDC</primary></indexterm> + <indexterm><primary>BDC</primary></indexterm> A domain controller (PDC or BDC) is always authoritative for all accounts in its Domain. This means that a BDC must (of necessity) be able to resolve all account UIDs and GIDs to the same values that the PDC resolved them to. </para></listitem> - <listitem><para><indexterm> - <primary>local accounts</primary> - </indexterm><indexterm> - <primary>Domain Member</primary> - <secondary>authoritative</secondary> - <tertiary>local accounts</tertiary> - </indexterm><indexterm> - <primary>Domain accounts</primary> - </indexterm><indexterm> - <primary>winbindd</primary> - </indexterm> + <listitem><para> + <indexterm><primary>local accounts</primary></indexterm> + <indexterm><primary>Domain Member</primary><secondary>authoritative</secondary><tertiary>local accounts</tertiary></indexterm> + <indexterm><primary>Domain accounts</primary></indexterm> + <indexterm><primary>winbindd</primary></indexterm> A domain member can be authoritative for local accounts, but is never authoritative for domain accounts. If a user is accessing a domain member server and that user's account is not known locally, the domain member server must resolve the identity of that user @@ -147,45 +133,34 @@ <listitem><para> Samba, when running on a domain member server, can resolve user identities from a number of sources: + </para> <itemizedlist> - <listitem><para><indexterm> - <primary>getpwnam</primary> - </indexterm><indexterm> - <primary>getgrnam</primary> - </indexterm><indexterm> - <primary>NSS</primary> - </indexterm><indexterm> - <primary>LDAP</primary> - </indexterm><indexterm> - <primary>NIS</primary> - </indexterm> + <listitem><para> + <indexterm><primary>getpwnam</primary></indexterm> + <indexterm><primary>getgrnam</primary></indexterm> + <indexterm><primary>NSS</primary></indexterm> + <indexterm><primary>LDAP</primary></indexterm> + <indexterm><primary>NIS</primary></indexterm> By executing a system <command>getpwnam()</command> or <command>getgrnam()</command> call. On systems that support it, this utilizes the name service switch (NSS) facility to resolve names according to the configuration of the <filename>/etc/nsswitch.conf</filename> file. NSS can be configured to use LDAP, winbind, NIS, or local files. </para></listitem> - <listitem><para><indexterm> - <primary>passdb backend</primary> - </indexterm><indexterm> - <primary>PADL</primary> - </indexterm><indexterm> - <primary>nss_ldap</primary> - </indexterm> + <listitem><para> + <indexterm><primary>passdb backend</primary></indexterm> + <indexterm><primary>PADL</primary></indexterm> + <indexterm><primary>nss_ldap</primary></indexterm> Performing, via NSS, a direct LDAP search (where an LDAP passdb backend has been configured). This requires the use of the PADL nss_ldap tool (or equivalent). </para></listitem> - <listitem><para><indexterm> - <primary>winbindd</primary> - </indexterm><indexterm> - <primary>SID</primary> - </indexterm><indexterm> - <primary>winbindd_idmap.tdb</primary> - </indexterm><indexterm> - <primary>winbindd_cache.tdb</primary> - </indexterm> + <listitem><para> + <indexterm><primary>winbindd</primary></indexterm> + <indexterm><primary>SID</primary></indexterm> + <indexterm><primary>winbindd_idmap.tdb</primary></indexterm> + <indexterm><primary>winbindd_cache.tdb</primary></indexterm> Directly by querying <command>winbindd</command>. The <command>winbindd</command> contacts a domain controller to attempt to resolve the identity of the user or group. It receives the Windows networking security identifier (SID) for that appropriate @@ -194,18 +169,14 @@ <filename>winbindd_cache.tdb</filename> files. </para> - <para><indexterm> - <primary>idmap backend</primary> - </indexterm><indexterm> - <primary>mapping</primary> - </indexterm> - If the parameter - <smbconfoption name="idmap backend">ldap:ldap://myserver.domain</smbconfoption> + <para> + <indexterm><primary>idmap backend</primary></indexterm> + <indexterm><primary>mapping</primary></indexterm> + If the parameter <smbconfoption name="idmap backend">ldap:ldap://myserver.domain</smbconfoption> was specified and the LDAP server has been configured with a container in which it may store the IDMAP entries, all domain members may share a common mapping. </para></listitem> </itemizedlist> - </para> <para> Irrespective of how &smb.conf; is configured, winbind creates and caches a local copy of @@ -465,36 +436,27 @@ All accounts in <filename>/etc/passwd</filename> or in <filename>/etc/group</filename>. </para></listitem> - <listitem><para><indexterm> - <primary>NSS</primary> - </indexterm><indexterm> - <primary>compat</primary> - </indexterm><indexterm> - <primary>ldap</primary> - </indexterm><indexterm> - <primary>nis</primary> - </indexterm><indexterm> - <primary>nisplus</primary> - </indexterm><indexterm> - <primary>hesiod</primary> - </indexterm><indexterm> - <primary>ldap</primary> - </indexterm><indexterm> - <primary>nss_ldap</primary> - </indexterm><indexterm> - <primary>PADL Software</primary> - </indexterm> + <listitem><para> + <indexterm><primary>NSS</primary></indexterm> + <indexterm><primary>compat</primary></indexterm> + <indexterm><primary>ldap</primary></indexterm> + <indexterm><primary>nis</primary></indexterm> + <indexterm><primary>nisplus</primary></indexterm> + <indexterm><primary>hesiod</primary></indexterm> + <indexterm><primary>ldap</primary></indexterm> + <indexterm><primary>nss_ldap</primary></indexterm> + <indexterm><primary>PADL Software</primary></indexterm> Resolution via NSS. On NSS-enabled systems, there is usually a facility to resolve IDs - via multiple methods. The methods typically include <command>files</command>, <command>compat</command>, <command>db</command>, <command>ldap</command>, - <command>nis</command>, <command>nisplus</command>, <command>hesiod.</command> When correctly installed, Samba adds to this list - the <command>winbindd</command> facility. The ldap facility is frequently the nss_ldap - tool provided by PADL Software. + via multiple methods. The methods typically include <command>files</command>, + <command>compat</command>, <command>db</command>, <command>ldap</command>, + <command>nis</command>, <command>nisplus</command>, <command>hesiod.</command> When + correctly installed, Samba adds to this list the <command>winbindd</command> facility. + The ldap facility is frequently the nss_ldap tool provided by PADL Software. </para></listitem> </itemizedlist> - <para><indexterm> - <primary>Identity resolution</primary> - </indexterm> + <para> + <indexterm><primary>Identity resolution</primary></indexterm> The diagram in <link linkend="ch9-sambadc"/> demonstrates the relationship of Samba and system components that are involved in the identity resolution process where Samba is used as a domain member server within a Samba domain control network. @@ -719,7 +681,7 @@ Join to 'MEGANET2' failed. </procedure> <smbconfexample id="ch9-sdmsdc"> -<title>Samba Domain Member in Samba Domain Control Context &smbmdash; &smb.conf; File</title> +<title>Samba Domain Member in Samba Domain Using LDAP &smbmdash; &smb.conf; File</title> <smbconfcomment>Global parameters</smbconfcomment> <smbconfsection name="[global]"/> <smbconfoption name="unix charset">LOCALE</smbconfoption> @@ -1018,7 +980,7 @@ MEGANET2+PIOps:x:10005: </procedure> <smbconfexample id="ch0-NT4DSDM"> -<title>Samba Domain Member Server &smb.conf; File for NT4 Domain</title> +<title>Samba Domain Member Server Using Winbind &smb.conf; File for NT4 Domain</title> <smbconfcomment>Global parameters</smbconfcomment> <smbconfsection name="[global]"/> <smbconfoption name="unix charset">LOCALE</smbconfoption> @@ -1110,7 +1072,7 @@ Joined domain MEGANET2. </procedure> <smbconfexample id="ch0-NT4DSCM"> -<title>Samba Domain Member Server &smb.conf; File for NT4 Domain</title> +<title>Samba Domain Member Server Using Local Accounts &smb.conf; File for NT4 Domain</title> <smbconfcomment>Global parameters</smbconfcomment> <smbconfsection name="[global]"/> <smbconfoption name="unix charset">LOCALE</smbconfoption> |