diff options
Diffstat (limited to 'docs/Samba-HOWTO-Collection/TOSHARG-TheNetCommand.xml')
-rw-r--r-- | docs/Samba-HOWTO-Collection/TOSHARG-TheNetCommand.xml | 64 |
1 files changed, 62 insertions, 2 deletions
diff --git a/docs/Samba-HOWTO-Collection/TOSHARG-TheNetCommand.xml b/docs/Samba-HOWTO-Collection/TOSHARG-TheNetCommand.xml index b4fab1c978..a5e4a89826 100644 --- a/docs/Samba-HOWTO-Collection/TOSHARG-TheNetCommand.xml +++ b/docs/Samba-HOWTO-Collection/TOSHARG-TheNetCommand.xml @@ -661,6 +661,7 @@ Successfully granted rights. </screen> Next, the domain user <constant>jht</constant> is given the privileges needed for day to day administration: +<screen> &rootprompt; net rpc rights grant "MIDEARTH\jht" \ SeMachineAccountPrivilege SePrintOperatorPrivilege \ SeAddUsersPrivilege SeDiskOperatorPrivilege \ @@ -712,17 +713,75 @@ SeDiskOperatorPrivilege <title>Managing Trust Relationships</title> <para> - Document how to set up trusts here!!!!!!!!!!! + There are essentially two types of trust relationships. The first between domain controllers and domain + member machines (network clients), the second trusts between domains (called inter-domain trusts). All + Samba servers that pasticipate in domain security require a domain membership trust account, as do like + Windows NT/2KX/XPP workstations. </para> <sect2> <title>Machine Trust Accounts</title> <para> + A Samba server domain trust account can be validated as shown in this example: <screen> &rootprompt; net rpc testjoin Join to 'MIDEARTH' is OK </screen> + Where there is no domain membership account, or when the account credentials are not valid the following + results will be observed: +<screen> +net rpc testjoin -S DOLPHIN +Join to domain 'WORLDOCEAN' is not valid +</screen> + </para> + + <para> + The equivalent command for joining a Samba server to a Windows ADS domain is shown here: +<screen> +&rootprompt; net ads testjoin +Using short domain name -- TAKEAWAY +Joined 'LEMONADE' to realm 'TAKEAWAY.BIZ' +</screen> + In the event that the ADS trust was not established, or is broken for one reason or another, the following + error message may be obtained: +<screen> +&rootprompt; net ads testjoin -UAdministrator%secret +Join to domain is not valid +</screen> + </para> + + <para> + The following demonstrates the process of creating a machine trust account in the target domain for the + Samba server from which the command is executed: +<screen> +&rootprompt; net rpc join -S FRODO -Uroot%not24get +Joined domain MIDEARTH. +</screen> + The joining of a Samba server to a Samba domain results in the creation of a machine account. An example + of this is shown here: +<screen> +&rootprompt; pdbedit -Lw merlin\$ +merlin$:1009:9B4489D6B90461FD6A3EC3AB96147E16:\ +176D8C554E99914BDF3407DEA2231D80:[S ]:LCT-42891919: +</screen> + The equivalent command to join a Samba server to a Windows ADS domain is shown here: +<screen> +&rootprompt; net ads join -UAdministrator%not24get +Using short domain name -- GDANSK +Joined 'FRANDIMITZ' to realm 'GDANSK.ABMAS.BIZ' +</screen> + </para> + + <para> + There is no specific option to remove a machine account from a domain. When a domain member that is a + Windows machine is withdrawn from the domain the domain membership account is not automatically removed + either. Inactive domain member accounts can be removed using any convenient tool. If necessary, the + machine account can be removed using the following <command>net</command> command: +<screen> +&rootprompt; net rpc user delete HERRING\$ -Uroot%not24get +Deleted user account. +</screen> </para> </sect2> @@ -731,7 +790,8 @@ Join to 'MIDEARTH' is OK <title>Inter-Domain Trusts</title> <para> - Document how to set up trusts here!!!!!!!!!!! + Inter-domain trust relationships form the primary mechanism by which users from one domain can be granted + access rights and privileges in another domain. </para> </sect2> |