sssd, nss-ldapd and nss ldap are also supported (and recommended)
alternatives to winbind. Indeed, on the DC winbind does not work for all
of rfc2307 as offered out of the box with the former.
>
> On a member server where the source of the AD users is any different NSS source
> than nss_winbind you have to configure the idmap nss backend. Theoretically
> this would also be required if you would use sssd.
No idmap mapping has to be configured for sssd. There is a single
configuration file which most of us here have little if any difficulty
with. Indeed, there is a (albeit rather outdated) howto for sssd in the
samba wiki. Similarly for nss-ldapd.
>
> Because I read the sssd recommendations so often on the list recently - once
> more: sssd is NOT the right thing for Samba member server setups.
>
sssd is perfect for samba4 member server setups, not least for its
superb and modern AD backend designed around the Samba4 libraries.
Just my €0.02
Cheers,
Steve
+1
With sssd including a first class AD backend built around the samba4
libraries themselves, I too would would like to know why 'sssd in NOT
the right thing'. As a hands on user with very limited resources, who
has to maintain a domain with 600 adoslescents throwing everything they
can at it, I'd say it's the ONLY way to go;)
Winbind and sssd do exactly the same job. Choose whichever one you feel
happy with.
>
> sssd supports user authentication for the pam stack nicely but this is not what
> smbd needs.
winbind also needs to be included in your pam configuration. smbd works
perfectly on a member server with both nss and pam controlled by sssd.
> sssh also just provides a flat view on the users and groups from an
> AD domain with no distinction between local acccounts or accounts from domain A
> or domain B. sssh uses samba libraries but it does not play information back
> to smbd like winbind does. As written before you would have to configure idmap
> nss and run winbind in addition to sssd but you will still have the problems
> with the flat view on the user and group name space.
sssd does not need winbind running. You must NOT run winbindd together
with sssd. sssd is a substitute for winbindd. Use one or the other.
> If someone on the list
> writes that sssd in Samba member servers is supported, than this is a personal
> opinion of that person but this is the opposite what the samba developers tell
> you.
>
I've no idea what the personal opinions of the Samba developers are but
many of us here support sssd with Samba and certainly the sssd
developers support it fully. Of course, we mere samba list members
support it and shall continue to do so. We also help out with winbind
configurations too, especially on member servers.
> The problem that Denis descibed in the beginning of this thread are a result of
> such a sssd/smbd misconfiguration. If you see any recommendation about sssd in
> combination with smbd member server setups in the wiki, please let me know, so
> we can correct it.
>
I believe the OP had problems because he had not included rfc2307
attributes in the DN of his users and groups.
Cheers,
Steve
> Cheers
> Björn
Thanks.
Steve
something more generic ...
> server role = active directory domain controller
remember the golden rule of thumb: a dc is a dc is a dc. no winbind needed and
no user logins here. In one of the next samba versions it is planned to merge
the winbind 3 and the winbind 4, then you will be able to use all the features
of the winbind 3. you can set "idmap_ldb:use rfc2307 = yes" on the samba 4 DC
though. And before you shout out loud, yes, this is undocumented, see bug 9840.
Documentation patches are welcome :-)
But please follow the golden dc rule. the winbind nss info parameter will work
nice if you use it like we suggested, on a member server with the "classic"
winbind.
Björn
--
SerNet GmbH, Bahnhofsallee 1b, 37081 Göttingen
☎ +49-551-370000-0, ℻ +49-551-370000-9
AG Göttingen, HRB 2816, GF: Dr. Johannes Loxen
(1) http://en.wikipedia.org/wiki/Saci_(Brazilian_folklore)
--
*Marcio Merlone*
TI - Administrador de redes
*A1 Engenharia - Unidade Corporativa*
Fone: +55 41 3616-3797
Cel: +55 41 9689-0036
http://www.a1.ind.br/ <http://www.a1.ind.br>
If I can bring my AD users to the unix floor by whatever mean, I'd like
to select which ones are allowed by defining their shell as /bin/bash,
opposed to mortals, which get /bin/false. That implies on "winbind nss
info = sfu" (if goind the winbind way) so I can define its login shell
on AD and have this available to nss. That did not work on DC (disregard
my last post citing a member server).
I'm still figuring out the paradigms I'll have to break. On my
samba3+OpenLDAP env, I have a unix user database (OpenLDAP) that is
"converted" as a windows database by samba. On samba4 I have the other
way around, a windows user database (AD) that is read by a unix env. The
former is very mature and complete for the unix env, while the latter,
well, I'll have to get used to. :)
I think the question can be simplified to: on _the_ DC, what is the best
approach to bring my AD users down to the shell and home defined on
their SFU attributes?
A side question: if the DC is also the main file server for my windows
network doesn't that also requires winbind - opposed to "no winbind needed"?
Thanks for your time, best regards.
--
*Marcio Merlone*
TI - Administrador de redes
*A1 Engenharia - Unidade Corporativa*
Fone: +55 41 3616-3797
Cel: +55 41 9689-0036
http://www.a1.ind.br/ <http://www.a1.ind.br>
if you follow the dc is a dc is a dc rule then your users don't log in via ssh,
so simple :-). only your DC admins log on via local accoungts then.
This is the best practice actually. If you want to enable shell logins do that
on a different machine. Of course you can also ignore the best practice rule
and enable winbind4. But you know about the limits.
> If I can bring my AD users to the unix floor by whatever mean, I'd
> like to select which ones are allowed by defining their shell as
> /bin/bash, opposed to mortals, which get /bin/false. That implies on
> "winbind nss info = sfu" (if goind the winbind way) so I can define
> its login shell on AD and have this available to nss. That did not
> work on DC (disregard my last post citing a member server).
have a look at the available options for that parameter in the smb.conf man
page. Remember this is for the "classic" winbind which is not yet merged with
the "AD winbind".
> I'm still figuring out the paradigms I'll have to break. On my
> samba3+OpenLDAP env, I have a unix user database (OpenLDAP) that is
> "converted" as a windows database by samba. On samba4 I have the
> other way around, a windows user database (AD) that is read by a
> unix env. The former is very mature and complete for the unix env,
> while the latter, well, I'll have to get used to. :)
:-)
> I think the question can be simplified to: on _the_ DC, what is the
> best approach to bring my AD users down to the shell and home
> defined on their SFU attributes?
see above
> A side question: if the DC is also the main file server for my
> windows network doesn't that also requires winbind - opposed to "no
> winbind needed"?
it is still not *required*. But it's much nicer for you to see which files
belong to which users on the shell. But again: you ignore all the advices if
you do this, so don't complain too much about the the problems you have with a
DC plus fileserver on one machine setup.
Cheers
Björn
--
SerNet GmbH, Bahnhofsallee 1b, 37081 Göttingen
☎ +49-551-370000-0, ℻ +49-551-370000-9
AG Göttingen, HRB 2816, GF: Dr. Johannes Loxen