- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Samba install with AD authentication
Operating System - HP-UX
1821537
Members
2307
Online
109633
Solutions
Forums
Categories
Company
Local Language
юдл
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
юдл
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Go to solution
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-01-2006 07:32 AM
тАО12-01-2006 07:32 AM
Can someone point me in to a Step-By-Step procedure on how to configure Samba to use AD authentication.
Solved! Go to Solution.
2 REPLIES 2
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-01-2006 08:14 AM
тАО12-01-2006 08:14 AM
Re: Samba install with AD authentication
Certainly - look at my thread:
http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=949365
Rgds...Geoff
http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=949365
Rgds...Geoff
Proverbs 3:5,6 Trust in the Lord with all your heart and lean not on your own understanding; in all your ways acknowledge him, and he will make all your paths straight.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-01-2006 11:46 AM
тАО12-01-2006 11:46 AM
Solution
I wrestled with this earlier this year and kept some notes on it, hopefully they help. Keep in mind that versions may have changed and your specific config may differ. Two of the main issues I had were trying to use recent version of non-HP Samba rather than the HP CIFS Server, and another pain was setting up Kerberos (the case sensitivity).
Normally I remove any of our site specific info (domain name, etc) but I'm not in the mood.
Geoff's thread was definitely a major reason I was successful though...so a long overdue thanks to Geoff for his thread.
***from my notes***
These are the steps that I needed to make to get CIFS to use ADS to authenticate users.
Required Software:
CIFS A.02.02 (released 1/06) or greater
Kerberos v5 (1.3.5.03) Client
(see Kerberos patch requirements, which include: PHNE_27796 and PHSS_33384)
LDAP-UX Integration
Steps (refer to- http://docs.hp.com/en/B8725-90093/ch05s01.html for HP version):
- Install or verify installation of products listed above, Kerberos patches should be installed first.
- Configure the /etc/krb5.conf file (the example below is from our test server), CASE SENSITIVE!
root@dqvcord1 [ /etc ]
# cat /etc/krb5.conf
[libdefaults]
default_realm = DENTAQUEST.COM
default_tkt_enctypes = DES-CBC-CRC
default_tgs_enctypes = DES-CBC-CRC
ccache_type = 2
[realms]
DENTAQUEST.COM = {
kdc = dqvdc03.dentaquest.com:88
admin_server = dqvdc03.dentaquest.com
}
[domain_realm]
dentaquest.com = DENTAQUEST.COM
.dentaquest.com = DENTAQUEST.COM
[logging]
kdc = FILE:/var/adm/krb5kdc.log
admin_server = FILE:/var/log/kadmin.log
default = FILE:/var/log/krb5lib.log
- As root run kinit and check Kerberos configuration
# kinit jmallett or # kinit jmallett@DENTAQUEST.COM
- Set up the /etc/opt/samba/smb.conf file manually (or run /opt/samba/bin/samba_setup
Example:
# Global parameters
[global]
workgroup = DDPMA
realm = DENTAQUEST.COM
server string = DQVCORD1
security = ADS
client schannel = No
password server = dqvdc03, dqvdc02
log level = 2
log file = /var/opt/samba/log.%m
max log size = 10000
keepalive = 0
socket options = TCP_NODELAY SO_RCVBUF=8192 SO_SNDBUF=8192
load printers = No
show add printer wizard = No
preferred master = No
local master = No
domain master = No
wins server = dqvdc02
root@dqvcord1 [ /etc ]
# cat /etc/opt/samba/smb.conf
# Samba config file created using SWAT
# from 10.10.1.43 (10.10.1.43)
# Date: 2006/02/01 20:41:56
# Global parameters
[global]
workgroup = DDPMA
realm = DENTAQUEST.COM
server string = DQVCORD1
security = ADS
client schannel = No
password server = dqvdc03, dqvdc02
log level = 2
log file = /var/opt/samba/log.%m
max log size = 10000
keepalive = 0
socket options = TCP_NODELAY SO_RCVBUF=8192 SO_SNDBUF=8192
load printers = No
show add printer wizard = No
preferred master = No
local master = No
domain master = No
wins server = dqvdc02
idmap uid = 10000-30000
idmap gid = 10000-30000
template primary group = users
winbind separator = +
winbind enum users = No
winbind enum groups = No
read only = No
create mask = 0664
force create mode = 0664
directory mask = 0775
short preserve case = No
dos filetime resolution = Yes
[Test]
path = /testing
valid users = DDPMA+jmallett
[ECSPROD]
path = /download/ecsprod
valid users = DDPMA+ecsprod, DDPMA+jmallett
[AP]
path = /download/AP
valid users = DDPMA+jmallett, DDPMA+unixadmin
read only = Yes
- Join the ADS domain manually by running:
# net ads join -U or # net ads join -U administrator%password (use first to be prompted rather than typing pass in command line)
- Depending on if you receive errors or not, you may want to update your /etc/nsswitch.conf file to include the following two lines:
passwd: files winbind
group: files winbind
- Start Samba (multiple ways, but I use): /sbin/init.d/samba start
You can 'ps -ef | grep samba' to be sure smdb, nmdb, and winbindd are running.
If nothing else, this might provide some direction. Good luck.
Jim
Normally I remove any of our site specific info (domain name, etc) but I'm not in the mood.
Geoff's thread was definitely a major reason I was successful though...so a long overdue thanks to Geoff for his thread.
***from my notes***
These are the steps that I needed to make to get CIFS to use ADS to authenticate users.
Required Software:
CIFS A.02.02 (released 1/06) or greater
Kerberos v5 (1.3.5.03) Client
(see Kerberos patch requirements, which include: PHNE_27796 and PHSS_33384)
LDAP-UX Integration
Steps (refer to- http://docs.hp.com/en/B8725-90093/ch05s01.html for HP version):
- Install or verify installation of products listed above, Kerberos patches should be installed first.
- Configure the /etc/krb5.conf file (the example below is from our test server), CASE SENSITIVE!
root@dqvcord1 [ /etc ]
# cat /etc/krb5.conf
[libdefaults]
default_realm = DENTAQUEST.COM
default_tkt_enctypes = DES-CBC-CRC
default_tgs_enctypes = DES-CBC-CRC
ccache_type = 2
[realms]
DENTAQUEST.COM = {
kdc = dqvdc03.dentaquest.com:88
admin_server = dqvdc03.dentaquest.com
}
[domain_realm]
dentaquest.com = DENTAQUEST.COM
.dentaquest.com = DENTAQUEST.COM
[logging]
kdc = FILE:/var/adm/krb5kdc.log
admin_server = FILE:/var/log/kadmin.log
default = FILE:/var/log/krb5lib.log
- As root run kinit and check Kerberos configuration
# kinit jmallett or # kinit jmallett@DENTAQUEST.COM
- Set up the /etc/opt/samba/smb.conf file manually (or run /opt/samba/bin/samba_setup
Example:
# Global parameters
[global]
workgroup = DDPMA
realm = DENTAQUEST.COM
server string = DQVCORD1
security = ADS
client schannel = No
password server = dqvdc03, dqvdc02
log level = 2
log file = /var/opt/samba/log.%m
max log size = 10000
keepalive = 0
socket options = TCP_NODELAY SO_RCVBUF=8192 SO_SNDBUF=8192
load printers = No
show add printer wizard = No
preferred master = No
local master = No
domain master = No
wins server = dqvdc02
root@dqvcord1 [ /etc ]
# cat /etc/opt/samba/smb.conf
# Samba config file created using SWAT
# from 10.10.1.43 (10.10.1.43)
# Date: 2006/02/01 20:41:56
# Global parameters
[global]
workgroup = DDPMA
realm = DENTAQUEST.COM
server string = DQVCORD1
security = ADS
client schannel = No
password server = dqvdc03, dqvdc02
log level = 2
log file = /var/opt/samba/log.%m
max log size = 10000
keepalive = 0
socket options = TCP_NODELAY SO_RCVBUF=8192 SO_SNDBUF=8192
load printers = No
show add printer wizard = No
preferred master = No
local master = No
domain master = No
wins server = dqvdc02
idmap uid = 10000-30000
idmap gid = 10000-30000
template primary group = users
winbind separator = +
winbind enum users = No
winbind enum groups = No
read only = No
create mask = 0664
force create mode = 0664
directory mask = 0775
short preserve case = No
dos filetime resolution = Yes
[Test]
path = /testing
valid users = DDPMA+jmallett
[ECSPROD]
path = /download/ecsprod
valid users = DDPMA+ecsprod, DDPMA+jmallett
[AP]
path = /download/AP
valid users = DDPMA+jmallett, DDPMA+unixadmin
read only = Yes
- Join the ADS domain manually by running:
# net ads join -U
- Depending on if you receive errors or not, you may want to update your /etc/nsswitch.conf file to include the following two lines:
passwd: files winbind
group: files winbind
- Start Samba (multiple ways, but I use): /sbin/init.d/samba start
You can 'ps -ef | grep samba' to be sure smdb, nmdb, and winbindd are running.
If nothing else, this might provide some direction. Good luck.
Jim
Hindsight is 20/20
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
Company
Learn About
News and Events
Support
© Copyright 2025 Hewlett Packard Enterprise Development LP