segunda-feira, outubro 03, 2016

Samba 4 as domain controller using debian 8.5


apt-get -y install rsync
apt-get -y install vim
apt-get -y install apt-file
apt-get -y install mlocate
apt-get -y install samba
apt-get -y install smbclient winbind
apt-get -y install chkconfig
apt-get -y install klibc-utils
apt-get -y install krb5-user libpam-krb5
apt-get -y install libnss-winbind




samba-tool domain provision --use-rfc2307 --realm=AD.domain.com --domain=domain --server-role=dc --adminpass='PassWord'

Looking up IPv4 addresses
Looking up IPv6 addresses
No IPv6 address will be assigned
Setting up share.ldb
Setting up secrets.ldb
Setting up the registry
Setting up the privileges database
Setting up idmap db
Setting up SAM db
Setting up sam.ldb partitions and settings
Setting up sam.ldb rootDSE
Pre-loading the Samba 4 and AD schema
Adding DomainDN: DC=ad,DC=domain,DC=com,DC=br
Adding configuration container
Setting up sam.ldb schema
Setting up sam.ldb configuration data
Setting up display specifiers
Modifying display specifiers
Adding users container
Modifying users container
Adding computers container
Modifying computers container
Setting up sam.ldb data
Setting up well known security principals
Setting up sam.ldb users and groups
Setting up self join
Adding DNS accounts
Creating CN=MicrosoftDNS,CN=System,DC=ad,DC=domain,DC=com,DC=br
Creating DomainDnsZones and ForestDnsZones partitions
Populating DomainDnsZones and ForestDnsZones partitions
Setting up sam.ldb rootDSE marking as synchronized
Fixing provision GUIDs
A Kerberos configuration suitable for Samba 4 has been generated at /var/lib/samba/private/krb5.conf
Setting up fake yp server settings
Once the above files are installed, your Samba4 server will be ready to use
Server Role:           active directory domain controller
Hostname:              dc1
NetBIOS Domain:        domain
DNS Domain:            ad.domain.com
DOMAIN SID:            S-1-5-21-2204263205-3035504052-alska;lska;lska

ln -sf /var/lib/samba/private/krb5.conf /etc/krb5.conf


GPO - Polices
Map Network Shared Drive in Group Policy




--- samba as ad member smb client with winbindd working getent passwd
smb.conf bellow is what worked for me ...

/etc/hosts
192.168.7.1     DC1.ad.domain.com    DC1
 /etc/resolv.conf 
domain ad.domain.com
nameserver 192.168.7.1
smb.conf
dns forwarder = 192.168.10.254

smbcontrol all reload-config
change /etc/nsswitch.conf

smb.conf - client
[global]
       netbios name = SMB-TEST
       security = ADS
       workgroup = domain
       realm = AD.domain.com
 
       log file = /var/log/samba/%m.log
       log level = 1
       idmap config *:backend = tdb
       idmap config *:range = 2000-9999
       winbind enum users = yes
        winbind enum groups = yes
        template homedir = /home/%D/%U
        template shell = /bin/bash
        winbind use default domain = yes




apt-get -y install libpam-winbind
(allow setup change files /etc/pam.d/common*)


# The primary network interface
allow-hotplug eth0
#iface eth0 inet dhcp
iface eth0 inet static
        address 192.168.7.2
        netmask 255.255.255.0
        network 192.168.7.0
        broadcast 192.168.7.255
        gateway 192.168.7.254

cat /etc/resolv.conf 
domain ad.domain.com
nameserver 192.168.7.1

cat /etc/hosts
127.0.0.1       localhost 
192.168.7.2     smb-test.ad.domain.com smb-test



Nenhum comentário: