apt-get -y install rsync
apt-get -y install vim
apt-get -y install apt-file
apt-get -y install mlocate
apt-get -y install samba
apt-get -y install smbclient winbind
apt-get -y install chkconfig
apt-get -y install klibc-utils
apt-get -y install krb5-user libpam-krb5
apt-get -y install libnss-winbind
- https://wiki.samba.org/index.php/Setup_a_Samba_Active_Directory_Domain_Controller
- https://wiki.samba.org/index.php/Active_Directory_Naming_FAQ
- https://wiki.samba.org/index.php/DNS#Which_DNS_backend_should_I_choose.3F
- https://wiki.samba.org/index.php/Configure_BIND_as_backend_for_Samba_AD
- https://wiki.samba.org/index.php/Samba4/InitScript
- https://wiki.samba.org/index.php/Backup_and_restore_an_Samba_AD_DC
- https://wiki.samba.org/index.php/Shares_with_Windows_ACLs
- ***https://wiki.samba.org/index.php/Samba4/Linking_AD_and_unix_directories (krb5.conf)
- https://wiki.samba.org/index.php/User_and_Group_management
samba-tool domain provision --use-rfc2307 --realm=AD.domain.com --domain=domain --server-role=dc --adminpass='PassWord'
Looking up IPv4 addresses
Looking up IPv6 addresses
No IPv6 address will be assigned
Setting up share.ldb
Setting up secrets.ldb
Setting up the registry
Setting up the privileges database
Setting up idmap db
Setting up SAM db
Setting up sam.ldb partitions and settings
Setting up sam.ldb rootDSE
Pre-loading the Samba 4 and AD schema
Adding DomainDN: DC=ad,DC=domain,DC=com,DC=br
Adding configuration container
Setting up sam.ldb schema
Setting up sam.ldb configuration data
Setting up display specifiers
Modifying display specifiers
Adding users container
Modifying users container
Adding computers container
Modifying computers container
Setting up sam.ldb data
Setting up well known security principals
Setting up sam.ldb users and groups
Setting up self join
Adding DNS accounts
Creating CN=MicrosoftDNS,CN=System,DC=ad,DC=domain,DC=com,DC=br
Creating DomainDnsZones and ForestDnsZones partitions
Populating DomainDnsZones and ForestDnsZones partitions
Setting up sam.ldb rootDSE marking as synchronized
Fixing provision GUIDs
A Kerberos configuration suitable for Samba 4 has been generated at /var/lib/samba/private/krb5.conf
Setting up fake yp server settings
Once the above files are installed, your Samba4 server will be ready to use
Server Role: active directory domain controller
Hostname: dc1
NetBIOS Domain: domain
DNS Domain: ad.domain.com
DOMAIN SID: S-1-5-21-2204263205-3035504052-alska;lska;lska
ln -sf /var/lib/samba/private/krb5.conf /etc/krb5.conf
GPO - Polices
Map Network Shared Drive in Group Policy
--- samba as ad member smb client with winbindd working getent passwd
smb.conf bellow is what worked for me ...
/etc/hosts
192.168.7.1 DC1.ad.domain.com DC1
/etc/resolv.conf
domain ad.domain.com
nameserver 192.168.7.1
smb.conf
dns forwarder = 192.168.10.254
smbcontrol all reload-config
change /etc/nsswitch.conf
smb.conf - client
[global]
netbios name = SMB-TEST
security = ADS
workgroup = domain
realm = AD.domain.com
log file = /var/log/samba/%m.log
log level = 1
idmap config *:backend = tdb
idmap config *:range = 2000-9999
winbind enum users = yes
winbind enum groups = yes
template homedir = /home/%D/%U
template shell = /bin/bash
winbind use default domain = yes
apt-get -y install libpam-winbind
(allow setup change files /etc/pam.d/common*)
# The primary network interface
allow-hotplug eth0
#iface eth0 inet dhcp
iface eth0 inet static
address 192.168.7.2
netmask 255.255.255.0
network 192.168.7.0
broadcast 192.168.7.255
gateway 192.168.7.254
cat /etc/resolv.conf
domain ad.domain.com
nameserver 192.168.7.1
cat /etc/hosts
127.0.0.1 localhost
192.168.7.2 smb-test.ad.domain.com smb-test
Nenhum comentário:
Postar um comentário