Samba as Active Directory Member Server & Station
Samba comme Serveur ou Station Membre d'Active Directory

 

Exit

Data

SADMS

Utilities

Shares

ACLs

PAM

Diagnostics

Tools

Options

Output

?

exit

input data

Samba configuration

users, groups and homes

shares

Manage ACLs on files and directories

Install PAM modules to allow AD logins on Linux machine

diagnostics

 

options

output window

help


Detect (1)

PreCheck (3)

List users

Create share

Edit

Install PAM

Kerberos test

Update RPMs

Verbose

Clear

About


(limited) detection of data

check libraries and packages prerequisites (including Samba)

list (local and domain) users

all-options create group share

edit ACLs for a given file or folder

Install modules (*)
PAM winbind
PAM mkhomedir
PAM mount

Kerberos test

update Samba RPMs

verbose output

clear output

about


Load

PostCheck

List groups

Templates/Create group workspace

Enable

Uninstall PAM

Domain test

 

Expert

Save to file

Version


load data from file

check consistence of configuration after install

list groups (local and domain) groups

create group workspace (all groups can read/write)

enable ACLs for a given partition

Uninstall modules
PAM winbind
PAM mkhomedir
PAM mount

test domain membership

 

expert mode for PAM modules, may result in lost authentication, check affected PAM files

save output window to file

SADMS version


Save

Install (4)

Make homes (5)

Templates/Create readers/writers

Disable

Test install

Network test

 

Read domain prefix




save data to file

install SADMS

make users' homes

create group workspace with one group being allowed to write

disable ACLs for a given partition

If checked, install above submits results of config file for approval but real config files are not altered

basic network test (connectivity, DNS resolution)

 

read value of domain prefix insertion in id




Validate (2)

Uninstall

Reset homes permissions

Templates/Create group mailbox


More/Install PAM winbind

DNS test

 

Toggle domain prefix




validate data

uninstall SADMS

reset permissions on user's homes

create group workspace with one group being able to read


Install modules (*)
PAM winbind

attempt to locate Active Directory services through DNS

 

toggle insertion of domain prefix in id




Clear

View config files

Remove homes

Inline "includes" in smb.conf


More/Uninstall PAM winbind

NMB test

 





clear input data

view of Samba, Kerberos, NSS, PAM config files

remove homes

unfold include files as inline data in smb.conf (for Webadmin, ...)


Uninstall modules PAM winbind

Netbios name space test

 






Refresh Samba daemons config

Set Home Permissions



More/Install PAM mkhomedir

SMB test

 






force Samba daemons to reread config files

permission template for home directories (chown syntax)



Install module (*)
PAM mkhomedir

Netbios sharing test

 






Restart Samba daemons

Set user filter ..



More/Install PAM mkhomedir

Authentication test

 






restart Samba daemons

select users to apply above operations to



Uninstall module PAM mkhomedir

authenticate domain user against domain

 






Synchronize clocks

Set group filter ..



More/Install PAM mount

Credentials

 






synchronize local clock against KDC clock

select groups to apply above operations to



Install module (*) (**)
PAM mount

user/password to authenticate with

 






Purge Samba caches

Group map



More/Uninstall PAM mount


 






flush Samba caches

group map



Uninstall module PAM mount


 




(standard operation sequence)
(*) Care has been taken to yield PAM conf files that make sense but will this handle quixotic conf files (there is no simple way of having a perfect result) ? Altering PAM config files alters the permission system and can result in the system crashing. Installing PAM is not recommended unless you know what your are doing and go through a prior test phase. Precautions to be taken : save the /etc/pam.d directory and leave a root session open on a terminal just in case ...