Idmap config ad

From SambaWiki
Revision as of 19:31, 9 March 2015 by Mmuehlfeld (talk | contribs) (Added section about Winbindd on a Samba DC.)
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Introduction

RFC2307 defines the possibility to store e. g. user and group information in an LDAP directory. This allows central administration with several advantages.

RFC2307 attributes are per default in place in a Samba Active Directory.

This documentation describes how to make account and group information available on Member Servers via Winbindd using RFC2307. Alternatives are sssd or nslcd.



Advantages

  • Central administration of users (UID, Login Shell, Home Directory, Primary Group) and groups (GID) directly in Active Directory.
  • Consistent user and group information accross multiple machines.
  • Individual settings for users (e. g. for Login Shell). Other mapping technologies typically use global template settings for all accounts on a host.
  • Central management prevents the necessity for local ID mappings, that may cause loosing file ownership if the local database corrupts.
  • Easy user/group management via the default Microsoft tools (e. g. Active Directory Users and Computers), which are part of RSAT.
  • If administered via ADUC and enabled NIS extensions, there's no need for manual ID counting. E. g. the next free UID and GID is stored directly in Active Directory and will be incremented then creating a new user or group.



General information about the Samba idmap_ad backend for Winbindd

The idmap_ad plugin provides a way for Winbindd to read id mappings from an AD server that uses RFC2307/SFU schema extensions. This module implements only the "idmap" API, and is read-only. Mappings must be provided in advance by the administrator by adding the uidNumber attributes for users and gidNumber attributes for groups in the AD. Winbindd will only map users that have a uidNumber and whose primary group have a gidNumber attribute set. It is however recommended that all groups in use have gidNumber attributes assigned, otherwise they are not working.

The writeable default config („idmap config *“) is also needed in order to be able to create group mappings. This catch-all default idmap configuration should have a range that is disjoint from any explicitly configured domain with idmap backend ad.

See the manpage of idmap_ad for further information.



Using Winbindd on a Samba DC

Since Samba 4.2, Winbindd is able to be used on a Samba Domain Controller, as well. The following smb.conf change is additionally necessary to enable Winbindd on a Samba DC, compared to a member server:

Users having a „server services“ line in their DC smb.conf, need to replace the „winbind“ entry by „winbindd“:

[global]
  ...
  server services = ....., winbind, winbindd

Users not having a „server services“ line (default values), need to add the parameter „winbindd“:

[global]
  ...
  server services = +winbind, -winbindd

Winbindd is automatically be started by the „samba“ process on startup and need not to be run manually!



Configuring RFC2307 backend for Winbindd

Add the following to the [global] section of your smb.conf:

  # Important: The ranges of the default (*) backend
  # and the domain(s) must not overlap!

  # Retrieve UIDs/GIDs for domain SAMDOM from AD, via RFC2307.
  # The range value defines the lowest RID up to the highest,
  # that will ever be used in this domain. Ask your AD Domain
  # Administrator, if you don't know which range to define.
  idmap config SAMDOM:backend = ad
  idmap config SAMDOM:schema_mode = rfc2307
  idmap config SAMDOM:range = 10000-40000

  # Store UIDs/GIDs for all other domains (including local
  # accounts/groups of this server) in a tdb file
  idmap config *:backend = tdb
  idmap config *:range = 2000-9999

  # Use home directory and shell information from AD
  winbind nss info = rfc2307

See the manpage of smb.conf for additional winbindd parameters and their meanings.



Administering Unix Attributes in Active Directory

See Administer_Unix_Attributes_in_Active_Directory.