Winbindd: Difference between revisions

From SambaWiki
No edit summary
m (Mmuehlfeld moved page Winbind to Winbindd without leaving a redirect)
 
(37 intermediate revisions by 9 users not shown)
Line 1: Line 1:
For setting up Winbindd on a Samba Domain Member, see:
== About Winbind and Samba4 ==
* [[Setting_up_Samba_as_a_Domain_Member|Setting up Samba as a Domain Member]]
* [[Identity_Mapping_Back_Ends|Identity Mapping Back Ends]]


Samba4 currently embed its own Winbind implementation. Winbind is responsible for affecting an unix uid to user, gid to groups.
It is also used to list groups of a given user, to translate SID to uid/gid and many other things.


For setting up Winbindd a Samba Active Directory (AD) domain controller (DC), see:
As soon as you use file server capabilities of Samba4 (for instance for serving GPO or login scripts), calls to Winbind will be made to get the user's uid (and allocate if none exists).
* [[Configuring_Winbindd_on_a_Samba_AD_DC|Configuring Winbindd on a Samba AD DC]]
This can be noticed by the fact that when a file is created from Windows in one of the samba4 server share you will see big numerical uid and gid.

For example:
<pre>
ls /home/mat/workspace/samba/homematwsnet/sysvol/home.matws.net/Policies/\{085C0631-6142-4637-9FED-2EC5B4FB6952\}/ -l
total 0
drwxr-sr-x 4 3000008 users 4096 2010-03-05 23:31 .
drwxrwsrwx 10 3000008 3000008 4096 2010-03-05 23:31 ..
-rw-r--r-- 1 3000017 users 68 2010-03-06 01:43 GPT.INI
</pre>

== Headline text ==

== Headline text ==

Latest revision as of 16:56, 4 January 2017

For setting up Winbindd on a Samba Domain Member, see:


For setting up Winbindd a Samba Active Directory (AD) domain controller (DC), see: