cat smb4.conf
Код: Выделить всё
[global]
workgroup = TEST
realm = test.local
netbios name = SAMBA4
server role = active directory domain controller
server services = rpc, nbt, wrepl, ldap, cldap, kdc, drepl, winbindd, ntp_signd, kcc, dnsupdate, dns, smb
dcerpc endpoint servers = epmapper, wkssvc, rpcecho, samr, netlogon, lsarpc, spoolss, drsuapi, dssetup, unixinfo, browser, eventlog6, backupkey, dnsserver, winreg, srvsvc
idmap_ldb:use rfc2307 = yes
allow dns updates = nonsecure
template shell = /bin/tcsh
template homedir = /usr/home/samba/home/%ACCOUNTNAME%
obey pam restrictions = yes
nsupdate command = /usr/local/bin/samba-nsupdate -g
allow dns updates = nonsecure
vfs objects = acl_xattr
map acl inherit = yes
store dos attributes = yes
winbind enum groups = yes
winbind enum users = yes
winbind use default domain = yes
dns forwarder = 8.8.8.8
max log size = 50
directory name cache size = 0
server signing = auto
winbind refresh tickets = yes
winbind offline logon = yes
[netlogon]
path = /var/db/samba4/sysvol/test.local/scripts
read only = No
[sysvol]
path = /var/db/samba4/sysvol
read only = No
[soft]
path = /usr/home/samba/group/soft
read only = No
nt acl support = yes
inherit acls = yes
inherit owner = yes
inherit permissions = yes
[1]
path = /usr/home/samba/group/1
read only = No
vfs objects = acl_xattr
map acl inherit = yes
store dos attributes = yes
[2]
path = /usr/home/samba/group/2
read only = No
inherit acls = yes
inherit owner = yes
inherit permissions = yes
map acl inherit = yes
nt acl support = yes
Код: Выделить всё
#group: files ldap
#
# nsswitch.conf(5) - name service switch configuration file
# $FreeBSD: releng/10.3/etc/nsswitch.conf 224765 2011-08-10 20:52:02Z dougb $
#
group_compat: nis
hosts: files dns
networks: files
#passwd: compat
passwd_compat: nis
shells: files
services: compat
services_compat: nis
protocols: files
rpc: files
passwd: files winbind
group: files winbind
Код: Выделить всё
[libdefaults]
default_realm = TEST.LOCAL
dns_lookup_realm = false
dns_lookup_kdc = true
[realms]
TEST.LOCAL = {
kdc = 10.0.100.26
}
[domain_realms]
.test.local = TEST.LOCAL
а вот с pam авторизация почему то не проходит
Код: Выделить всё
ls -al /usr/lib/pam_winbind.so
lrwxr-xr-x 1 root wheel 29 23 май 12:28 /usr/lib/pam_winbind.so -> /usr/local/lib/pam_winbind.so
ls -al /usr/local/lib/pam_winbind.so
-rwxr-xr-x 1 root wheel 102945 5 июл 06:35 /usr/local/lib/pam_winbind.so
Код: Выделить всё
Enter LDAP Password:
ldap_bind: Strong(er) authentication required (8)
additional info: BindSimple: Transport encryption required.
Код: Выделить всё
#
# $FreeBSD: releng/10.3/etc/pam.d/other 197769 2009-10-05 09:28:54Z des $
#
# PAM configuration for the "other" service
# auth
auth sufficient pam_opie.so no_warn no_fake_prompts
auth requisite pam_opieaccess.so no_warn allow_local
auth sufficient pam_krb5.so no_warn try_first_pass
#auth sufficient pam_ssh.so no_warn try_first_pass
auth required pam_unix.so no_warn try_first_pass
# account
account required pam_nologin.so
account required pam_krb5.so
account required pam_login_access.so
account required pam_unix.so
# session
#session optional pam_ssh.so want_agent
session required pam_permit.so
session required /usr/local/lib/pam_mkhomedir.so skel=/etc/skel umask=0077
# password
password required pam_permit.so
Код: Выделить всё
ping to winbindd succeeded
Код: Выделить всё
checking the trust secret for domain TEST via RPC calls succeeded
wbinfo -g выводит список групп