Difference between revisions of "Samba-dc"
Bunkobugsy (talk | contribs) |
Bunkobugsy (talk | contribs) |
||
Line 120: | Line 120: | ||
===Provisioning=== | ===Provisioning=== | ||
provision | provision | ||
+ | After a successful provisioning DO NOT CHANGE any configuration values. | ||
===Testing=== | ===Testing=== | ||
− | + | To confirm Active Directory functionality | |
systemctl status samba | systemctl status samba | ||
samba-tool domain info a.b.c.d #SambaIP set above | samba-tool domain info a.b.c.d #SambaIP set above | ||
− | realm -v discover | + | realm -v discover sme-server.internal #in this example |
kinit -V administrator | kinit -V administrator | ||
klist | klist | ||
Line 134: | Line 135: | ||
Before first login all users and admin must change their passwords from https://SME-IP/user-password portal. | Before first login all users and admin must change their passwords from https://SME-IP/user-password portal. | ||
+ | |||
+ | Usual SME network shares are accessible on \\SME-IP\ whereas SYSVOL is available at \\SambaIP\ | ||
WARNING: disabling samba service is not supported as user accounts and passwords will get out of sync. | WARNING: disabling samba service is not supported as user accounts and passwords will get out of sync. |
Revision as of 00:04, 13 December 2024
samba-dc logo | |
Maintainer | maintainer |
---|---|
Url | https://wiki.koozali.org |
Category | |
Tags | File, this, with, a, list, of, tags |
Maintainer
initial work of Bunkobugsy
Version
Description
This package provides templates for samba Active Directory support. More details found here.
It will replace upstream samba packages with AD enabled ones from SIG/FastTrack repo. More details found here.
A secondary samba service will use separate samba data directories, set up via a distinct samba configuration.
This ensures that samba-dc instance won't interfere with normal filesharing samba services provided by SME core.
User accounts created in SME will be kept in sync with the LDAP service provided by samba Active Directory. More details here.
Users logged in to domain joined Windows PCs will have access to SME's samba shares via their namesake usernames and matching passwords. https://wiki.koozali.org/Client_Authentication:Windows#Login_to_shared_resources
In an Active Directory Kerberos requires an accurate time synchronization so make sure to set up NTP for all client computers.
Installation
dnf --enablerepo=smetest update smeserver-base # remove after released
Before continuing make sure you have at least smeserver-base-11.0.0-XX.el8.sme (remove after release)
/sbin/e-smith/db yum_repositories set fasttrack-updates repository \ Name 'Rocky Linux 8.10 - SIG FastTrack Updates' \ BaseURL 'http://dl.rockylinux.org/$sigcontentdir/$releasever/fasttrack/$basearch/fasttrack-updates/' \ EnableGroups no \ GPGCheck no \ Visible yes \ Priority 9 \ status enabled
signal-event dnf-modify
dnf --enablerepo=smecontribs install smeserver-samba-dc
Configuration
you can list the available configuration with the following command :
config show samba
Some of the properties are not shown, but are defaulted in a template or a script. Here is a list with default and expected values :
property | default | values |
---|---|---|
SambaIP | numeric | |
Password | string | |
Realm | string | |
status | disabled | enabled,disabled |
Add samba virtual interface
Samba in AD mode provides services that need a separate virtual interface.
A free static IP address needs to be chosen from the same range as SME's local network that is outside the DHCP pool.
config setprop samba SambaIP a.b.c.d signal-event console-save
Confirm that the samba virtual interface is working
ip a | grep a.b.c.d
or check
ifconfig
It can be disabled anytime ONLY if domain is not operational.
config delprop samba SambaIP signal-event console-save
WARNING: changing this IP address after the domain is provisioned can cause problems and is not supported.
Set domain administrator password
Provisioning will fail unless a password is chosen that matches the complexity requirements. More details found here.
Random Strong Password Generator can be used.
WARNING: make sure to keep a copy of this password and do not modify this key after the domain is provisioned.
config setprop samba Password Blu3Onyx!
Provisioning will also reserve the administrator user in SME for domain administrator, make sure it is not already used.
Choosing realm
config setprop samba Realm sme-server.internal
If not set provisioning will use for realm current Windows workgroup name (default is: sme-server).
Single label domains can cause problems. Realm needs to contain at least a dot or .INTERNAL will be appended.
Active Directory DC locating relies on DNS resolution, samba internal DNS will handle this via domain-remote feature.
Make sure realm does not match SME's primary or secondary domains because secondary domains will be overwritten.
Choose well the realm (or set Windows workgroup name) before provisioning because domain rename is not supported.
WARNING: domain rename is only possible for now with complete domain reset and loss of all machine accounts.
Provisioning
provision
After a successful provisioning DO NOT CHANGE any configuration values.
Testing
To confirm Active Directory functionality
systemctl status samba samba-tool domain info a.b.c.d #SambaIP set above realm -v discover sme-server.internal #in this example kinit -V administrator klist sambatool user list sambatool computer list smbstatus --configfile=/etc/samba/samba.conf samba-tool processes --configfile=/etc/samba/samba.conf
If all went well you can proceed to joining Windows PCs to the domain using domain administrator and password.
Before first login all users and admin must change their passwords from https://SME-IP/user-password portal.
Usual SME network shares are accessible on \\SME-IP\ whereas SYSVOL is available at \\SambaIP\
WARNING: disabling samba service is not supported as user accounts and passwords will get out of sync.
Restoring missing user accounts can be done, additional passwords might also need to be reset.
syncadusers
Password policies
For now password changing via Ctrl-Alt-Delete is not be supported and will be disabled via password policies.
Password changing will only be possible from https://SME-IP/user-password or Server Manager - Collaboration - Users.
To prevent passwords from getting out of sync Password contrib will be installed and password aging will be activated.
Backup and database check
samba-tool domain backup offline --targetdir=/root --configfile=/etc/samba/samba.conf
samba-tool dbcheck --cross-ncs --configfile=/etc/samba/samba.conf samba-tool dbcheck --cross-ncs --fix --yes --configfile=/etc/samba/samba.conf
Uninstall
stop SME syncing user accounts
config setprop samba status disabled #also done from rpm? systemctl stop samba
remove custom repository
/sbin/e-smith/db yum_repositories delete fasttrack-updates signal-event dnf-modify
remove contrib
dnf remove smeserver-samba-dc
return to upstream samba packages
dnf clean all; dnf update
disable DNS forwarding
/sbin/e-smith/db domains delete sme-server.internal #in this example signal-event domain-modify
disable samba virtual interface
config delprop samba SambaIP signal-event console-save
Bugs
Please raise bugs under the SME-Contribs section in bugzilla
and select the smeserver-samba-dc component or use this link
Below is an overview of the current issues for this contrib:
Changelog
Only released version in smecontrib are listed here.