CentOS 5 :: Active Directory Integration - Authenticating SSH Users
Apr 22, 2009
First, I'm extremely green with linux. I'm trying to configure my CentOS 5.2 box to authenticate my SSH users with my Active Directory. What would be the best way to go about doing that? I've configured Winbind and joined it the the domain but I'm not able to login locally or SSH with an AD account. I'm not sure where to go from here. Also my users will not be accessing any file shares on this box, SSH only.
I was working to integrate Centos 5 and AD 2003 R2, this is my set up Windows side:
1. Install Identity Management for Unix, (Windows R2 already includes the Unix attribute not entirely necessary to install IMU, but it makes easier to configure the attributes from ADUC, when IMU is installed the Unix attributes TAB is shown in the user properties)
2. Configure the Unix attributes for every user account that will be authenticating from centos.
3. Create an user account to be used as a proxy for ldap, a regular user would be enough. Password never expires.
4. Create a computer account for every centos host; assign this computer account as pre-windows 2000 account.
5. Assign a value of 4128 to the user account control property for the computer account.
My all production PC r running under ADC windows2008 server. Recently I implement a file server in CentOS 5. Now I want to integrate Samba (File sharing) using Active Directory so that all access permission to file server comes from AD's permission.
The company I work for, as usual, is Microsoft-centric. I'm attempting to integrate my Ubuntu server into the domain to allow domain users to authenticate to the server and access file shares using Samba. Here's my current configuration:
I am trying out few stuff with Linux and Windows. I have a 'Postfix' mail server on CentOS 5.5 with 'dovecot' and 'squirrel' (webmail) working fine. I am just wondering, how can I create bulk mailboxes on CentOS 5.5 (for postscript) so that the the users can access their mail from the browser (squirrel mail)?
How can I integrate with Active Directory? I am also looking for techniques to automatically create bulk users (for example 100 users) on Active Directory with a default passwords (or random passwords if possible) that integrate with Postfix.
I am using openSUSE 11.2 with active directory for authentication. I configured it using the Window Domain Membership YaST2 module and I can login successfully (although unreliably). The problem is that I need the UID and GID of the users on my computer to match the UID and GID assigned by Active Directory. Currently it just assigns UIDs and GIDs starting at 10000, which is completely different than the UID and GID used by Active Directory and by other Linux computer runs by the school (those use CentOS). Does anyone know how to get my openSUSE computer to assign UIDs and GIDs from Active Directory?
Since yesterday I'm fighting with OpenVPN on Ubuntu 10.04TLS and I can not cope with the authorization of users from Windows 2008 AD server. It looks like this: Published 93.159.XX.XX IP address the router and all traffic directed to the internal LAN IP 10.0.1.210. Customers who will combine the different platforms are Mac OS, Linux, Windows XP, 7, Vista. The whole domain is for Windows 2008. Uploader authLDAP module, but I still can not connect, that is, not after entering the username and password from the W2K8 domain does not log
I want to create a shared folder in a ubuntu sistem but I want to know if I can get access to some users of my domain active directory windows 2003 server?If I can, I would give that security in some of the subfolders of that shared folder as explained at the example:XAMPLE:
Backups (all have access and it's shared) Mail of Charles (Can only have access Charles that have an account on domain) Mail of John (Can only have access John)
This is the scenario: Active Directory Server = 192.168.0.1 Squid/Dansguardian Proxy Server w/NTLM Auth = 192.168.0.10 The Linux box has been integrated with AD and works fine. Users can authenticate automatically when login the AD or when they access the web through Basic authentication. That part is just fine.
But, when I add a new user, or change a users' primary group, I have to change the 'filtergroups' file in Dansguardian. I tried to make auto this process using the USERMAP and USERMAP2 scripts in [URL].. at the "Extras and Add Ons" section, but both scripts doesn't run properly in Ubuntu if they are not changed. I tried, following the instructions, but got a lot of syntax errors. So, I wrote a very simple script using 'net rpc' to retrieve all users according to the AD Security and Domain Groups. I created an output folder in dansguardian to dump the rpc outputs into files. And read the files to apply filtering groups.
I have running on RHL enterprise 4. I want to configure squid users to authenticate against windows 2003 active directory. How do I go about from scratch
My boss has commissioned me with creating a new file server to replace a M$ server that is installed now. We want to go with Linux for many reasons, but one big thing we want to be able to do is still manage permissions using M$ type permissions from our XP desktop's rather than unix style permissions. How would this be accomplished on a CentOS box?
I have a freshly installed CentOS 5.4 box which I'm trying to get AD authentication working on. I have AD authentication via kerberos working for SSH, but when I try and have it work for SMB shares I'm getting an access denied error. What's even more odd is that when I tell pam to use winbind to authenticate SSH...it works just fine. Wbinfo -a username%password authenticates fine and getent passwd and group enumerates the AD users and groups ok. My smbd.log was throwing the following error "Failed to verify incoming ticket with error NT_STATUS_LOGON_FAILURE" but has since stopped for some reason, but googling this indicated I needed re-join the machine to the domain, which I have.
Can connect to our mail server using telnet onto port 25 and this works correctly, 'ehlo whatever' shows output as expected.
However using a mail client to connect it gives an authentication error and the following appears in the maillog file;
did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA
what to look for in the config, this works correctly on our development box but not on our production server. Could it be another program is interfering with the connection?
Sendmail is running in standalone mode not through the xinetd daemon.
I am using the PLAIN AUTH method as to try and avoid getting more errors.
All of sudden a working SAMBA server not allowing to login and deny permission for users to access it shares. When I check I checked the server directory rights are same, find no changes. and smb.conf is also same. when I checked closely I found the following error.
1. smbd.log show the following messages
[2011/06/14 16:07:15, 0] lib/util_sock.c:get_peer_addr(1232) getpeername failed. Error was Transport endpoint is not connected [2011/06/14 16:07:15, 0] lib/util_sock.c:read_data(540) read_data: read failure for 4 bytes to client 0.0.0.0. Error = Connection reset by peer [2011/06/14 16:07:36, 0] lib/util_sock.c:get_peer_addr(1232) getpeername failed. Error was Transport endpoint is not connected [2011/06/14 16:07:36, 0] lib/util_sock.c:get_peer_addr(1232)
I've configured kerberos authentication on my centos 5.2 box. When I kinit with a username in AD and not on the centos box, I get a TGT. However, I cannot log into the centos box as any of the AD users. This is probably a stupid question but do I also need to create the account's on the centos box that I have in AD? If so, does that mean i can then use pam to authenticate users on my cyrus imap process running on the centos box?
I've been looking for alternatives to Active Directory with Centos mainly SAMBA and OpenLDAP. I have worked with SAMBA and I know I can create a PDC and make clients join a domain but how about enforcing Group Policy?... is this possible with SAMBA or OpenLDAP/LDAP?
I would prefer to use a linux server for authentication but I will need the same configuration features.I have been looking for a good guide to setting up CentOS as an alternative to Active Directory, but have not found one yet.The features I want to see.
1. works with Windows clients. 2. Network Home folders (does not neessisarly need to hold profile information) 3. Logon scripts for clients. 4. shared printers 5. shared folders. 6. can log linux boxes in with the same credentials and logon scripts.
okay so we have multiple servers running CentOS and multiple people who need access to these machines for various tasks. i would like to be able to use the credentials from Active Directory (running on server 2008) to give them access to these servers without having to go through each server and add these people into permission groups. basically a single sign-on for all of these servers depending upon what permissions were granted in Active Directory. how do i go about doing this?
I have two ubuntu 10.04 64-bit servers running samba (3.4.7) and openLDAP (2.4.21). The LDAP directory is successfully replicating between the two servers. These servers also serve as LDAP servers for sudo, pam, nss, and other services for a dozen servers without issues. The BDC samba is configured to use itself for LDAP. I connected to the BDC using the samba ldap credentials and verified I could a) see the Computer object b) read NTPassword and LMPassword. The workstations can authenticate to the domain successfully against the PDC. If a workstation boots and connects to the BDC, they login fails with:
Code: [2010/07/18 11:46:23, 0] rpc_server/srv_netlog_nt.c:336(get_md4pw) get_md4pw: Workstation MACHINENAME$: no account in domain [2010/07/18 11:46:23, 0] rpc_server/srv_netlog_nt.c:584(_netr_ServerAuthenticate3) _netr_ServerAuthenticate3: failed to get machine password for account MACHINENAME$: NT_STATUS_ACCESS_DENIED
Successful authentication against the PDC shows: Code: [2010/07/18 11:59:20, 1] smbd/service.c:1063(make_connection_snum) MACHINENAME (192.168.2.145) connect to service netlogon initially as user username (uid=30000, gid=512) (pid 1727) [2010/07/18 11:59:20, 1] smbd/service.c:1063(make_connection_snum) MACHINENAME (192.168.2.145) connect to service data initially as user nobody (uid=65534, gid=65534) (pid 1727) .....
I have just installed the 32bit and 64bit versions of CentOS 5.5 and was wondering how I can add these machines to Active Directory for authentication. I've done this in the past with CentOS 5.4 using the GUI and everything worked just fine but now need to do everything from the command line.
I am testing CentOS 5.4 on a virtual machine before deploying to a server.I am trying to get authentication through our Active Directory server, without actually joining the machine to the domain.I tried multiple tutorials, including this one: URL...Basically I enabled authentication through kerberos and modified my ldap.conf file.
I have a problem with sendmail. I am using the zen.spamhaus.org dnsbl, and it is doing a wonderful job of blocking incoming spam from open relays. But it is blocking my users who are on a dynamic ip range from any isp remotely. They should be able to authenticate and send messages no matter where they are as long as they authenticate right? I just want to use the blacklist to block incoming mail to my server that is being distributed to our email addresses.
I want to block people that are hosting mail servers and sending mail to my domain from isp sub-nets. But I don't want to block my users that are sitting on isp subnets using their mail client to authenticate over smtp and send an email from my mail servers.
Attach a Fedora/RHEL/CentOS system to an Active Directory DomainBelow is a step by step outline of how to configure a Linux Samba fileserver to use an Active Directory domain for authentication and authorization in place of flat files. Note that this configuration has been replicated using Fedora 10, RHEL 5.3 and CentOS 5 since they all more or less share the same code base.me of the example server in this document is erver1.domain.forest.org, substitute correctly where appropriate. At the very least following packages must also be installed:
sambasamba-commonsamba-clientkrb5-workstationopenldap-clientsIt would be prudent to understand the underlying concepts of how Kerberos and Samba work prior to deploying this type of server. I find that SE-Linux will interfere with Samba services, particularly with winbind. I usually set SE-Linux to be in a permissive mode. It is possible to update the SE-Linux policies but that is outside the scope of this document, i.e you're on your own. In some cases I turned SE-Linux off since it was causing winbind to stop responding.
1. Set NTP to use the correct server for your Active Directory domain:shell> system-config-timeSet the primary NTP server to be your domain/forest NTP server2. Make backups of and edit the following system configuration files:a. shell> cp /etc/resolv.conf /etc/resolv.conf.bakb. shell> vi /etc/resolv.conf
I did useradd -g users ldaptest and tried logging in remotely but the client always says no such user. what do I have to do to update the users that LDAP sees?
I have noticed something: If I use scp to copy a large file from my ssh server, or I use ssh -ND to tunnel a port from my client through my ssh server, my connections show up in /var/log/auth.log on the server, but issuing the "w" or "who" command does not show any of the users who are transferring files via scp or using ssh -ND.
I need to know when my users are logged in (even if they're just using scp or ssh -ND) on my server so that I know when rebooting may disconnect them. The only way I know of to do this is to actually manually read /var/log/auth.log or to do "netstat -an | grep #SSHPORTNUMBER" but I don't like either of these methods. I want to be able to see (as the "w" or "who" command does for normal ssh connections) a list of all logged-in users INCLUDING those logged in using scp or ssh -ND.