<div dir="ltr">Hi,<div><br><div>There is no Active Directory in my solution, just freeipa adtrust extensions - necessary to generate SIDs.</div><div><br></div><div>To me, there are 3 integration paths:</div></div><div>- ldapsam module without AD, using LDAP directly : you need samba extensions in FreeIPA's LDAP, that's what you tried to achieve in this thread.</div><div>- kerberos module with AD, this is the tutorial from the official documentation <a href="https://www.freeipa.org/page/Howto/Integrating_a_Samba_File_Server_With_IPA" target="_blank">https://www.freeipa.org/page/Howto/Integrating_a_Samba_File_Server_With_IPA</a> but it won't work on Windows if you don't have domain because of NTLM problems</div><div>- ipasam module, the solution I used: half LDAP (to read NTHash/SID), half Kerberos (to bind samba to the LDAP). </div><div><br></div><div>In all solutions, extra schemas are needed for FreeIPA directory. `ipa-adtrust-install` can install these extensions, or you can do it manually. I prefer the IPA automatic way to LDIF's :)</div><div><br></div><div>ipa-adtrust-install also generate automaticaly SID and Password Hash needed by CIFS when you add an user or a group in FreeIPA. No need to patch interface to generate correct attributes.</div><div><br></div><div>What I also understood: ipa-adtrust-install doesn't use the good old samba extensions (with things like sambaSID, sambaGroupType, sambaSamAccount, etc.) but new ipaNTHash/ipaNTsecurityIdentifier values. This must be the reason why ldapsam solution doesn't work directly after a ipa-adtrust-install. To ask CIFS service to read them instead of the classic ones, we use ipasam.</div><div><br></div><div class="gmail_extra">@Matt .</div><div class="gmail_extra"><div><div><div><font><div>You're currently trying ldapsam solution. The problem is to make FreeIPA interface able to work with samba "good old extensions". Theses extensions contain the classes like "sambaSamAccount" or "<span style="color:rgb(80,0,80);font-size:12.8000001907349px">sambaGroupMapping"</span>. To make CIFS able to read groups from LDAP, groups need to instanciate some samba classes (same for users). When you instanciate the class <span style="color:rgb(80,0,80);font-size:12.8000001907349px">sambaGroupMapping, the value </span><span style="color:rgb(80,0,80);font-size:12.8000001907349px">sambaGroupType is compulsory, but FreeIPA doesn't build the value correctly, even with the group.js patch previously linked. I think some dev is needed to fix this if you want to do it this way.</span></div><div><span style="color:rgb(80,0,80);font-size:12.8000001907349px"><br></span></div><div><span style="color:rgb(80,0,80);font-size:12.8000001907349px">To my opinion, the 'ipasam' way is much more easier, and seems to be the way redhat/devs/freeipa want to support in the future.</span></div><div><span style="color:rgb(80,0,80);font-size:12.8000001907349px"><br></span></div><div><span style="color:rgb(80,0,80);font-size:12.8000001907349px">Cheers,</span></div><div><font face="arial">--</font></div><div style="font-family:arial"><font color="#666666">Youenn Piolet</font></div><div style="font-family:arial"><font size="1" color="#999999"><a href="mailto:piolet.y@gmail.com" target="_blank">piolet.y@gmail.com</a></font></div><div style="font-family:arial;font-size:large"><span style="font-size:small"><span style="font-family:arial"><div><font face="tahoma, sans-serif"><span style="font-family:arial,verdana,tahoma,sans-serif;font-size:11px"><span style="font-family:tahoma,sans-serif;font-size:small"><font color="#666666"><span style="color:rgb(142,142,142);font-family:arial,verdana,tahoma,sans-serif;font-size:11px"><em><br></em></span></font></span></span></font></div><font color="#8E8E8E" face="arial, verdana, tahoma, sans-serif"></font></span><font color="#8E8E8E" face="arial, verdana, tahoma, sans-serif"></font><font color="#8E8E8E" face="arial, verdana, tahoma, sans-serif"></font></span></div></font></div></div></div>
<br><div class="gmail_quote">2015-08-06 16:19 GMT+02:00 Matt . <span dir="ltr"><<a href="mailto:yamakasi.014@gmail.com" target="_blank">yamakasi.014@gmail.com</a>></span>:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">Hi Chris,<br>
<br>
OK, than we might create two different versions of the wiki, I think<br>
this is nice.<br>
<br>
I'm still figuring out why I get that:<br>
<span><br>
IPA Error 4205: ObjectclassViolation<br>
<br>
missing attribute "sambaGroupType" required by object class "sambaGroupMapping"<br>
<br>
</span><span><font color="#888888">Matt<br>
</font></span><div><div><br>
2015-08-06 16:09 GMT+02:00 Christopher Lamb <<a href="mailto:christopher.lamb@ch.ibm.com" target="_blank">christopher.lamb@ch.ibm.com</a>>:<br>
> Hi Matt<br>
><br>
> As far as I can make out, there are at least 2 viable Samba / FreeIPA<br>
> integration paths.<br>
><br>
> The route I took is suited where there is no Active Directory involved: In<br>
> my case all the Windows, OSX and Linux clients are islands that sit on the<br>
> same network.<br>
><br>
> The route that Youenn has taken (unless I have got completely the wrong end<br>
> of the stick) requires Active Directory in the architecture.<br>
><br>
> Chris<br>
><br>
><br>
><br>
> From: "Matt ." <<a href="mailto:yamakasi.014@gmail.com" target="_blank">yamakasi.014@gmail.com</a>><br>
> To: Youenn PIOLET <<a href="mailto:piolet.y@gmail.com" target="_blank">piolet.y@gmail.com</a>><br>
> Cc: Christopher Lamb/Switzerland/IBM@IBMCH,<br>
> "<a href="mailto:freeipa-users@redhat.com" target="_blank">freeipa-users@redhat.com</a>" <<a href="mailto:freeipa-users@redhat.com" target="_blank">freeipa-users@redhat.com</a>><br>
> Date: <a href="tel:06.08.2015%2014" value="+33608201514" target="_blank">06.08.2015 14</a>:42<br>
> Subject: Re: [Freeipa-users] Ubuntu Samba Server Auth against IPA<br>
><br>
><br>
><br>
> Hi,<br>
><br>
> OK, this sounds already quite logical, but I'm still refering to the<br>
> old howto we found earlier, does that one still apply somewhere or not<br>
> at all ?<br>
><br>
> Thanks,<br>
><br>
> Matt<br>
><br>
><br>
><br>
> 2015-08-06 12:23 GMT+02:00 Youenn PIOLET <<a href="mailto:piolet.y@gmail.com" target="_blank">piolet.y@gmail.com</a>>:<br>
>> Hey guys,<br>
>><br>
>> I'll try to make a tutorial soon, sorry I'm quite in a rush these days :)<br>
>><br>
>> General idea:<br>
>><br>
>> On FreeIPA (4.1)<br>
>> - `ipa-adtrust-install --add-sids` (creates ipaNTsecurityidentifier<br>
>> attribude, also known as SID)<br>
>> - regenerate each user password to build ipaNTHash attribute, not here by<br>
>> default on users<br>
>> - use your ldap browser to check ipaNTHash values are here on user<br>
> objects<br>
>> - create a CIFS service for your samba server<br>
>> - Create user roles/permissions as described here:<br>
>><br>
> <a href="http://freeipa-users.redhat.narkive.com/ez2uKpFS/authenticate-samba-3-or-4-with-freeipa" rel="noreferrer" target="_blank">http://freeipa-users.redhat.narkive.com/ez2uKpFS/authenticate-samba-3-or-4-with-freeipa</a><br>
><br>
>> so that CIFS service will be able to read ipaNTsecurityidentifier and<br>
>> ipaNTHash attributes in LDAP (ACI)<br>
>> - SCP ipasam.so module to your cifs server (this is the magic trick) :<br>
> scp<br>
>> /usr/lib64/samba/pdb/ipasam.so<br>
>> root@samba-server.domain:/usr/lib64/samba/pdb/ You can also try to<br>
> recompile<br>
>> it.<br>
>><br>
>> On SAMBA Server side (CentOS 7...)<br>
>> - Install server keytab file for CIFS<br>
>> - check ipasam.so is here.<br>
>> - check you can read password hash in LDAP with `ldapsearch -Y GSSAPI<br>
>> uid=admin ipaNTHash` thanks to kerberos<br>
>> - make your smb.conf following the linked thread and restart service<br>
>><br>
>> I don't know if it works in Ubuntu. I know sssd has evolved quickly and<br>
>> ipasam may use quite recent functionalities, the best is to just try. You<br>
>> can read in previous thread : "If you insist on Ubuntu you need to get<br>
>> ipasam somewhere, most likely to compile it yourself".<br>
>><br>
>> Make sure your user has ipaNTHash attribute :)<br>
>><br>
>> You may want to debug authentication on samba server, I usually do this:<br>
>> `tail -f /var/log/samba/log* | grep <username><br>
>><br>
>> Cheers<br>
>> --<br>
>> Youenn Piolet<br>
>> <a href="mailto:piolet.y@gmail.com" target="_blank">piolet.y@gmail.com</a><br>
>><br>
>><br>
>> 2015-08-05 17:40 GMT+02:00 Matt . <<a href="mailto:yamakasi.014@gmail.com" target="_blank">yamakasi.014@gmail.com</a>>:<br>
>>><br>
>>> Hi,<br>
>>><br>
>>> This sounds great to me too, but a howto would help to make it more<br>
>>> clear about what you have done here. The thread confuses me a little<br>
>>> bit.<br>
>>><br>
>>> Can you paste your commands so we can test out too and report back ?<br>
>>><br>
>>> Thanks!<br>
>>><br>
>>> Matt<br>
>>><br>
>>> 2015-08-05 15:18 GMT+02:00 Christopher Lamb<br>
> <<a href="mailto:christopher.lamb@ch.ibm.com" target="_blank">christopher.lamb@ch.ibm.com</a>>:<br>
>>> > Hi Youenn<br>
>>> ><br>
>>> > Good news that you have got an integration working<br>
>>> ><br>
>>> > Now you have got it going, and the solution is fresh in your mind, how<br>
>>> > about adding a How-to page on this solution to the FreeIPA wiki?<br>
>>> ><br>
>>> > Chris<br>
>>> ><br>
>>> ><br>
>>> ><br>
>>> > From: Youenn PIOLET <<a href="mailto:piolet.y@gmail.com" target="_blank">piolet.y@gmail.com</a>><br>
>>> > To: "Matt ." <<a href="mailto:yamakasi.014@gmail.com" target="_blank">yamakasi.014@gmail.com</a>><br>
>>> > Cc: Christopher Lamb/Switzerland/IBM@IBMCH,<br>
>>> > "<a href="mailto:freeipa-users@redhat.com" target="_blank">freeipa-users@redhat.com</a>" <<a href="mailto:freeipa-users@redhat.com" target="_blank">freeipa-users@redhat.com</a>><br>
>>> > Date: <a href="tel:05.08.2015%2014" value="+33508201514" target="_blank">05.08.2015 14</a>:51<br>
>>> > Subject: Re: [Freeipa-users] Ubuntu Samba Server Auth against<br>
> IPA<br>
>>> ><br>
>>> ><br>
>>> ><br>
>>> > Hi guys,<br>
>>> ><br>
>>> > Thank you so much your previous answers.<br>
>>> > I realised my SID were stored in ipaNTsecurityidentifier, thanks to<br>
>>> > ipa-adtrust-install --add-sids<br>
>>> ><br>
>>> > I found an other way to configure smb here:<br>
>>> ><br>
>>> ><br>
> <a href="http://freeipa-users.redhat.narkive.com/ez2uKpFS/authenticate-samba-3-or-4-with-freeipa" rel="noreferrer" target="_blank">http://freeipa-users.redhat.narkive.com/ez2uKpFS/authenticate-samba-3-or-4-with-freeipa</a><br>
><br>
>>> > It works perfectly.<br>
>>> ><br>
>>> > I'm using module ipasam.so I have manually scp to the samba server,<br>
>>> > Samba is set to use kerberos + ldapsam via this ipasam module.<br>
>>> > Following the instructions, I created a user role allowing service<br>
>>> > principal to read ipaNTHash value from the LDAP.<br>
>>> > ipaNTHash are generated each time a user changes his password.<br>
>>> > Authentication works perfectly on Windows 7, 8 and 10.<br>
>>> ><br>
>>> > For more details, the previously linked thread is quite clear.<br>
>>> ><br>
>>> > Cheers<br>
>>> ><br>
>>> > --<br>
>>> > Youenn Piolet<br>
>>> > <a href="mailto:piolet.y@gmail.com" target="_blank">piolet.y@gmail.com</a><br>
>>> ><br>
>>> ><br>
>>> > 2015-08-05 11:10 GMT+02:00 Matt . <<a href="mailto:yamakasi.014@gmail.com" target="_blank">yamakasi.014@gmail.com</a>>:<br>
>>> > Hi Chris.<br>
>>> ><br>
>>> > Yes, Apache Studio did that but I was not sure why it complained it<br>
>>> > was "already" there.<br>
>>> ><br>
>>> > I'm still getting:<br>
>>> ><br>
>>> > IPA Error 4205: ObjectclassViolation<br>
>>> ><br>
>>> > missing attribute "sambaGroupType" required by object class<br>
>>> > "sambaGroupMapping"<br>
>>> ><br>
>>> > When adding a user.<br>
>>> ><br>
>>> > I also see "class" as fielname under my "Last name", this is not OK<br>
>>> > also.<br>
>>> ><br>
>>> ><br>
>>> ><br>
>>> > We sure need to make some howto, I think we can nail this down :)<br>
>>> ><br>
>>> > Thanks for the heads up!<br>
>>> ><br>
>>> > Matthijs<br>
>>> ><br>
>>> > 2015-08-05 7:51 GMT+02:00 Christopher Lamb<br>
>>> > <<a href="mailto:christopher.lamb@ch.ibm.com" target="_blank">christopher.lamb@ch.ibm.com</a>>:<br>
>>> > > Hi Matt<br>
>>> > ><br>
>>> > > If I use Apache Directory Studio to add an attribute<br>
> ipaCustomFields<br>
>>> > to<br>
>>> > > cn=ipaConfig,cn=etc, the operation it performs is a modify, as<br>
> shown<br>
>>> > below:<br>
>>> > ><br>
>>> > > #!RESULT OK<br>
>>> > > #!CONNECTION ldap://xxx-ldap2.my.silly.example.com:yyy<br>
>>> > > #!DATE 2015-08-05T05:45:04.608<br>
>>> > > dn: cn=ipaConfig,cn=etc,dc=my,dc=silly,dc=example,dc=com<br>
>>> > > changetype: modify<br>
>>> > > add: ipaCustomFields<br>
>>> > > ipaCustomFields: Samba Group Type,sambagrouptype,true<br>
>>> > ><br>
>>> > > After that I then have a visible attribute ipaCustomFields as<br>
>>> > expected.<br>
>>> > ><br>
>>> > > When adding the attribute, the wizard offered me "ipaCustomFields"<br>
>>> > as<br>
>>> > > attribute type in a drop down list.<br>
>>> > ><br>
>>> > > Once we get this cracked, we really must write a how-to on the<br>
>>> > FreeIPA<br>
>>> > > Wiki.<br>
>>> > ><br>
>>> > > Chris<br>
>>> > ><br>
>>> > ><br>
>>> > ><br>
>>> > > From: Christopher Lamb/Switzerland/IBM@IBMCH<br>
>>> > > To: "Matt ." <<a href="mailto:yamakasi.014@gmail.com" target="_blank">yamakasi.014@gmail.com</a>><br>
>>> > > Cc: "<a href="mailto:freeipa-users@redhat.com" target="_blank">freeipa-users@redhat.com</a>" <<a href="mailto:freeipa-users@redhat.com" target="_blank">freeipa-users@redhat.com</a>><br>
>>> > > Date: <a href="tel:05.08.2015%2007" value="+33508201507" target="_blank">05.08.2015 07</a>:31<br>
>>> > > Subject: Re: [Freeipa-users] Ubuntu Samba Server Auth<br>
> against<br>
>>> > IPA<br>
>>> > > Sent by: <a href="mailto:freeipa-users-bounces@redhat.com" target="_blank">freeipa-users-bounces@redhat.com</a><br>
>>> > ><br>
>>> > ><br>
>>> > ><br>
>>> > > Hi Matt<br>
>>> > ><br>
>>> > > I also got the same result at that step, but can see nothing in<br>
>>> > Apache<br>
>>> > > Directory Studio.<br>
>>> > ><br>
>>> > > As I am using existing Samba / FreeIPA groups migrated across,<br>
> they<br>
>>> > > probably were migrated with all the required attributes.<br>
>>> > ><br>
>>> > > Looking more closely at that LDIF: I wonder should it not be:<br>
>>> > ><br>
>>> > > ldapmodify -Y GSSAPI <<EOF<br>
>>> > > dn: cn=ipaconfig,cn=etc,dc=domain,dc=tld<br>
>>> > > changetype: modify<br>
>>> > > add: ipaCustomFields<br>
>>> > > ipaCustomFields: "Samba Group Type,sambagrouptype,true"<br>
>>> > > EOF<br>
>>> > ><br>
>>> > > i.e. changetype: modify, instead of changetype add ?<br>
>>> > ><br>
>>> > > I don't want to play around with my prod directory - I will setup<br>
> an<br>
>>> > EL<br>
>>> > 7.1<br>
>>> > > VM and install FreeIPA 4.x and Samba 4.x That will allow me to<br>
> play<br>
>>> > around<br>
>>> > > more destructively.<br>
>>> > ><br>
>>> > > Chris<br>
>>> > ><br>
>>> > ><br>
>>> > ><br>
>>> > ><br>
>>> > ><br>
>>> > > From: "Matt ." <<a href="mailto:yamakasi.014@gmail.com" target="_blank">yamakasi.014@gmail.com</a>><br>
>>> > > To: Christopher Lamb/Switzerland/IBM@IBMCH<br>
>>> > > Cc: Youenn PIOLET <<a href="mailto:piolet.y@gmail.com" target="_blank">piolet.y@gmail.com</a>>, "<br>
>>> > <a href="mailto:freeipa-users@redhat.com" target="_blank">freeipa-users@redhat.com</a>"<br>
>>> > > <<a href="mailto:freeipa-users@redhat.com" target="_blank">freeipa-users@redhat.com</a>><br>
>>> > > Date: <a href="tel:05.08.2015%2001" value="+33508201501" target="_blank">05.08.2015 01</a>:01<br>
>>> > > Subject: Re: [Freeipa-users] Ubuntu Samba Server<br>
>>> > Auth<br>
>>> > against IPA<br>
>>> > ><br>
>>> > ><br>
>>> > ><br>
>>> > > Hi Chris,<br>
>>> > ><br>
>>> > > I'm at the right path, but my issue is that:<br>
>>> > ><br>
>>> > > ldapmodify -Y GSSAPI <<EOF<br>
>>> > > dn: cn=ipaconfig,cn=etc,dc=domain,dc=tld<br>
>>> > > changetype: add<br>
>>> > > add: ipaCustomFields<br>
>>> > > ipaCustomFields: "Samba Group Type,sambagrouptype,true"<br>
>>> > > EOF<br>
>>> > ><br>
>>> > > Does say it exists, my ldap explorer doesn't show it, and when I<br>
> add<br>
>>> > > it manually as an attribute it still fails when I add a user on<br>
> this<br>
>>> > > sambagrouptype as it's needed by the other attributes<br>
>>> > ><br>
>>> > > So that is my issue I think so far.<br>
>>> > ><br>
>>> > > Any clue about that ?<br>
>>> > ><br>
>>> > > No problem "you don't know something or are no guru" we are all<br>
>>> > > learning! :)<br>
>>> > ><br>
>>> > > Cheers,<br>
>>> > ><br>
>>> > > Matt<br>
>>> > ><br>
>>> > ><br>
>>> > > 2015-08-04 21:22 GMT+02:00 Christopher Lamb <<br>
>>> > <a href="mailto:christopher.lamb@ch.ibm.com" target="_blank">christopher.lamb@ch.ibm.com</a>>:<br>
>>> > >> Hi Matt, Youeen<br>
>>> > >><br>
>>> > >> Just to set the background properly, I did not invent this<br>
> process.<br>
>>> > I<br>
>>> > > know<br>
>>> > >> only a little about FreeIPA, and almost nothing about Samba, but<br>
> I<br>
>>> > guess<br>
>>> > > I<br>
>>> > >> was lucky enough to get the integration working on a Sunday<br>
>>> > afternoon.<br>
>>> > (I<br>
>>> > >> did have an older FreeIPA 3.x / Samba 3.x installation as a<br>
>>> > reference).<br>
>>> > >><br>
>>> > >> It sounds like we need to step back, and look at the test user<br>
> and<br>
>>> > group<br>
>>> > > in<br>
>>> > >> the FreeIPA LDAP tree. I find using an LDAP browser makes this<br>
> much<br>
>>> > > easier.<br>
>>> > >><br>
>>> > >> My FreeIPA / Samba Users have the following Samba extensions in<br>
>>> > FreeIPA<br>
>>> > >> (cn=accounts, cn=users):<br>
>>> > >><br>
>>> > >> * objectClass: sambasamaccount<br>
>>> > >><br>
>>> > >> * Attributes: sambaSID, sambaNTPassword, sambaPwdLastSet<br>
>>> > >><br>
>>> > >> My FreeIPA / Samba Groups have the following Samba extensions in<br>
>>> > FreeIPA<br>
>>> > >> (cn=accounts, cn=groups):<br>
>>> > >><br>
>>> > >> * objectClass: sambaGroupMapping<br>
>>> > >><br>
>>> > >> * Attributes: sambaGroupType, sambaSID<br>
>>> > >><br>
>>> > >> The Users must belong to one or more of the samba groups that you<br>
>>> > have<br>
>>> > >> setup.<br>
>>> > >><br>
>>> > >> If you don't have something similar to the above (which sounds<br>
> like<br>
>>> > it<br>
>>> > is<br>
>>> > >> the case), then something went wrong applying the extensions. It<br>
>>> > would<br>
>>> > be<br>
>>> > >> worth testing comparing a new user / group created post adding<br>
> the<br>
>>> > >> extensions to a previous existing user.<br>
>>> > >><br>
>>> > >> i.e.<br>
>>> > >> are the extensions missing on existing users / groups?<br>
>>> > >> are the extensions missing on new users / groups?<br>
>>> > >><br>
>>> > >> Cheers<br>
>>> > >><br>
>>> > >> Chris<br>
>>> > >><br>
>>> > >><br>
>>> > >><br>
>>> > >><br>
>>> > >><br>
>>> > >> From: Youenn PIOLET <<a href="mailto:piolet.y@gmail.com" target="_blank">piolet.y@gmail.com</a>><br>
>>> > >> To: "Matt ." <<a href="mailto:yamakasi.014@gmail.com" target="_blank">yamakasi.014@gmail.com</a>><br>
>>> > >> Cc: Christopher Lamb/Switzerland/IBM@IBMCH,<br>
>>> > >> "<a href="mailto:freeipa-users@redhat.com" target="_blank">freeipa-users@redhat.com</a>" <<a href="mailto:freeipa-users@redhat.com" target="_blank">freeipa-users@redhat.com</a>><br>
>>> > >> Date: <a href="tel:04.08.2015%2018" value="+33408201518" target="_blank">04.08.2015 18</a>:56<br>
>>> > >> Subject: Re: [Freeipa-users] Ubuntu Samba Server Auth<br>
>>> > against<br>
>>> > IPA<br>
>>> > >><br>
>>> > >><br>
>>> > >><br>
>>> > >> Hi there,<br>
>>> > >><br>
>>> > >> I have difficulties to follow you at this point :)<br>
>>> > >> Here is what I've done and what I've understood:<br>
>>> > >><br>
>>> > >> ## SMB Side<br>
>>> > >> - Testparm OK<br>
>>> > >> - I've got the same NT_STATUS_NO_SUCH_USER when I try to connect.<br>
>>> > >> - pdbedit -Lv output is all successfull but I can see there is a<br>
>>> > filter :<br>
>>> > >> (&(uid=*)(objectclass=sambaSamAccount). In LDAP, the users don't<br>
>>> > have<br>
>>> > >> sambaSamAccount.<br>
>>> > >><br>
>>> > >> ## LDAP / FreeIPA side<br>
>>> > >> - Since SMB server uses LDAP, I did ipa-adtrust-install on my<br>
>>> > FreeIPA<br>
>>> > >> server to get samba LDAP extensions.<br>
>>> > >> - I can see samba classes exist in LDAP but are not used on my<br>
>>> > group<br>
>>> > >> objects nor my user objects<br>
>>> > >> - I have add sambaSamAccount in FreeIPA default user classes,<br>
>>> > >> and sambaGroupMapping to default group classes. In that state I<br>
>>> > can't<br>
>>> > >> create user nor groups anymore, as new samba attributes are<br>
> needed<br>
>>> > for<br>
>>> > >> instantiation.<br>
>>> > >> - I have add in etc ipaCustomFields: 'Samba Group<br>
>>> > > Type,sambagrouptype,true'<br>
>>> > >> but I don't get what it does.<br>
>>> > >> - I tried to add the samba.js plugin. It works, and adds the<br>
>>> > "local"<br>
>>> > > option<br>
>>> > >> when creating a group in FreeIPA, supposed to set sambagrouptype<br>
> to<br>
>>> > 4<br>
>>> > or<br>
>>> > > 2<br>
>>> > >> (domain). It doesn't work and tells that sambagrouptype attribute<br>
>>> > doesn't<br>
>>> > >> exist (but it should now I put sambaGroupType class by<br>
> default...)<br>
>>> > >><br>
>>> > >> ## Questions<br>
>>> > >> 0) Can I ask samba not to search sambaSamAccount and use unix /<br>
>>> > posix<br>
>>> > >> instead? I guess no.<br>
>>> > >> 1) How to generate the user/group SIDs ? They are requested to<br>
> add<br>
>>> > >> sambaSamAccount classes.<br>
>>> > >> This article doesn't seem relevant since we don't use domain<br>
>>> > controller<br>
>>> > >><br>
>>> > ><br>
>>> ><br>
>>> ><br>
> <a href="http://docs.fedoraproject.org/en-US/Fedora/17/html/FreeIPA_Guide/cifs.html" rel="noreferrer" target="_blank">http://docs.fedoraproject.org/en-US/Fedora/17/html/FreeIPA_Guide/cifs.html</a><br>
>>> ><br>
>>> > >> and netgetlocalsid returns an error.<br>
>>> > >> 2) How to fix samba.js plugin?<br>
>>> > >> 3) I guess an equivalent of samba.js is needed for user creation,<br>
>>> > where<br>
>>> > > can<br>
>>> > >> I find it?<br>
>>> > >> 4) Is your setup working with Windows 8 / Windows 10 and not only<br>
>>> > Windows<br>
>>> > >> 7?<br>
>>> > >><br>
>>> > >> Thanks a lot for your previous and future answers<br>
>>> > >><br>
>>> > >> --<br>
>>> > >> Youenn Piolet<br>
>>> > >> <a href="mailto:piolet.y@gmail.com" target="_blank">piolet.y@gmail.com</a><br>
>>> > >><br>
>>> > >><br>
>>> > >> 2015-08-04 17:55 GMT+02:00 Matt . <<a href="mailto:yamakasi.014@gmail.com" target="_blank">yamakasi.014@gmail.com</a>>:<br>
>>> > >> Hi,<br>
>>> > >><br>
>>> > >> Yes, log is anonymised.<br>
>>> > >><br>
>>> > >> It's strange, my user doesn't have a SambaPwdLastSet, also when<br>
> I<br>
>>> > >> change it's password it doesn't get it in ldap.<br>
>>> > >><br>
>>> > >> There must be something going wrong I guess.<br>
>>> > >><br>
>>> > >> Matt<br>
>>> > >><br>
>>> > >> 2015-08-04 17:45 GMT+02:00 Christopher Lamb<br>
>>> > > <<a href="mailto:christopher.lamb@ch.ibm.com" target="_blank">christopher.lamb@ch.ibm.com</a><br>
>>> > >> >:<br>
>>> > >> > Hi Matt<br>
>>> > >> ><br>
>>> > >> > I assume [username] is a real username, identical to that in<br>
>>> > the<br>
>>> > >> FreeIPA<br>
>>> > >> > cn=accounts, cn=users tree? (i.e. you anonymised the log<br>
>>> > extract).<br>
>>> > >> ><br>
>>> > >> > You user should be a member of the appropriate samba groups<br>
>>> > that<br>
>>> > you<br>
>>> > >> setup<br>
>>> > >> > in FreeIPA.<br>
>>> > >> ><br>
>>> > >> > You should check that the user attribute SambaPwdLastSet is<br>
> set<br>
>>> > to<br>
>>> > a<br>
>>> > >> > positive value (e.g. 1). If not you get an error in the Samba<br>
>>> > logs<br>
>>> > -<br>
>>> > > I<br>
>>> > >> > would need to play around again with a test user to find out<br>
>>> > the<br>
>>> > > exact<br>
>>> > >> > error.<br>
>>> > >> ><br>
>>> > >> > I don't understand what you mean about syncing the users<br>
> local,<br>
>>> > but<br>
>>> > > we<br>
>>> > >> did<br>
>>> > >> > not need to do anything like that.<br>
>>> > >> ><br>
>>> > >> > Chris<br>
>>> > >> ><br>
>>> > >> ><br>
>>> > >> ><br>
>>> > >> ><br>
>>> > >> > From: "Matt ." <<a href="mailto:yamakasi.014@gmail.com" target="_blank">yamakasi.014@gmail.com</a>><br>
>>> > >> > To: Christopher Lamb/Switzerland/IBM@IBMCH<br>
>>> > >> > Cc: "<a href="mailto:freeipa-users@redhat.com" target="_blank">freeipa-users@redhat.com</a>" <<a href="mailto:freeipa-users@redhat.com" target="_blank">freeipa-users@redhat.com</a>><br>
>>> > >> > Date: <a href="tel:04.08.2015%2015" value="+33408201515" target="_blank">04.08.2015 15</a>:33<br>
>>> > >> > Subject: Re: [Freeipa-users] Ubuntu Samba Server Auth<br>
>>> > against<br>
>>> > >> IPA<br>
>>> > >> ><br>
>>> > >> ><br>
>>> > >> ><br>
>>> > >> > Hi Chris,<br>
>>> > >> ><br>
>>> > >> > A puppet run added another passdb backend, that was causing<br>
> my<br>
>>> > issue.<br>
>>> > >> ><br>
>>> > >> > What I still experience is:<br>
>>> > >> ><br>
>>> > >> ><br>
>>> > >> > [2015/08/04 15:29:45.477783, 3]<br>
>>> > >> > ../source3/auth/check_samsec.c:399(check_sam_security)<br>
>>> > >> > check_sam_security: Couldn't find user 'username' in<br>
> passdb.<br>
>>> > >> > [2015/08/04 15:29:45.478026, 2]<br>
>>> > >> > ../source3/auth/auth.c:288(auth_check_ntlm_password)<br>
>>> > >> > check_ntlm_password: Authentication for user [username] -><br>
>>> > >> > [username] FAILED with error NT_STATUS_NO_SUCH_USER<br>
>>> > >> ><br>
>>> > >> ><br>
>>> > >> > I also wonder if I shall still sync the users local, or is it<br>
>>> > > needed ?<br>
>>> > >> ><br>
>>> > >> > Thanks again,<br>
>>> > >> ><br>
>>> > >> > Matt<br>
>>> > >> ><br>
>>> > >> > 2015-08-04 14:16 GMT+02:00 Christopher Lamb <<br>
>>> > >> <a href="mailto:christopher.lamb@ch.ibm.com" target="_blank">christopher.lamb@ch.ibm.com</a>>:<br>
>>> > >> >> Hi Matt<br>
>>> > >> >><br>
>>> > >> >> From our smb.conf file:<br>
>>> > >> >><br>
>>> > >> >> [global]<br>
>>> > >> >> security = user<br>
>>> > >> >> passdb backend =<br>
>>> > ldapsam:ldap://<a href="http://xxx-ldap2.my.silly.example.com" rel="noreferrer" target="_blank">xxx-ldap2.my.silly.example.com</a><br>
>>> > >> >> ldap suffix = dc=my,dc=silly,dc=example,dc=com<br>
>>> > >> >> ldap admin dn = cn=Directory Manager<br>
>>> > >> >><br>
>>> > >> >> So yes, we use Directory Manager, it works for us. I have<br>
> not<br>
>>> > tried<br>
>>> > >> with<br>
>>> > >> > a<br>
>>> > >> >> less powerful user, but it is conceivable that a lesser user<br>
>>> > may<br>
>>> > not<br>
>>> > >> see<br>
>>> > >> >> all the required attributes, resulting in "no such user"<br>
>>> > errors.<br>
>>> > >> >><br>
>>> > >> >> Chris<br>
>>> > >> >><br>
>>> > >> >><br>
>>> > >> >><br>
>>> > >> >><br>
>>> > >> >> From: "Matt ." <<a href="mailto:yamakasi.014@gmail.com" target="_blank">yamakasi.014@gmail.com</a>><br>
>>> > >> >> To: Christopher Lamb/Switzerland/IBM@IBMCH<br>
>>> > >> >> Cc: "<a href="mailto:freeipa-users@redhat.com" target="_blank">freeipa-users@redhat.com</a>"<br>
> <<a href="mailto:freeipa-users@redhat.com" target="_blank">freeipa-users@redhat.com</a>><br>
>>> > >> >> Date: <a href="tel:04.08.2015%2013" value="+33408201513" target="_blank">04.08.2015 13</a>:32<br>
>>> > >> >> Subject: Re: [Freeipa-users] Ubuntu Samba Server Auth<br>
>>> > against<br>
>>> > >> IPA<br>
>>> > >> >><br>
>>> > >> >><br>
>>> > >> >><br>
>>> > >> >> Hi Chris,<br>
>>> > >> >><br>
>>> > >> >> Thanks for the heads up, indeed local is 4 I see now when I<br>
>>> > add a<br>
>>> > >> >> group from the GUI, great thanks!<br>
>>> > >> >><br>
>>> > >> >> But do you use Directory Manager as ldap admin user or some<br>
>>> > other<br>
>>> > >> >> admin account ?<br>
>>> > >> >><br>
>>> > >> >> I'm not sure id DM is needed and it should get that deep<br>
> into<br>
>>> > IPA.<br>
>>> > >> >> Also when starting samba it cannot find "such user" as that<br>
>>> > sounds<br>
>>> > >> >> quite known as it has no UID.<br>
>>> > >> >><br>
>>> > >> >> From your config I see you use DM, this should work ?<br>
>>> > >> >><br>
>>> > >> >> Thanks!<br>
>>> > >> >><br>
>>> > >> >><br>
>>> > >> >> Matt<br>
>>> > >> >><br>
>>> > >> >><br>
>>> > >> ><br>
>>> > >> ><br>
>>> > >> ><br>
>>> > >> ><br>
>>> > >><br>
>>> > >> --<br>
>>> > >> Manage your subscription for the Freeipa-users mailing list:<br>
>>> > >> <a href="https://www.redhat.com/mailman/listinfo/freeipa-users" rel="noreferrer" target="_blank">https://www.redhat.com/mailman/listinfo/freeipa-users</a><br>
>>> > >> Go to <a href="http://freeipa.org" rel="noreferrer" target="_blank">http://freeipa.org</a> for more info on the project<br>
>>> > >><br>
>>> > >><br>
>>> > >><br>
>>> > ><br>
>>> > ><br>
>>> > ><br>
>>> > ><br>
>>> > > --<br>
>>> > > Manage your subscription for the Freeipa-users mailing list:<br>
>>> > > <a href="https://www.redhat.com/mailman/listinfo/freeipa-users" rel="noreferrer" target="_blank">https://www.redhat.com/mailman/listinfo/freeipa-users</a><br>
>>> > > Go to <a href="http://freeipa.org" rel="noreferrer" target="_blank">http://freeipa.org</a> for more info on the project<br>
>>> > ><br>
>>> > ><br>
>>> > ><br>
>>> > ><br>
>>> ><br>
>>> > --<br>
>>> > Manage your subscription for the Freeipa-users mailing list:<br>
>>> > <a href="https://www.redhat.com/mailman/listinfo/freeipa-users" rel="noreferrer" target="_blank">https://www.redhat.com/mailman/listinfo/freeipa-users</a><br>
>>> > Go to <a href="http://freeipa.org" rel="noreferrer" target="_blank">http://freeipa.org</a> for more info on the project<br>
>>> ><br>
>>> ><br>
>>> ><br>
>><br>
>><br>
><br>
><br>
><br>
><br>
</div></div></blockquote></div><br></div></div>