Gary Winiger wrote:
>>>    | nsswitch.conf.4.txt | Modified nsswitch.conf(4) manpage |
>>>    +---------------------+-----------------------------------+
>>>       
>
>   
>>      Please provide them and I'll make a best effort to review
>>      by the timer.
>>     
>
>       My concern is here in nsswitch.conf(4) functionality.
>       From the provided it's not clear what the project is
>       proposing.
>   

This case basically allows any application using 
get{pw,gr}{nam,uid,gid}() interfaces to resolve Windows users and group 
names using native Active Directory schema. (nssad_details.txt, Section 
6, Bullet 6 has the example).

>       +     When using Active Directory with native schema for name service,
>       +     the default configuration should be modified to use ad for
>       +     for passwd and group, dns for hosts resolution and files
>       +     for the remaining databases on client machines.
>
>       What passwd:, group: entries are supported?
>   

You can add "ad" to any of the existing valid passwd: and group: entries.
Examples:
    passwd: files ad OR
    passwd: files ldap ad

>       In particular how are passwd(1), getauusernam(3), getuserattr(3)
>       and possibly other interfaces affected.
>   

passwd(1) is not supported for "ad". Probably that needs to be addressed 
when we support Windows users to logon to Solaris which is beyond the 
scope of this case. For now passwords of Active Directory users can be 
changed using kpasswd(1) because AD users are Kerberos principals.

Currently AD does not have a native schema that can be mapped to Solaris 
RBAC databases. Therefore RBAC databases won't be supported with "ad".


--Baban


> Gary..
> VIZ.
>
>    Interaction with Password Aging
>        When password aging is turned on, only a limited set of pos-
>        sible  name  services are permitted for the passwd: database
>        in the /etc/nsswitch.conf file:
>
>        passwd:           files
>        
>        passwd:           files nis
>        
>        passwd:           files nisplus
>        
>        passwd:           files ldap
>        
>        passwd:           compat
>        
>        passwd_compat:    nisplus
>        
>        passwd_compat:    ldap
>        
>        Any other settings will cause the passwd(1) command to  fail
>        when it attempts to change the password after expiration and
>        will prevent the user from logging in. These  are  the  only
>        permitted  settings  when password aging has been turned on.
>        Otherwise, you can work around incorrect  passwd:  lines  by
>        using  the  -r  repository argument to the passwd(1) command
>        and using passwd -r repository to override the nsswitch.conf
>        settings  and  specify  in  which  name  service you want to
>        modify your password.
>
>     Interaction with +/- syntax
>       Releases prior to SunOS 5.0 did not have  the  name  service
>       switch  but  did  allow  the  user  some  policy control. In
>       /etc/passwd  one  could  have  entries  of  the  form  +user
>       (include  the  specified user from NIS passwd.byname), -user
>       (exclude the specified  user)  and  +  (include  everything,
>       except  excluded users, from NIS passwd.byname). The desired
>       behavior was often everything in the file followed by every-
>       thing  in  NIS,  expressed  by  a  solitary  + at the end of
>       /etc/passwd. The switch provides  an  alternative  for  this
>       case  (passwd: files nis) that does not require + entries in
>       /etc/passwd and /etc/shadow (the latter is a new addition to
>       SunOS 5.0, see shadow(4)).
>       
>       If this is not sufficient, the NIS/YP  compatibility  source
>       provides  full  +/-  semantics.  It  reads  /etc/passwd  for
>       getpwnam(3C)  functions  and  /etc/shadow  for  getspnam(3C)
>       functions and, if it finds +/- entries, invokes an appropri-
>       ate source. By default, the source is nis, but this  may  be
>       overridden  by  specifying nisplus or ldap as the source for
>       the pseudo-database passwd_compat.
>       
>       Note that in compat mode, for every /etc/passwd entry, there
>       must be a corresponding entry in the /etc/shadow file.
>       
>       The NIS/YP  compatibility  source  also  provides  full  +/-
>       semantics   for   group;  the  relevant  pseudo-database  is
>       group_compat.
> _______________________________________________
> sparks-discuss mailing list
> sparks-discuss at opensolaris.org
> http://mail.opensolaris.org/mailman/listinfo/sparks-discuss
>   


Reply via email to