I've used redhat 389 directory server for this, the samba setup I had was a bit different though, so I had to add a samba schema. The only thing I had to find was a ldap client that could hash the SID, ldapadmin was good, but only works on windows.
On Wed, Jan 12, 2011 at 10:27 AM, Bohmer, Andre ten <[email protected]> wrote: > Hi, > > Until now we had to manage a few user accounts per Linux server. We create a > local account with the same name as the Windows Active directory > samAccountName and authenticated via Kerberos. But now we’re on the brink of > rolling out large high performance servers with lot's of users which also > share storage across different Linux servers. So it would be much easier to > grant users access based on AD group membership, but also it's significant > to maintain the same uid/guid across all servers. > > Some googling around show a combination of samba, winbind, ldap, Kerberos > and Microsoft Services for Unix, but also RedHat Directory Server which > seems to do it's own uid/guid mapping without the need of a AD schema > update. > > Any thoughts on what would suite/works best? > > Regards, > Andre > > --- > J.M.G. ten Böhmer > Wageningen UR, SC FB IT - Infrastructure > The Netherlands > > > > _______________________________________________ > rhelv5-list mailing list > [email protected] > https://www.redhat.com/mailman/listinfo/rhelv5-list > > _______________________________________________ rhelv5-list mailing list [email protected] https://www.redhat.com/mailman/listinfo/rhelv5-list
