On 07/17/13 15:02, Donny Brooks wrote:
On Wednesday, July 17, 2013 01:53 PM CDT, Gaiseric Vandal <gaiseric.van...@gmail.com> wrote:
On 07/17/13 14:32, Donny Brooks wrote:
On Wednesday, July 17, 2013 10:11 AM CDT, Gaiseric Vandal <gaiseric.van...@gmail.com> wrote:
According to the net man page
In order for Samba to be joined or unjoined remotely an account
must be
used that is either member of the Domain Admins group, a member
of the
local Administrators group or a user that is granted the
SeMachineAccountPrivilege privilege.
The simplest thing is probably to have the Domain IT group be a member
of the local admin group on each machine. I don't know if you would
need to grant them the SeMachineAccountPrivilege.
On 07/17/13 09:44, Donny Brooks wrote:
On Saturday, July 13, 2013 04:43 AM CDT, Marc Muehlfeld <sa...@marc-muehlfeld.de> wrote:
Hello Donny,
Am 12.07.2013 21:34, schrieb Donny Brooks:
On the old domain, which was setup before I got here,
> our IT section was in an ldap group that allowed us to
> join PC's to the domain ...
http://wiki.samba.org/index.php/Samba_AD_DC_HOWTO/AD_Delegation#Delegating_.27Joining_Computers_to_the_domain.27-permissions
> ... and when the prompt came up in windows to
> install software we could log in as ourselves.
What do you mean by this? Do you want to have a group of users
automatically in the "administrator" group on your workstations?
http://community.spiceworks.com/how_to/show/2123-add-an-active-directory-group-to-the-local-administrator-group-of-workstation-s
If you mean something else, please give some more details.
Regards,
Marc
Yes, on the old domain we had all of our IT staff in a group that was able to join pcs to the domain and install software by inputting their domain credentials when prompted. Looking at the first link that is for Samba 4.X. We are on Samba 3.5.10 so that does not apply.
--
To unsubscribe from this list go to the following URL and read the
instructions: https://lists.samba.org/mailman/options/samba
Looks like I need to do this here: http://www.samba.org/samba/docs/man/Samba-HOWTO-Collection/groupmapping.html
And map our itgroup to the Domain Admins group. Although we do have a Domain
Admins group in ldap. Should that cause an issue?
Group mapping is to make sure Windows groups map to the correct unix
group. This is not like mapping a Windows user name to a different
unix user name (e.g Windows Administrator = Unix root.)
With LDAP, group mapping is usually simpler since the LDAP object for a
group usually has the Samba SID and the unix group id. The "net
groupmap list" command is useful for validating this. You want to make
sure that you do see group mapping for "Domain Admins" and "Domain
Users" and other well known groups. You are more likely to have to use
the "net groupmap add" command when you don't have LDAP.
Well known groups have to specific relative ID's. The domain admin
group HAS to have a relative ID of 512 in the SID. You have to make
sure the Administrator is in the group. That behavior changes with
versions newer than 3.0.x
#net groupmap list
....
Domain Admins (S-1-5-21-xxxx-xxxxx-xxxxx-512) -> Domain Admins
...
# getent group "Domain Admins"
Domain Admins::512:Administrator
#
I don't think you have a samba issue. I think you have a general
"windows" issue about the most practical way to provide IT group with
sufficient privileges to manage computers with out giving too much access.
Depending on the size of your IT department, and the necessity to
audit/control you makes what change, each IT user may need two accounts,
one that is a regular account and one that is a member of the domain
admins and local admins group. (e.g. donny and donny_admin.) this
way they can do whatever they need, but they don't run as admin for
routine tasks, and you can track who made what change (if need be) or
limit who has full admin rights.
It is correctly mapped and is 512. Nothing changed on the windows side during
the domain change other than removing the machines from the old domain and
rejoining them to the new one. We don't have to have the accounting trail that
two accounts would give us right now. I just want to be able to tell my other
people they can join computers to the domain and perform software upgrades with
their own credentials.
OK
I am looking at your original post again. I don't think you said
which version you had been using.
net rpc rights grant 'MDAH\Domain Admins' SeMachineAccountPrivilege -S
enterprise -U superusername
Is the superuser name the domain Administrator account? The problem
seems to involve the superusername user, not the Domain Admins
group. I think with older version of samba, the Administrator
account was implicit, and you could map the windows Administrator to
the unix root account and all was OK. With the current version I think
you need you create an Administrator samba user (it doesn't have to be
called Administrator but I would do that just to keep things simple) and
add that user to the Domain Admins group.
Does "pdbedit -Lv Administrator" or "pbedit -Lv superusername" work?
You could add the user IT users to the domain admins group. Then you
have all the privileges you need. You should NOT need to grant
SeMachineAccountPrivilege to the Domain Admins group.
Can you post a sanitized version of the Domain Admin group LDIF?
--
To unsubscribe from this list go to the following URL and read the
instructions: https://lists.samba.org/mailman/options/samba