Samba Team announced that domain member setups must use winbindd in 4.8.0:
https://www.samba.org/samba/history/samba-4.8.0.html in 2018.

In order to accept AD Kerberos authentication you need to configure the server 
as
domain member with 'security = ads' and without 'server role = standalone 
server'.

In your case you most likely want to configure idmap_nss (see man idmap_nss)
and run winbindd, but without nss_winbind.

Note the above implies the patches from
https://bugzilla.samba.org/show_bug.cgi?id=14901
are included.

Unrelated here but the patch from
https://bugzilla.samba.org/show_bug.cgi?id=14899
should also be applied.


** Bug watch added: Samba Bugzilla #14901
   https://bugzilla.samba.org/show_bug.cgi?id=14901

** Bug watch added: Samba Bugzilla #14899
   https://bugzilla.samba.org/show_bug.cgi?id=14899

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1952219

Title:
  AD-joined Samba Server stops working after upgrade to
  4.13.14+dfsg-0ubuntu0.20.04.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1952219/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to