<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://aznot.com/index.php?action=history&amp;feed=atom&amp;title=Linux%2FSamba%2FDomain_Member</id>
	<title>Linux/Samba/Domain Member - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://aznot.com/index.php?action=history&amp;feed=atom&amp;title=Linux%2FSamba%2FDomain_Member"/>
	<link rel="alternate" type="text/html" href="https://aznot.com/index.php?title=Linux/Samba/Domain_Member&amp;action=history"/>
	<updated>2026-05-07T04:25:43Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://aznot.com/index.php?title=Linux/Samba/Domain_Member&amp;diff=653&amp;oldid=prev</id>
		<title>Kenneth at 00:58, 11 August 2014</title>
		<link rel="alternate" type="text/html" href="https://aznot.com/index.php?title=Linux/Samba/Domain_Member&amp;diff=653&amp;oldid=prev"/>
		<updated>2014-08-11T00:58:01Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==Summary==&lt;br /&gt;
[http://us1.samba.org/samba/ Samba]&lt;br /&gt;
&lt;br /&gt;
[http://www.oreilly.com/catalog/samba/chapter/book/appc_01.html Samba Configuration Option Quick Reference]&lt;br /&gt;
&lt;br /&gt;
==Install Samba==&lt;br /&gt;
 # Install Samba Server&lt;br /&gt;
 yum install samba&lt;br /&gt;
&lt;br /&gt;
 # Install Samba Client (mount.cifs, smbclient)&lt;br /&gt;
 yum install samba-client&lt;br /&gt;
&lt;br /&gt;
==Mounting Samba Shares==&lt;br /&gt;
[http://gentoo-wiki.com/HOWTO_Setup_Samba HOWTO Setup Samba]:&lt;br /&gt;
 mount -t cifs //server/share /mnt/samba -o username=username&lt;br /&gt;
&lt;br /&gt;
==Samba Configuration File==&lt;br /&gt;
 /etc/samba/smb.conf&lt;br /&gt;
&lt;br /&gt;
NOTE: Whenever you modify this file you should run the command &amp;quot;testparm&amp;quot; to check that you have not many any basic syntactic errors. [http://www.mail-archive.com/samba@lists.samba.org/msg20143.html]&lt;br /&gt;
&lt;br /&gt;
==Joining a Domain==&lt;br /&gt;
[http://us1.samba.org/samba/docs/man/Samba-Guide/unixclients.html Samba: Chapter 7. Adding Domain Member Servers and Clients]&lt;br /&gt;
&lt;br /&gt;
*Delete the tdb files that cache Samba information&lt;br /&gt;
 cd /etc/samba&lt;br /&gt;
 rm *tdb&lt;br /&gt;
&lt;br /&gt;
*Configure Samba (/etc/samba/smb.conf):&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[global]&lt;br /&gt;
        # note: set to short domain name&lt;br /&gt;
        workgroup = OEEY&lt;br /&gt;
        # note: set to full domain name&lt;br /&gt;
        realm = CORPORATE.OEEY.COM&lt;br /&gt;
        netbios name = DATA&lt;br /&gt;
        password server = snowbird.contractpal.com&lt;br /&gt;
        username map = /etc/samba/smbusers&lt;br /&gt;
&lt;br /&gt;
        security = ADS&lt;br /&gt;
        encrypt passwords = yes&lt;br /&gt;
        passdb backend = tdbsam&lt;br /&gt;
&lt;br /&gt;
        winbind uid = 10000-65000&lt;br /&gt;
        winbind gid = 10000-65000&lt;br /&gt;
        winbind enum users = yes&lt;br /&gt;
        winbind enum groups = yes&lt;br /&gt;
        #  winbind use default domain = yes&lt;br /&gt;
&lt;br /&gt;
        debuglevel = 1&lt;br /&gt;
&lt;br /&gt;
        # disable printers&lt;br /&gt;
        load printers = no&lt;br /&gt;
        printing = bsd&lt;br /&gt;
        printcap name = /dev/null&lt;br /&gt;
        disable spoolss = yes&lt;br /&gt;
&lt;br /&gt;
        #nt acl support = yes&lt;br /&gt;
        #acl map full control = yes&lt;br /&gt;
        #dos filemode = yes&lt;br /&gt;
&lt;br /&gt;
[homes]&lt;br /&gt;
        comment = Home Directories&lt;br /&gt;
        valid users = %S&lt;br /&gt;
        read only = No&lt;br /&gt;
        browseable = No&lt;br /&gt;
&lt;br /&gt;
[files]&lt;br /&gt;
        path = /test&lt;br /&gt;
        comment = Test&lt;br /&gt;
        read only = No&lt;br /&gt;
        create mask = 0750&lt;br /&gt;
        browseable = Yes&lt;br /&gt;
        guest ok = no&lt;br /&gt;
        preserve case = yes&lt;br /&gt;
        #nt acl support = yes&lt;br /&gt;
&lt;br /&gt;
[test]&lt;br /&gt;
        path = /test&lt;br /&gt;
        public = no&lt;br /&gt;
        browsable = yes&lt;br /&gt;
        read list = @&amp;quot;OEEY\domain users&amp;quot;&lt;br /&gt;
        write list = @&amp;quot;OEEY\domain users&amp;quot;&lt;br /&gt;
        create mask = 0777&lt;br /&gt;
        directory mask = 0777&lt;br /&gt;
        force create mode = 0777&lt;br /&gt;
        force directory mode = 0777&lt;br /&gt;
&lt;br /&gt;
[release]&lt;br /&gt;
        path = /Release&lt;br /&gt;
        public = no&lt;br /&gt;
        browsable = yes&lt;br /&gt;
        read list = @&amp;quot;OEEY\domain users&amp;quot;&lt;br /&gt;
        write list =&lt;br /&gt;
        read only = yes&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Validate your Samba configuration:&lt;br /&gt;
 testparm -s&lt;br /&gt;
&lt;br /&gt;
*Join ADS domain:&lt;br /&gt;
 # Samba does not need to be running at this step, but the smb.conf will be parsed&lt;br /&gt;
 net ads join -UAdministrator&lt;br /&gt;
 # for debugging purposes:&lt;br /&gt;
 net ads join -UAdministrator%mypassword -d3&lt;br /&gt;
&lt;br /&gt;
NOTE: never execute the net rpc join command in an attempt to join the Samba server to the domain, unless you wish not to use the Kerberos security protocols. [http://us1.samba.org/samba/docs/man/Samba-Guide/unixclients.html]&lt;br /&gt;
&lt;br /&gt;
*Test ADS connection:&lt;br /&gt;
Simple ADS information:&lt;br /&gt;
 net ads info&lt;br /&gt;
&lt;br /&gt;
One can also check that the connection was made by checking the secrets.tdb file.&lt;br /&gt;
 tdbdump secrets.tdb&lt;br /&gt;
&lt;br /&gt;
Or way more information than you care for:&lt;br /&gt;
 net ads status -UAdministrator%mypassword&lt;br /&gt;
&lt;br /&gt;
*Configure Kerberos (/etc/krb5.conf):&lt;br /&gt;
 [libdefaults]&lt;br /&gt;
 default_realm = CORPORATE.OEEY.COM&lt;br /&gt;
 dns_lookup_kdc = true&lt;br /&gt;
 ...&lt;br /&gt;
 [realms]&lt;br /&gt;
  CORPORATE.OEEY.COM = {&lt;br /&gt;
   kdc = snowbird.contractpal.com:88&lt;br /&gt;
   admin_server = snowbird.contractpal.com:749&lt;br /&gt;
   default_domain = contractpal.com&lt;br /&gt;
  }&lt;br /&gt;
 ...&lt;br /&gt;
 [domain_realm]&lt;br /&gt;
 .corporate.OEEY.com = CORPORATE.OEEY.COM&lt;br /&gt;
 corporate.OEEY.com = CORPORATE.OEEY.COM&lt;br /&gt;
&lt;br /&gt;
*Test Kerberos connection:&lt;br /&gt;
 kinit Administrator&lt;br /&gt;
 klist&lt;br /&gt;
&lt;br /&gt;
*Test Winbind:&lt;br /&gt;
 service winbind restart&lt;br /&gt;
 &lt;br /&gt;
 # list domain users&lt;br /&gt;
 wbinfo -u&lt;br /&gt;
 # list domain groups&lt;br /&gt;
 wbinfo -g&lt;br /&gt;
&lt;br /&gt;
List winbind database information:&lt;br /&gt;
 tdbdump /var/cache/samba/winbindd_idmap.tdb&lt;br /&gt;
 tdbdump /var/cache/samba/winbindd_cache.tdb&lt;br /&gt;
&lt;br /&gt;
*Edit /etc/nsswitch.conf&lt;br /&gt;
 # passwd, group, hosts: winbind&lt;br /&gt;
 passwd:     files winbind&lt;br /&gt;
 #shadow:     files winbind&lt;br /&gt;
 shadow:     files&lt;br /&gt;
 group:      files winbind&lt;br /&gt;
 &lt;br /&gt;
 hosts:      files wins&lt;br /&gt;
 #possibly use:&lt;br /&gt;
 #hosts:      files dns winbind&lt;br /&gt;
&lt;br /&gt;
*Test nss:&lt;br /&gt;
 # should now show domain users&lt;br /&gt;
 getent passwd&lt;br /&gt;
 &lt;br /&gt;
 # should now show domain groups&lt;br /&gt;
 getent passwd&lt;br /&gt;
&lt;br /&gt;
*Edit samba PAM configuration (/etc/pam.d/samba):&lt;br /&gt;
 #%PAM-1.0&lt;br /&gt;
 &lt;br /&gt;
 # USE WINBIND FOR AUTHENTICATION&lt;br /&gt;
 auth sufficient         /lib/security/pam_winbind.so try_first_pass&lt;br /&gt;
 account sufficient      /lib/security/pam_winbind.so try_first_pass&lt;br /&gt;
 session sufficient      /lib/security/pam_winbind.so try_first_pass&lt;br /&gt;
&lt;br /&gt;
*Start samba:&lt;br /&gt;
 service smb start&lt;br /&gt;
&lt;br /&gt;
*Test samba connection:&lt;br /&gt;
 smbclient -L DATA -UAdministrator&lt;br /&gt;
&lt;br /&gt;
Old bad way of joining a domain (do not use):&lt;br /&gt;
 #Join Domain: &amp;quot;sudo net rpc join -W OEEY -U Administrator -S snowbird -I 10.161.101.8&amp;quot;&lt;br /&gt;
&lt;br /&gt;
===Joining Domain References===&lt;br /&gt;
*[http://us1.samba.org/samba/docs/man/Samba-HOWTO-Collection/domain-member.html Samba: Domain Member]&lt;br /&gt;
*[http://us1.samba.org/samba/docs/man/Samba3-HOWTO/domain-member.html#id2538809 Samba: Domain Membership]&lt;br /&gt;
*[http://acd.ucar.edu/~fredrick/linux/samba3/ Samba 3 and joining an Active Directory/domain]&lt;br /&gt;
&lt;br /&gt;
==List users and groups of domain==&lt;br /&gt;
This [http://lists.samba.org/archive/samba/2004-January/079030.html article] shows a cool script.&lt;br /&gt;
&lt;br /&gt;
Test joining the domain:&lt;br /&gt;
 wbinfo -t&lt;br /&gt;
 checking the trust secret via RPC calls succeeded&lt;br /&gt;
&lt;br /&gt;
To view domain users:&lt;br /&gt;
 wbinfo -u &lt;br /&gt;
&lt;br /&gt;
To view domain groups:&lt;br /&gt;
 wbinfo -g&lt;br /&gt;
&lt;br /&gt;
To view user details (not local unix user):&lt;br /&gt;
 wbinfo -i &amp;lt;user&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To view user groups id:&lt;br /&gt;
 wbinfo -r &amp;lt;user&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To see all users (including those from winbind): [http://www.tek-tips.com/viewthread.cfm?qid=1113365&amp;amp;page=12]&lt;br /&gt;
 getent passwd&lt;br /&gt;
&lt;br /&gt;
Authenticate: [http://www.tek-tips.com/viewthread.cfm?qid=1113365&amp;amp;page=12]&lt;br /&gt;
 wbinfo -a testuser%testpass&lt;br /&gt;
&lt;br /&gt;
Test challenge/response:&lt;br /&gt;
 wbinfo -a [domain]\\[user]%[password]&lt;br /&gt;
&lt;br /&gt;
==PAM and Samba==&lt;br /&gt;
This [http://lists.samba.org/archive/samba/2006-September/124938.html article] shows how to use winbind for Samba PAM authentication:&lt;br /&gt;
 /etc/pam.d/samba:&lt;br /&gt;
 &lt;br /&gt;
See [[/etc/pam.d/samba]]&lt;br /&gt;
&lt;br /&gt;
[http://kbase.redhat.com/faq/FAQ_79_5365.shtm How can I configure my Red Hat Enterprise Linux system to use pam_winbind.so so users can log into the server using their domain username and password?]&lt;br /&gt;
:It is also assumed that the domain user&amp;#039;s home directory has already been created on the system in the correct location, because winbind cannot create home directories.&lt;br /&gt;
&lt;br /&gt;
/etc/pam.d/system-auth:&lt;br /&gt;
 #%PAM-1.0&lt;br /&gt;
 # This file is auto-generated.&lt;br /&gt;
 # User changes will be destroyed the next time authconfig is run.&lt;br /&gt;
 auth        required      /lib/security/$ISA/pam_env.so&lt;br /&gt;
 auth        sufficient    /lib/security/$ISA/pam_unix.so likeauth nullok&lt;br /&gt;
 auth        sufficient    /lib/security/$ISA/pam_winbind.so use_first_pass&lt;br /&gt;
 auth        required      /lib/security/$ISA/pam_deny.so&lt;br /&gt;
 &lt;br /&gt;
 account     required      /lib/security/$ISA/pam_unix.so broken_shadow&lt;br /&gt;
 account     [default=bad success=ok user_unknown=ignore] /lib/security/$ISA/pam_winbind.so&lt;br /&gt;
 account     required      /lib/security/$ISA/pam_permit.so&lt;br /&gt;
 &lt;br /&gt;
 password    required      /lib/security/$ISA/pam_cracklib.so retry=3 type=&lt;br /&gt;
 password    sufficient    /lib/security/$ISA/pam_unix.so nullok use_authtok md5 shadow&lt;br /&gt;
 password    sufficient    /lib/security/$ISA/pam_winbind.so use_authtok&lt;br /&gt;
 password    required      /lib/security/$ISA/pam_deny.so&lt;br /&gt;
 &lt;br /&gt;
 session     required      /lib/security/$ISA/pam_limits.so&lt;br /&gt;
 session     required      /lib/security/$ISA/pam_unix.so&lt;br /&gt;
&lt;br /&gt;
A single line can be added to the session section of /etc/pam.d/system-auth file, to make use of the pam_mkhomedir.so PAM module. This module will automatically create a user&amp;#039;s home directory if they have authenticated successfully and if the home directory does not already exist. If pam_mkhomedir.so has to create the user&amp;#039;s home directory, the template homedir statement in /etc/samba/smb.conf will be used to determine where to create the user&amp;#039;s home directory.&lt;br /&gt;
&lt;br /&gt;
 session     required      /lib/security/$ISA/pam_mkhomedir.so skel=/etc/skel umask=0077&lt;br /&gt;
 session     required      /lib/security/$ISA/pam_limits.so&lt;br /&gt;
 session     required      /lib/security/$ISA/pam_unix.so      &lt;br /&gt;
&lt;br /&gt;
Auto creation of home directories:&lt;br /&gt;
&lt;br /&gt;
[http://www.ccs.neu.edu/home/battista/documentation/winbind/pam.html Using Winbind to Resolve Active Directory Accounts in Debian]:&lt;br /&gt;
:We need to configure our system to create home directories for each of the Active Directory users. Insert a reference to the pam_mkhomedir module in /etc/pam.d/common-session as shown below:&lt;br /&gt;
 # /etc/pam.d/common-session&lt;br /&gt;
 session	required	pam_mkhomedir.so skel=/etc/skel/ umask=0022&lt;br /&gt;
 session	sufficient	pam_winbind.so&lt;br /&gt;
 session required	pam_unix.so&lt;br /&gt;
&lt;br /&gt;
==nsswitch.conf==&lt;br /&gt;
See [[/etc/nsswitch.conf]]&lt;br /&gt;
&lt;br /&gt;
[http://kbase.redhat.com/faq/FAQ_71_2462.shtm What changes do I need to make to nsswitch.conf for winbind to work?]&lt;br /&gt;
&lt;br /&gt;
 passwd:       files winbind&lt;br /&gt;
 shadow:       files&lt;br /&gt;
 group:        files winbind&lt;br /&gt;
&lt;br /&gt;
==IDMAP==&lt;br /&gt;
[http://us1.samba.org/samba/docs/man/Samba-HOWTO-Collection/idmapper.html Samba: Chapter 14. Identity Mapping (IDMAP)]&lt;br /&gt;
&lt;br /&gt;
==Winbind==&lt;br /&gt;
[http://us1.samba.org/samba/docs/man/Samba-HOWTO-Collection/winbind.html Samba: Chapter 24. Winbind: Use of Domain Accounts]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://joseph.randomnetworks.com/archives/2005/11/08/freebsd-users-and-groups-with-samba-winbind-and-active-directory/ Users and Groups with Samba (Winbind) and Active Directory]&lt;br /&gt;
&lt;br /&gt;
[http://kbase.redhat.com/faq/FAQ_79_4760.shtm How do I set up winbind on our Samba server to create users and groups from our domain controller?]&lt;br /&gt;
&lt;br /&gt;
 #  WINBIND STUFF&lt;br /&gt;
   idmap uid = 15000-20000&lt;br /&gt;
   idmap gid = 15000-20000&lt;br /&gt;
   winbind enum groups = yes&lt;br /&gt;
   winbind enum users = yes&lt;br /&gt;
   winbind separator = +&lt;br /&gt;
   winbind use default domain = no&lt;br /&gt;
   template homedir = /homes/%D/%U&lt;br /&gt;
   template shell = /bin/bash&lt;br /&gt;
&lt;br /&gt;
A brief explanation of some of these settings:&lt;br /&gt;
&lt;br /&gt;
    * idmap uid - the range of numeric uid&amp;#039;s that winbind will use to enumerate domain users with on your system. You should select a range that does not conflict with uid numbers already in use on the system and also make sure not to assign users to uid numbers in this range after you start using winbind. Also, it&amp;#039;s probably a good idea to not change the number range once you start using winbind, as it could cause file ownership or group ownership problems.&lt;br /&gt;
&lt;br /&gt;
    * idmap gid - the range of numeric gid&amp;#039;s that winbind will use to enumerate domain groups on your system. The idmap uid cautions noted above apply here as well.&lt;br /&gt;
&lt;br /&gt;
    * winbind enum groups and winbind enum users - whether winbind should &amp;quot;create&amp;quot; the domain&amp;#039;s groups/users on the system or not. Leave these both set to yes unless you want to turn the functionality off for some reason.&lt;br /&gt;
&lt;br /&gt;
    * winbind separator - the character winbind will use to separate the domain name from the user or group name. Using such a configuration will cause domain usernames to appear like this - &amp;quot;MYDOMAIN+username&amp;quot; and domain group names to appear like this - &amp;quot;MYDOMAIN+Domain Users&amp;quot; for example.&lt;br /&gt;
&lt;br /&gt;
    * The template homedir statement is used to generate the home directory path for domain users. The example given uses variable substitution and would cause winbind-enumerated users&amp;#039; home directories to appear as /homes/MYDOMAIN/username.&lt;br /&gt;
&lt;br /&gt;
Note that if you wish certain (or all) domain users to have a home directory on the Samba server, you will have to create it for them. While the template homedir statement does control where Samba thinks the user&amp;#039;s home directory will be, winbind will not actually create the user&amp;#039;s home directory for you.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can test the basic user and group enumeration functionality of winbind with wbinfo and getent commands:&lt;br /&gt;
&lt;br /&gt;
 # wbinfo -u&lt;br /&gt;
 MYDOMAIN+vince&lt;br /&gt;
 MYDOMAIN+Administrator&lt;br /&gt;
 MYDOMAIN+Guest&lt;br /&gt;
 &lt;br /&gt;
 # wbinfo -g&lt;br /&gt;
 MYDOMAIN+Domain Admins&lt;br /&gt;
 MYDOMAIN+Domain Users&lt;br /&gt;
 MYDOMAIN+Domain Guests&lt;br /&gt;
 &lt;br /&gt;
 # getent group&lt;br /&gt;
 quaggavty:x:102:&lt;br /&gt;
 quagga:x:92:&lt;br /&gt;
 radvd:x:75:&lt;br /&gt;
 radiusd:x:95:&lt;br /&gt;
 MYDOMAIN+Domain Admins:x:15008:MYDOMAIN+Administrator&lt;br /&gt;
 MYDOMAIN+Domain Users:x:15009:&lt;br /&gt;
 MYDOMAIN+Domain Guests:x:15010:MYDOMAIN+Guest&lt;br /&gt;
 &lt;br /&gt;
 # getent passwd&lt;br /&gt;
 radvd:x:75:75:radvd user:/:/sbin/nologin&lt;br /&gt;
 radiusd:x:95:95:radiusd user:/:/bin/false&lt;br /&gt;
 MYDOMAIN+vince:x:15001:15009:Vince:/homes/MYDOMAIN/vince:/bin/bash&lt;br /&gt;
 MYDOMAIN+administrator:x:15009:15009:Administrator:/homes/MYDOMAIN/&lt;br /&gt;
    administrator:/bin/bash&lt;br /&gt;
 MYDOMAIN+guest:x:15010:15009:Guest:/homes/MYDOMAIN/guest:/bin/bash&lt;br /&gt;
&lt;br /&gt;
[http://www.comms.scitech.susx.ac.uk/fft/howto/Samba-tng/winbindd.8.html winbindd (8)]&lt;br /&gt;
&lt;br /&gt;
==Read Write Groups==&lt;br /&gt;
Domain Groups [http://lists.samba.org/archive/samba/2004-March/082794.html]&lt;br /&gt;
 write list = @&amp;quot;AMITY+Domain Admins&amp;quot;&lt;br /&gt;
 write list = @&amp;quot;Domain Admins&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Controlling Access to Shares==&lt;br /&gt;
[http://www.oreilly.com/catalog/samba/chapter/book/ch06_02.html Controlling Access to Shares]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://kbase.redhat.com/faq/FAQ_71_2356.shtm How can I restrict access in Samba?]:&lt;br /&gt;
 [global]&lt;br /&gt;
 workgroup = WORKGROUP&lt;br /&gt;
 netbios name = LOCALHOST&lt;br /&gt;
 security = share&lt;br /&gt;
 hosts allow = 127.0.0. 10.&lt;br /&gt;
 &lt;br /&gt;
 [share1]&lt;br /&gt;
 comment = First Share&lt;br /&gt;
 path = /home/share1&lt;br /&gt;
 #bob janet and all members of groupa are permitted access&lt;br /&gt;
 valid users = bob janet @groupa&lt;br /&gt;
 #only machines with 10.0.0.5, 10.2.5.10, and 10.0.1.1-255 are allowed&lt;br /&gt;
 hosts allow = 10.0.0.5 10.2.5.10 10.0.1.&lt;br /&gt;
&lt;br /&gt;
==Mounting disk with loopback device to test ACLs==&lt;br /&gt;
See [[Mounting Loopback Device]]&lt;br /&gt;
&lt;br /&gt;
7. Mount with ACL option&lt;br /&gt;
 mkdir /mnt/disk.image&lt;br /&gt;
 mount -t ext3 -o loop,defaults,acl disk.image /mnt/disk.image&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Disable Printers==&lt;br /&gt;
[http://lists.samba.org/archive/samba/2006-February/117184.html Novice question - How to completely disable printing and /etc/printcap errors]:&lt;br /&gt;
 load printers = no&lt;br /&gt;
 printing = bsd&lt;br /&gt;
 printcap name = /dev/null&lt;br /&gt;
 disable spoolss = yes&lt;br /&gt;
&lt;br /&gt;
==Firewall==&lt;br /&gt;
[http://troy.jdmz.net/samba/fw/ Samba and IPTables]&lt;br /&gt;
&lt;br /&gt;
 netbios-ns 137/udp # NetBIOS Name Service&lt;br /&gt;
 netbios-dgm 138/udp # NetBIOS Datagram Service&lt;br /&gt;
 netbios-ssn 139/tcp # NetBIOS Session Service&lt;br /&gt;
 microsoft-ds 445/tcp # Microsoft Directory Service&lt;br /&gt;
&lt;br /&gt;
Easier:&lt;br /&gt;
 system-config-security-tui&lt;br /&gt;
 (which writes out to /etc/sysconfig/system-config-securitylevel)&lt;br /&gt;
&lt;br /&gt;
==Troubleshooting==&lt;br /&gt;
# Check /var/log/messages&lt;br /&gt;
# Ceheck /var/log/samba/*&lt;br /&gt;
&lt;br /&gt;
===Could not connect to server snowbird===&lt;br /&gt;
 $ net rpc join -W OEEY -U Administrator -S snowbird -I 10.161.101.&lt;br /&gt;
   Password:&lt;br /&gt;
   Could not connect to server snowbird&lt;br /&gt;
   The username or password was not correct.&lt;br /&gt;
   Connection failed: NT_STATUS_LOGON_FAILURE&lt;br /&gt;
&lt;br /&gt;
===Cannot find KDC for requested realm===&lt;br /&gt;
The log files are repoting:&lt;br /&gt;
 ==&amp;gt; /var/log/samba/log.wb-OEEY &amp;lt;==&lt;br /&gt;
 [2007/10/10 14:00:21, 0] libads/kerberos.c:ads_kinit_password(208)&lt;br /&gt;
   kerberos_kinit_password STAGE$@CORPORATE.OEEY.COM failed: Cannot find KDC for requested realm&lt;br /&gt;
 [2007/10/10 14:00:21, 1] nsswitch/winbindd_ads.c:ads_cached_connection(114)&lt;br /&gt;
   ads_connect for domain OEEY failed: Cannot find KDC for requested realm&lt;br /&gt;
 &lt;br /&gt;
 ==&amp;gt; /var/log/messages &amp;lt;==&lt;br /&gt;
 Oct 10 14:00:21 stage winbindd[20879]: [2007/10/10 14:00:21, 0] libads/kerberos.c:ads_kinit_password(208)&lt;br /&gt;
 Oct 10 14:00:21 stage winbindd[20879]:   kerberos_kinit_password STAGE$@CORPORATE.OEEY.COM failed: Cannot find KDC for requested realm&lt;br /&gt;
&lt;br /&gt;
===NT_STATUS_NO_SUCH_USER===&lt;br /&gt;
 ==&amp;gt; /var/log/samba/smbd.log &amp;lt;==&lt;br /&gt;
 [2007/10/10 15:06:44, 2] auth/auth.c:check_ntlm_password(319)&lt;br /&gt;
   check_ntlm_password:  Authentication for user [test] -&amp;gt; [test] FAILED with error NT_STATUS_NO_SUCH_USER&lt;br /&gt;
&lt;br /&gt;
The user exists in the domain, but not on the local box.&lt;br /&gt;
&lt;br /&gt;
This means that the /etc/krb5.conf is not setup correctly.  Reconfigure the file and try &amp;#039;kinit administrator&amp;#039;.  This should connect to the correct default domain, else you still have the krb5.conf file wrong.&lt;br /&gt;
&lt;br /&gt;
===winbindd: idmap uid range missing or invalid===&lt;br /&gt;
The log files are reporting the following when starting winbind:&lt;br /&gt;
 ==&amp;gt; /var/log/samba/winbindd.log &amp;lt;==&lt;br /&gt;
 [2007/10/10 14:14:17, 1] nsswitch/winbindd.c:main(953)&lt;br /&gt;
   winbindd version 3.0.24-7.fc5 started.&lt;br /&gt;
   Copyright The Samba Team 2000-2004&lt;br /&gt;
 [2007/10/10 14:14:17, 0] nsswitch/winbindd_util.c:winbindd_param_init(787)&lt;br /&gt;
   winbindd: idmap uid range missing or invalid&lt;br /&gt;
 [2007/10/10 14:14:17, 0] nsswitch/winbindd_util.c:winbindd_param_init(788)&lt;br /&gt;
   winbindd: cannot continue, exiting.&lt;br /&gt;
 [2007/10/10 14:14:17, 1] nsswitch/winbindd.c:main(986)&lt;br /&gt;
   Could not init idmap -- netlogon proxy only&lt;br /&gt;
 &lt;br /&gt;
 ==&amp;gt; /var/log/messages &amp;lt;==&lt;br /&gt;
 Oct 10 14:14:17 stage winbindd[21382]: [2007/10/10 14:14:17, 0] nsswitch/winbindd_util.c:winbindd_param_init(787)&lt;br /&gt;
 Oct 10 14:14:17 stage winbindd[21382]:   winbindd: idmap uid range missing or invalid&lt;br /&gt;
 Oct 10 14:14:17 stage winbindd[21382]: [2007/10/10 14:14:17, 0] nsswitch/winbindd_util.c:winbindd_param_init(788)&lt;br /&gt;
 Oct 10 14:14:17 stage winbindd[21382]:   winbindd: cannot continue, exiting.&lt;br /&gt;
&lt;br /&gt;
According to this [http://ubuntuforums.org/archive/index.php/t-184505.html thread] simple include the following lines:&lt;br /&gt;
 /etc/samba/smb.conf:&lt;br /&gt;
   idmap uid = 10000-20000&lt;br /&gt;
   idmap gid = 10000-20000&lt;br /&gt;
&lt;br /&gt;
===Access is denied upon changing ACL===&lt;br /&gt;
 [Security]&lt;br /&gt;
 Unable to save permission changes on &amp;lt;FILE&amp;gt;.&lt;br /&gt;
 Access is denied.&lt;br /&gt;
&lt;br /&gt;
===Logon failure: unknown user name or bad password===&lt;br /&gt;
 C:\&amp;gt;net use x: \\stage\files /user:OEEY\administrator&lt;br /&gt;
 The password or user name is invalid for \\stage\files.&lt;br /&gt;
 &lt;br /&gt;
 Enter the password for &amp;#039;OEEY\administrator&amp;#039; to connect to &amp;#039;stage&amp;#039;:&lt;br /&gt;
 System error 1326 has occurred.&lt;br /&gt;
 &lt;br /&gt;
 Logon failure: unknown user name or bad password.&lt;br /&gt;
&lt;br /&gt;
This is caused by the username not existing on the local unix machine.  See [[#PAM and Samba]]&lt;br /&gt;
&lt;br /&gt;
===Set ACL failed===&lt;br /&gt;
 ==&amp;gt; /var/log/samba/smbd.log &amp;lt;==&lt;br /&gt;
 [2007/10/10 15:44:32, 2] smbd/posix_acls.c:set_canon_ace_list(2502)&lt;br /&gt;
   set_canon_ace_list: sys_acl_set_file type file failed for file c/big (Operation not supported).&lt;br /&gt;
 [2007/10/10 15:44:32, 2] smbd/posix_acls.c:set_canon_ace_list(2502)&lt;br /&gt;
   set_canon_ace_list: sys_acl_set_file type file failed for file c/big (Operation not supported).&lt;br /&gt;
&lt;br /&gt;
This is because the file system does not support ACLs&lt;br /&gt;
&lt;br /&gt;
===Add User Not Working===&lt;br /&gt;
[http://lists.samba.org/archive/samba/2004-January/079063.html Add user script, with winbind, without PAM (Solaris 9)]:&lt;br /&gt;
 add machine script = /path/tothesame/adduserscript %u&lt;br /&gt;
 &lt;br /&gt;
 The &amp;#039;add machine script&amp;#039; is used to create machine trusts accounts&lt;br /&gt;
 when running Samba as a PDC (which you are not in this case)&lt;br /&gt;
 &lt;br /&gt;
 But if you are using winbindd then the user already exists&lt;br /&gt;
 in UNIX.  The getpwnam() call for the DOMAIN\user will succeed&lt;br /&gt;
 and so the &amp;#039;add user script&amp;#039; will never be called.  This is by&lt;br /&gt;
 design.  Do you run winbindd on the 2.2.8a server?&lt;br /&gt;
 &lt;br /&gt;
 The better way to solve your problem is with a &amp;#039;root preexec&amp;#039;&lt;br /&gt;
 script of the share in question.&lt;br /&gt;
&lt;br /&gt;
===Vista workstation unable to connect to Samba share===&lt;br /&gt;
 \\server\share&lt;br /&gt;
 The parameter is incorrect.&lt;br /&gt;
&lt;br /&gt;
 \\server\share&lt;br /&gt;
 A device attached to the system is not functioning.&lt;br /&gt;
&lt;br /&gt;
 \\server\share&lt;br /&gt;
 The referenced account is currently locked out and may not be logged on to.&lt;br /&gt;
&lt;br /&gt;
[http://www.nobluescreens.com/solutions/samba_vista.php Samba and Vista]&lt;br /&gt;
&lt;br /&gt;
Microsoft&amp;#039;s security policy on Windows Vista is interestingly set by default to exclude mapping to Samba shares.&lt;br /&gt;
&lt;br /&gt;
To fix this:&lt;br /&gt;
# click START | Run | &amp;#039;&amp;#039;&amp;#039;secpol.msc&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
# Go to Local Policies | Security Options and find &amp;#039;&amp;#039;&amp;#039;Network Security: LAN Manager authentication level&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
# Change the settings from Send NTLMv2 response only to Send &amp;#039;&amp;#039;&amp;#039;LM &amp;amp; NTLM - use NTLMv2 session security if negotiated&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
Vista defaults to only send the more secure NTLMv2 protocol, which Samba (and, incidentally, some NAS devices) do not support.&lt;br /&gt;
&lt;br /&gt;
[http://forums.microsoft.com/MSDN/ShowPost.aspx?PostID=660925&amp;amp;SiteID=1 If you are using Vista Premium]:&lt;br /&gt;
 HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\LMCompatibilityLevel&lt;br /&gt;
&lt;br /&gt;
This controls the security level mandated or allowed for logins.  In Vista it defaults to 0x3, which means &amp;quot;NTLMv2 only&amp;quot;.  This is not supported by Samba, or at least not supported by any of the Samba servers I use (Mac OS X, Debian Sarge, or Buffalo TeraStation).  This is despite the fact that the Samba documentation implies that it should work.&lt;br /&gt;
&lt;br /&gt;
The fix is to change it to 0x1, which means &amp;quot;use NTLMv2 if available, or older versions if not.&amp;quot;  Reboot.  Samba shares will work just fine.&lt;br /&gt;
&lt;br /&gt;
If we try \\build\release we get &amp;quot;A device attached to the system is not functioning.&amp;quot;.  This [http://www.infrant.com/forum/viewtopic.php?=&amp;amp;p=42685 thread] suggests trying by IP address \\10.161.101.12\release\.  This worked.  Also by full domain \\build.contractpal.com\release\.&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The referenced account is currently locked out and may not be logged on to.&amp;quot;  This is caused by a non domain member vista box attempting to connect to a samba share that is domain authenticated, but does not have the LM security setting enabled.&lt;br /&gt;
&lt;br /&gt;
===Kinit(v5) KDC reply did not match expectations while getting initial credentials===&lt;br /&gt;
Note: this should probably go under Kerberos&lt;br /&gt;
&lt;br /&gt;
 Kinit(v5) KDC reply did not match expectations while getting initial credentials&lt;br /&gt;
&lt;br /&gt;
[http://www.webservertalk.com/archive213-2004-4-185249.html Answer]:&lt;br /&gt;
&lt;br /&gt;
You can get this error when the case of your principal name doesn&amp;#039;t match&lt;br /&gt;
the one returned by the AD KDC. For example:&lt;br /&gt;
administrator@mydomain.com&lt;br /&gt;
But the KDC returns the ticket as&lt;br /&gt;
Administrator@MYDOMAIN.COM&lt;br /&gt;
&lt;br /&gt;
[http://www.trustix.org/wiki/index.php/Samba_and_ADS Answer]:&lt;br /&gt;
&lt;br /&gt;
Note: If you don&amp;#039;t capitalize your realm, you will receive an error&lt;br /&gt;
&lt;br /&gt;
Another article:&lt;br /&gt;
[http://www.netadmintools.com/art172.html Using Samba to Authenticate GNU/Linux Against Active Directory]&lt;br /&gt;
&lt;br /&gt;
===&amp;quot;net ads join&amp;quot; fails, but &amp;quot;net rpc join&amp;quot; works===&lt;br /&gt;
http://us1.samba.org/samba/docs/man/Samba-Guide/unixclients.html&lt;br /&gt;
&lt;br /&gt;
Q. When I tried to execute net ads join, I got no output. It did not work, so I think that it failed. I then executed net rpc join and that worked fine. That is okay, isn&amp;#039;t it?&lt;br /&gt;
&lt;br /&gt;
A. No. This is not okay. It means that your Samba-3 client has joined the ADS domain as a Windows NT4 client, and Samba-3 will not be using Kerberos-based authentication.&lt;br /&gt;
&lt;br /&gt;
===change permissions of a file===&lt;br /&gt;
3.1.2. I&amp;#039;m logged in as Administrator - why can&amp;#039;t I edit permissions or change ownership of a file on a domain-connected Samba share? [http://www.bluelightning.org/linux/samba_acl_howto/]&lt;br /&gt;
&lt;br /&gt;
Under Linux and probably most Unixes, you can&amp;#039;t change permissions on a file unless you are the current owner of the file or root, and you can&amp;#039;t change ownership of a file unless you are root. So you will need to make yourself operate as root when you are logged in as Administrator. To do this, add the following line to the section in smb.conf for the share you are trying to administer:&lt;br /&gt;
&lt;br /&gt;
admin users = DOMAINNAME\Administrator&lt;br /&gt;
&lt;br /&gt;
Currently, if you are using the winbind use default domain option then you will need to omit the domain name:&lt;br /&gt;
&lt;br /&gt;
admin users = Administrator&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.freeos.com/articles/3842/ Samba NT Domain Controller]&lt;br /&gt;
*[http://www.justlinux.com/forum/archive/index.php/t-118512.html Using Winbind with Samba Domain Member Servers]&lt;br /&gt;
&lt;br /&gt;
==Samba Configuration==&lt;br /&gt;
Inherit ACLs [http://www.linuxquestions.org/questions/linux-networking-3/winbindd-idmap-range-missing-error-356259/]:&lt;br /&gt;
 inherit acls = yes&lt;br /&gt;
&lt;br /&gt;
Include Configuration Files [http://www.linuxquestions.org/questions/linux-networking-3/winbindd-idmap-range-missing-error-356259/]:&lt;br /&gt;
 include = /etc/samba/shares.conf&lt;br /&gt;
&lt;br /&gt;
==Files==&lt;br /&gt;
&lt;br /&gt;
===/etc/samba/smb.conf===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Your Workgroup or Domain that you want&lt;br /&gt;
# to login to&lt;br /&gt;
workgroup = OEEY&lt;br /&gt;
&lt;br /&gt;
netbios name = STAGE&lt;br /&gt;
&lt;br /&gt;
#realm = CORPORATE.OEEY.COM&lt;br /&gt;
&lt;br /&gt;
# Tell Samba to talk to domain controller&lt;br /&gt;
# for authentication&lt;br /&gt;
security = domain&lt;br /&gt;
&lt;br /&gt;
# Specify the server to get authenticate&lt;br /&gt;
# from. You can specify the&lt;br /&gt;
# NetBIOS # names of the servers or simply&lt;br /&gt;
# put in a &amp;quot;*&amp;quot; here to let&lt;br /&gt;
# Samba find the server through broadcast&lt;br /&gt;
password server = 10.161.101.8&lt;br /&gt;
&lt;br /&gt;
#add user script = /usr/sbin/useradd -s /bin/false -m %u&lt;br /&gt;
&lt;br /&gt;
# Make sure Samba is using encrypted&lt;br /&gt;
# passwords&lt;br /&gt;
encrypt passwords = yes&lt;br /&gt;
&lt;br /&gt;
debuglevel = 2&lt;br /&gt;
&lt;br /&gt;
#winbind separator = \&lt;br /&gt;
idmap uid = 10000-20000&lt;br /&gt;
idmap gid = 10000-20000&lt;br /&gt;
winbind enum users = yes&lt;br /&gt;
winbind enum groups = yes&lt;br /&gt;
#template homedir = /home/winnt/%D/%U&lt;br /&gt;
#template homedir = /dev/null&lt;br /&gt;
template homedir = /home/%D/%U&lt;br /&gt;
template shell = /bin/bash&lt;br /&gt;
# template primary group = &amp;quot;Domain Users&amp;quot;&lt;br /&gt;
winbind use default domain = yes&lt;br /&gt;
#winbind enum users = yes&lt;br /&gt;
#winbind enum groups = yes&lt;br /&gt;
#winbind cache time = 300&lt;br /&gt;
# no is default&lt;br /&gt;
#winbind nested groups = No&lt;br /&gt;
&lt;br /&gt;
# DISABLE PRINTERS&lt;br /&gt;
load printers = no&lt;br /&gt;
printing = bsd&lt;br /&gt;
printcap name = /dev/null&lt;br /&gt;
disable spoolss = yes&lt;br /&gt;
&lt;br /&gt;
nt acl support = yes&lt;br /&gt;
#acl map full control = yes&lt;br /&gt;
#dos filemode = yes&lt;br /&gt;
&lt;br /&gt;
[homes]&lt;br /&gt;
        read only = no&lt;br /&gt;
        create mask = 0750&lt;br /&gt;
        browseable = yes&lt;br /&gt;
        guest ok = no&lt;br /&gt;
        preserve case = yes&lt;br /&gt;
&lt;br /&gt;
[files]&lt;br /&gt;
        path = /test&lt;br /&gt;
        comment = Test&lt;br /&gt;
        read only = No&lt;br /&gt;
        create mask = 0750&lt;br /&gt;
        browseable = Yes&lt;br /&gt;
        guest ok = no&lt;br /&gt;
        preserve case = yes&lt;br /&gt;
        #nt acl support = yes&lt;br /&gt;
&lt;br /&gt;
[test]&lt;br /&gt;
        path = /test&lt;br /&gt;
        public = no&lt;br /&gt;
        browsable = yes&lt;br /&gt;
        read list = @&amp;quot;OEEY\domain users&amp;quot;&lt;br /&gt;
        write list = @&amp;quot;OEEY\domain users&amp;quot;&lt;br /&gt;
        create mask = 0777&lt;br /&gt;
        directory mask = 0777&lt;br /&gt;
        force create mode = 0777&lt;br /&gt;
        force directory mode = 0777&lt;br /&gt;
        directory security mask = 0777&lt;br /&gt;
        admin users = DOMAINNAME\Administrator&lt;br /&gt;
        force group = &amp;quot;OEEY\domain users&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===/etc/nsswitch.conf===&lt;br /&gt;
 ...&lt;br /&gt;
 #passwd:     files&lt;br /&gt;
 passwd:     files winbind&lt;br /&gt;
 shadow:     files&lt;br /&gt;
 #group:      files&lt;br /&gt;
 group:      files winbind&lt;br /&gt;
 &lt;br /&gt;
 #hosts:     db files nisplus nis dns&lt;br /&gt;
 hosts:      files dns winbind&lt;br /&gt;
 ...&lt;br /&gt;
&lt;br /&gt;
===/etc/pam.d/samba===&lt;br /&gt;
 #%PAM-1.0&lt;br /&gt;
 #auth       required    pam_nologin.so&lt;br /&gt;
 #auth       required    pam_stack.so service=system-auth&lt;br /&gt;
 #account    required    pam_stack.so service=system-auth&lt;br /&gt;
 #session    required    pam_stack.so service=system-auth&lt;br /&gt;
 #password   required    pam_stack.so service=system-auth&lt;br /&gt;
 &lt;br /&gt;
 # USER WINBIND FOR AUTHENTICATION&lt;br /&gt;
 auth sufficient         /usr/lib/security/pam_winbind.so try_first_pass&lt;br /&gt;
 account sufficient      /usr/lib/security/pam_winbind.so try_first_pass&lt;br /&gt;
 session sufficient      /usr/lib/security/pam_winbind.so try_first_pass&lt;br /&gt;
&lt;br /&gt;
===/etc/etc/krb5.conf===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[logging]&lt;br /&gt;
 default = FILE:/var/log/krb5libs.log&lt;br /&gt;
 kdc = FILE:/var/log/krb5kdc.log&lt;br /&gt;
 admin_server = FILE:/var/log/kadmind.log&lt;br /&gt;
&lt;br /&gt;
[libdefaults]&lt;br /&gt;
 default_realm = CORPORATE.OEEY.COM&lt;br /&gt;
 dns_lookup_realm = false&lt;br /&gt;
 dns_lookup_kdc = true&lt;br /&gt;
 ticket_lifetime = 24h&lt;br /&gt;
 forwardable = yes&lt;br /&gt;
&lt;br /&gt;
[realms]&lt;br /&gt;
 OEEY = {&lt;br /&gt;
  kdc = snowbird:88&lt;br /&gt;
  admin_server = snowbird:749&lt;br /&gt;
  default_domain = corporate.OEEY.com&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
[domain_realm]&lt;br /&gt;
 .corporate.OEEY.com = CORPORATE.OEEY.COM&lt;br /&gt;
 corporate.OEEY.com = CORPORATE.OEEY.COM&lt;br /&gt;
&lt;br /&gt;
[kdc]&lt;br /&gt;
 profile = /var/kerberos/krb5kdc/kdc.conf&lt;br /&gt;
&lt;br /&gt;
[appdefaults]&lt;br /&gt;
 pam = {&lt;br /&gt;
   debug = false&lt;br /&gt;
   ticket_lifetime = 36000&lt;br /&gt;
   renew_lifetime = 36000&lt;br /&gt;
   forwardable = true&lt;br /&gt;
   krb4_convert = false&lt;br /&gt;
 }&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==To Read==&lt;br /&gt;
&lt;br /&gt;
Samba PDC + ACL : default ACLs ignored on directory:&lt;br /&gt;
*http://lists.samba.org/archive/samba/2006-June/122252.html&lt;br /&gt;
*http://lists.samba.org/archive/samba-technical/2006-July/048430.html&lt;br /&gt;
*http://techxworld.com/community/blogs/features/archive/2007/05/21/acls-on-samba.aspx&lt;br /&gt;
*http://www.bsdzone.net/howto/Samba/Samba_ACL_Linux/&lt;br /&gt;
*http://marc.info/?l=samba&amp;amp;m=108669545304698&amp;amp;w=2&lt;br /&gt;
*http://gentoo-wiki.com/HOWTO_Implement_Samba_as_your_PDC&lt;br /&gt;
*http://searchenterpriselinux.techtarget.com/loginMembersOnly/1,289498,sid39_gci1080966,00.html?NextURL=http%3A//searchenterpriselinux.techtarget.com/tip/0%2C289483%2Csid39_gci1080966%2C00.html&lt;br /&gt;
*http://osdir.com/ml/org.user-groups.linux.gnhlug/2006-01/msg00293.html&lt;br /&gt;
*http://www.ibm.com/developerworks/library/l-samba/index.html&lt;br /&gt;
*http://help.lockergnome.com/linux/Domain-public-shares-ftopict489907.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fix a Vista to Mac failure to connect problem:&lt;br /&gt;
*http://www.macosxhints.com/article.php?story=20070405070132724&lt;br /&gt;
*http://lists.samba.org/archive/samba/2004-March/081772.html&lt;br /&gt;
&lt;br /&gt;
[Samba] domain user map:&lt;br /&gt;
*http://lists.samba.org/archive/samba/2003-March/064122.html&lt;br /&gt;
*http://ckdake.com/projects/documentation/sambamysql&lt;br /&gt;
*http://www.zytrax.com/tech/howtos/samba.html&lt;br /&gt;
*http://mordor.clayton.edu/samba-tng/tng-pdc-trust.html&lt;br /&gt;
*http://ubuntuforums.org/archive/index.php/t-132025.html&lt;br /&gt;
*http://us3.samba.org/samba/docs/man/Samba-Guide/unixclients.html&lt;br /&gt;
*http://marc.info/?l=samba&amp;amp;m=111539109116227&amp;amp;w=2&lt;br /&gt;
&lt;br /&gt;
samba30b1 - net join responds failure - but machine accountwas created:&lt;br /&gt;
*http://www.mail-archive.com/samba@lists.samba.org/msg19061.html&lt;br /&gt;
*http://www.mail-archive.com/samba@lists.samba.org/msg37693.html&lt;br /&gt;
*http://lists.olug.org/pipermail/olug/2002-July/006052.html&lt;br /&gt;
*http://www.tek-tips.com/viewthread.cfm?qid=1049929&amp;amp;page=1&lt;br /&gt;
*http://www.experts-exchange.com/Networking/Linux_Networking/Q_20375677.html&lt;br /&gt;
*http://gentoo-wiki.com/HOWTO_Add_a_gentoo_server_to_a_windows_network&lt;br /&gt;
*http://readlist.com/lists/lists.samba.org/samba/1/7248.html&lt;br /&gt;
*http://www.nabble.com/Is-there-any-way-to-talk-to-a-preferred-PDC-IP-address--t4560185.html&lt;br /&gt;
*http://www.fedoraforum.org/forum/showthread.php?page=3&amp;amp;t=92804&lt;br /&gt;
*http://www.linuxquestions.org/questions/linux-networking-3/win2k-ad-server-because-of-very-tight-secuirty-i-cant-make-my-linux-box-join-domain-141701/&lt;br /&gt;
*http://www.webservertalk.com/archive217-2006-8-1626382.html&lt;br /&gt;
*http://threebit.net/mail-archive/samba/msg02379.html&lt;br /&gt;
*http://lists.zerezo.com/samba/msg21928.html&lt;br /&gt;
&lt;br /&gt;
[Samba] create_canon_ace_lists: unable to map SID:&lt;br /&gt;
*http://lists.samba.org/archive/samba/2004-April/085007.html&lt;br /&gt;
*http://lists.samba.org/archive/samba-ntdom/2001-October/020105.html&lt;br /&gt;
*http://www.mail-archive.com/samba@lists.samba.org/msg35659.html&lt;br /&gt;
*http://www.mail-archive.com/samba@lists.samba.org/msg38419.html&lt;br /&gt;
*http://archives.devshed.com/forums/samba-120/create-canon-ace-lists-unable-to-map-sid-307806.html&lt;br /&gt;
*http://www.hostingforum.ca/240299-re-samba-relationship-between-2-pdc-samba-acl.html&lt;br /&gt;
*http://lists.slug.org.au/archives/slug/2004/08/msg00839.html&lt;br /&gt;
*http://lists.slug.org.au/archives/slug/2004/08/msg00828.html&lt;br /&gt;
&lt;br /&gt;
[Samba] Cannot find KDC for requested realm:&lt;br /&gt;
*http://lists.samba.org/archive/samba/2005-August/109339.html&lt;br /&gt;
*http://lists.samba.org/archive/samba/2004-March/082074.html&lt;br /&gt;
*http://www.webservertalk.com/archive217-2004-4-202585.html&lt;br /&gt;
*http://www.webservertalk.com/message555089.html&lt;br /&gt;
*http://www.nabble.com/Cannot-find-KDC-for-requested-realm-t214937.html&lt;br /&gt;
*http://www.mail-archive.com/samba@lists.samba.org/msg26098.html&lt;br /&gt;
*http://www.mail-archive.com/samba@lists.samba.org/msg45564.html&lt;br /&gt;
*http://archives.devshed.com/forums/samba-120/problems-when-i-want-join-a-w2k-domain-140075.html&lt;br /&gt;
*http://www.redaht.com/archives/redhat-install-list/2004-November/msg00056.html&lt;br /&gt;
*http://www.linuxquestions.org/questions/linux-networking-3/samba-as-a-windows-2003-ads-member-231606/&lt;br /&gt;
&lt;br /&gt;
Linux Extended Attributes and ACLs:&lt;br /&gt;
*http://acl.bestbits.at/&lt;br /&gt;
*http://www.vanemery.com/Linux/ACL/linux-acl.html&lt;br /&gt;
*http://www.uwsg.iu.edu/hypermail/linux/kernel/0310.0/1284.html&lt;br /&gt;
*http://www.uwsg.iu.edu/hypermail/linux/kernel/0402.0/1119.html&lt;br /&gt;
*http://lists.openwall.net/linux-ext4/2006/12/20/3&lt;br /&gt;
*http://lists.openwall.net/linux-ext4/2006/12/20/1&lt;br /&gt;
*http://osdir.com/ml/linux.vserver/2003-03/msg00000.html&lt;br /&gt;
*http://osdir.com/ml/file-systems.ext4/2006-12/msg00142.html&lt;br /&gt;
*http://lwn.net/Articles/69839/&lt;br /&gt;
&lt;br /&gt;
ACLs on Samba:&lt;br /&gt;
*http://www.bsdzone.net/howto/Samba/Samba_ACL_Linux/&lt;br /&gt;
*http://techxworld.com/community/blogs/features/archive/2007/05/21/acls-on-samba.aspx&lt;br /&gt;
*http://docs.hp.com/en/B8725-90053/ch03s06.html&lt;br /&gt;
*http://searchenterpriselinux.techtarget.com/loginMembersOnly/1,289498,sid39_gci1080966,00.html?NextURL=http%3A//searchenterpriselinux.techtarget.com/tip/0%2C289483%2Csid39_gci1080966%2C00.html&lt;br /&gt;
*http://c.mills.ctru.auckland.ac.nz/Samba/XfsAclWinAuth.html&lt;br /&gt;
*http://home.subnet.at/~max/fs/xfs.php&lt;br /&gt;
*http://bugs.opensolaris.org/view_bug.do?bug_id=2149388&lt;br /&gt;
*http://oss.sgi.com/archives/xfs/2001-05/msg00804.html&lt;br /&gt;
*http://lists.freebsd.org/pipermail/posix1e/2001-April/000428.html&lt;br /&gt;
*http://lists.freebsd.org/pipermail/posix1e/2001-April/000427.html&lt;br /&gt;
&lt;br /&gt;
Samba ACL Linux:&lt;br /&gt;
*http://www.bsdzone.net/howto/Samba/Samba_ACL_Linux/&lt;br /&gt;
*http://techxworld.com/community/blogs/features/archive/2007/05/21/acls-on-samba.aspx&lt;br /&gt;
*http://docs.hp.com/en/B8725-90053/ch03s06.html&lt;br /&gt;
*http://searchenterpriselinux.techtarget.com/loginMembersOnly/1,289498,sid39_gci1080966,00.html?NextURL=http%3A//searchenterpriselinux.techtarget.com/tip/0%2C289483%2Csid39_gci1080966%2C00.html&lt;br /&gt;
*http://c.mills.ctru.auckland.ac.nz/Samba/XfsAclWinAuth.html&lt;br /&gt;
*http://home.subnet.at/~max/fs/xfs.php&lt;br /&gt;
*http://www.faqs.org/docs/samba/ch08.html&lt;br /&gt;
&lt;br /&gt;
Installing Fermi Kerberos on a Linux System: (all good articles)&lt;br /&gt;
http://www.fnal.gov/docs/strongauth/linuxinstall.html&lt;br /&gt;
http://weblog.bignerdranch.com/?p=6&lt;br /&gt;
http://www.linuxjournal.com/article/7336&lt;br /&gt;
http://www.net-security.org/advisory.php?id=7909&lt;br /&gt;
http://cryptnet.net/fdp/admin/kerby-infra/en/kerby-infra.html&lt;/div&gt;</summary>
		<author><name>Kenneth</name></author>
	</entry>
</feed>