Showing posts with label Directory. Show all posts
Showing posts with label Directory. Show all posts

Sunday, July 31, 2011

How To Set Up And Integrate An Ubuntu 10.04 LTSPv5 Server Into A Windows 2008 Active Directory Domain

(JavaScript must be enabled in your browser to view the large image as an image overlay.)

dc.domain.internal

Windows 2008 Server running Active Directory and DNS

server.domain.internal

Windows 2003 Server hosting user home directories and file shares

thinserver.domain.internal

Ubuntu 10.04.2 server with LTSPv5

dhcp.domain.internal

CentOS 5.0 server running dhcpd

 

Ubuntu LTSP Installation

To install Ubuntu with LTSP, follow the instructions here.

If your server has more than 4 GB of RAM, make sure you install the Linux PAE Kernel.

sudo apt-get install linux-generic-pae linux-headers-generic-pae

 

Add thinserver to the Windows Domain

Before we add thinserver to the domain, we're going to have to install Samba along with some other packages.

sudo apt-get install samba smbclient winbind libpam-cracklib krb5-user

Make sure that thinserver is named correctly.

hostname

If the hostname command doesn't return thinserver.domain.internal, rename it to thinserver.domain.internal.

hostname thinserver.domain.internal

Edit the /etc/resolv.conf to use dc.domain.internal as the primary DNS server.

search domain.internalnameserver 10.0.0.10

On your domain controller create a host (A) record in your DNS for thinserver.

Verify that thinserver can resolve domain.internal:

nslookup domain.internal

The results should look something like this:

test

View the Original article

Saturday, July 2, 2011

Debian Squeeze, Squid, Kerberos/LDAP Authentication, Active Directory Integration And Cyfin Reporter

EXAMPLE.LOCAL

 

Install Squid 3apt-get install squid3 ldap-utils

Note: Squid configuration takes places after msktutil is configured.

 

Install and run msktutil

Obtain the msktutil package and install it.

cd /var/cache/apt/archives/wget http://fuhm.net/software/msktutil/releases/msktutil_0.4-2_i386.deb
apt-get install libsasl2-modules-gssapi-mit libsasl2-modules
dpkg -i msktutil_0.4-2_i386.deb
cd

Initiate a kerberos session to the server so msktutil can use it to create our Proxy object in Active directory that will be used for access.

kinit administrator

Enter the domain administrator password.

It should then return without errors. You can see if you successfully obtained a ticket with:

klist

Now we configure the proxy in AD with service principles by running msktutil (update the highlighted values with your network).

Warning: You should not move the object from the OU that you use msktutil to create it in.

msktutil -c -b "CN

View the Original article

Postfix/Dovecot Authentication Against Active Directory On CentOS 5.x

com The first virtual domain: example.com

Windows Server with Active Directory:

Hostname: ad.example.com IP address: 192.168.1.20

 

3 Create User Account In AD For LDAP Query

With iRedMail

View the Original article