1
1
<?xml version="1.0" encoding="UTF-8"?>
2
2
<!DOCTYPE article PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
3
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd" [
3
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd" [
4
4
<!ENTITY % globalent SYSTEM "../../../libs/global.ent">
6
6
<!ENTITY % kde-menus-C SYSTEM "../../../libs/kde-menus-C.ent">
8
8
<!ENTITY language "en">
10
<article id="sharing" status="draft">
10
<article id="sharing">
12
12
<title>File Sharing in &kubuntu;</title>
16
This document explains how to share files between Kubuntu and Windows.
16
This document explains how to share files between &kubuntu; and Windows.
22
Computer networks are often comprised of diverse systems, and while operating a network
23
made up entirely of Kubuntu desktop and server computers would certainly be fun, some network environments
24
must consist of both Kubuntu and <trademark class='registered'>Microsoft</trademark>
25
<trademark class='registered'>Windows</trademark> systems working together in harmony.
26
This section of the &kubuntu; &sg-title; introduces principles and tools used in
27
configuring your Kubuntu Server for sharing network resources with Windows computers.
30
<sect1 id="windows-networking-introduction" status="draft">
21
<sect1 id="windows-networking-introduction">
31
22
<title>Introduction</title>
34
Successfully networking your Kubuntu system with Windows clients involves providing and integrating with services
35
common to Windows environments. Such services assist the sharing of data and information about the computers
36
and users involved in the network, and may be classified under three major categories of functionality:
25
Computer networks are often comprised of diverse systems. While operating a
26
network made up entirely of &kubuntu; desktop and server computers would
27
certainly be fun, some network environments will consist of &kubuntu; and
28
<trademark class='registered'>Microsoft</trademark>
29
<trademark class='registered'>Windows</trademark> systems working together. This
30
section of the &kubuntu; &sg-title; introduces principles and tools used for
31
configuring &kubuntu; servers to share network resources with Windows computers.
35
Successfully networking a &kubuntu; system with Windows clients involves
36
providing and integrating services common to Windows environments. These
37
services support sharing data and information about the computers and users
38
on the network, and may be classified into three major categories:
42
<emphasis role="bold">File and Printer Sharing Services</emphasis>. Using the Server Message Block (SMB)
43
protocol to facilitate the sharing of files, folders, volumes, and the sharing of printers throughout the network.
44
<emphasis role="bold">File and Printer Sharing Services</emphasis>. The
45
Server Message Block (<acronym>SMB</acronym>) protocol is used to facilitate
46
sharing files, folders, volumes, and printers throughout the network.
48
<emphasis role="bold">Directory Services</emphasis>. Sharing vital information about the computers and users of
49
the network with such technologies as the Lightweight Directory Access Protocol (LDAP) and Microsoft
51
<emphasis role="bold">Directory Services</emphasis>. Vital information is shared
52
about the computers and users of the network with such technologies as the
53
Lightweight Directory Access Protocol (<acronym>LDAP</acronym>) and Microsoft
50
54
<trademark class='registered'>Active Directory</trademark>.
55
<emphasis role="bold">Authentication and Access</emphasis>. Establishing the identity of a computer or user of
56
the network and determining the information the computer or user is authorized to access using such principles
57
and technologies as file permissions, group policies, and the Kerberos authentication service.
59
<emphasis role="bold">Authentication and Access</emphasis>. It is
60
necessary to be able to establish the identity of a computer or user to
61
determine the information the computer or user is authorized to access.
62
Authentication and access use principles and technologies such as file
63
permissions, group policies, and the Kerberos authentication service.
63
Fortunately, your Kubuntu system may provide all such facilities to Windows clients and share network resources
64
among them. One of the principal pieces of software your Kubuntu system includes for Windows networking is the Samba
65
suite of SMB server applications and tools.
69
A &kubuntu; system can provide all such capabilities for Windows clients and
70
enable sharing network resources with them. One of the principal pieces of
71
software included in a &kubuntu; system for Windows networking is the Samba
72
suite of <acronym>SMB</acronym> server applications and tools.
69
This section of the &kubuntu; &sg-title; will introduce some of the common Samba use cases, and how to
70
install and configure the necessary packages. Additional detailed documentation and information on Samba can be found
76
This section of the &kubuntu; &sg-title; will introduce some of the ways Samba
77
is commonly used, and how to install and configure the necessary packages.
78
Additional detailed documentation and information on Samba can be found
71
79
on the <ulink url="http://www.samba.org">Samba website</ulink>.
75
<sect1 id="samba-fileserver" status="draft">
83
<sect1 id="samba-fileserver">
76
84
<title>Samba File Server</title>
79
One of the most common ways to network Kubuntu and Windows computers is to configure Samba as a File Server. This section
80
covers setting up a <application>Samba</application> server to share files with Windows clients.
87
One of the most common ways to network &kubuntu; and Windows computers is to
88
configure Samba as a File Server. This section covers setting up a
89
<application>Samba</application> server to share files with Windows clients.
84
The server will be configured to share files with any client on the network without prompting for a password. If
85
your environment requires stricter Access Controls see <xref linkend="samba-fileprint-security"/>
93
The server will be configured to share files with any client on the network
94
without prompting for a password. If the environment requires stricter Access
95
Controls, see <xref linkend="samba-fileprint-security"/>
88
<sect2 id="samba-fileserver-installation" status="draft">
98
<sect2 id="samba-fileserver-installation">
89
99
<title>Installation</title>
163
178
<emphasis>path:</emphasis> the path to the directory to share.
166
This example uses <filename>/srv/samba/sharename</filename> because, according to the
167
<emphasis>Filesystem Hierarchy Standard (FHS)</emphasis>,
168
<ulink url="http://www.pathname.com/fhs/pub/fhs-2.3.html#SRVDATAFORSERVICESPROVIDEDBYSYSTEM">/srv</ulink>
169
is where site-specific data should be served. Technically Samba shares can be placed anywhere on the filesystem
170
as long as the permissions are correct, but adhering to standards is recommended.
175
<emphasis>browsable:</emphasis> enables Windows clients to browse the shared directory using
176
<application>Windows Explorer</application>.
181
<emphasis>guest ok:</emphasis> allows clients to connect to the share without supplying a password.
181
This example uses <filename>/srv/samba/sharename</filename> because, according
182
to the <emphasis>Filesystem Hierarchy Standard (FHS)</emphasis>,
183
<ulink url="http://www.pathname.com/fhs/pub/fhs-2.3.
184
html#SRVDATAFORSERVICESPROVIDEDBYSYSTEM">/srv</ulink>
185
is where site-specific data should be served. Technically Samba shares can be
186
placed anywhere on the filesystem as long as the permissions are correct, but
187
adhering to standards is recommended.
192
<emphasis>browsable:</emphasis> enables Windows clients to browse the shared
193
directory using <application>Windows Explorer</application>.
198
<emphasis>guest ok:</emphasis> allows clients to connect to the share without
199
supplying a password.
232
Once again, the above configuration gives all access to any client on the local network. For a more secure
233
configuration see <xref linkend="samba-fileprint-security"/>.
251
The above configuration gives all access to any client on the local network. For
252
a more secure configuration, see <xref linkend="samba-fileprint-security"/>.
238
From a Windows client you should now be able to browse to the Kubuntu file server and see the shared directory. To
239
check that everything is working try creating a directory from Windows.
257
From a Windows client, it should now be possible to browse to the &kubuntu; file
258
server and see the shared directory. To check that everything is working, try
259
creating a directory from Windows.
243
To create additional shares simply create new <emphasis>[dir]</emphasis> sections in
244
<filename>/etc/samba/smb.conf</filename>, and restart <emphasis>Samba</emphasis>. Just make sure that the directory
245
you want to share actually exists and the permissions are correct.
263
To create additional shares, simply create new <emphasis>[dir]</emphasis>
264
sections in <filename>/etc/samba/smb.conf</filename>, and restart
265
<emphasis>Samba</emphasis>. Make sure that the directory to be shared actually
266
exists and that the permissions are correct.
248
<sect2 id="samba-fileserver-resources" status="draft">
269
<sect2 id="samba-fileserver-resources">
249
270
<title>Resources</title>
275
<sect1 id="samba-fileprint-security" status="draft">
296
<sect1 id="samba-fileprint-security">
276
297
<title>Securing a Samba File and Print Server</title>
278
<sect2 id="samba-security-mode" status="draft">
299
<sect2 id="samba-security-mode">
279
300
<title>Samba Security Modes</title>
282
There are two security levels available to the Common Internet Filesystem (CIFS) network protocol
283
<emphasis>user-level</emphasis> and <emphasis>share-level</emphasis>. Samba's <emphasis>security mode</emphasis>
284
implementation allows more flexibility, providing four ways of implementing user-level security and one way to
285
implement share-level:
303
There are two security levels available to the Common Internet Filesystem (CIFS)
304
network protocol <emphasis>user-level</emphasis> and
305
<emphasis>share-level</emphasis>. Samba's <emphasis>security mode</emphasis>
306
implementation allows more flexibility, providing four ways of implementing
307
user-level security and one way to implement share-level:
291
<emphasis>security = user:</emphasis> requires clients to supply a username and password to connect to shares.
292
Samba user accounts are separate from system accounts, but the <application>libpam-smbpass</application>
293
package will sync system users and passwords with the Samba user database.
313
<emphasis>security = user:</emphasis> requires clients to supply a username and
314
password to connect to shares. Samba user accounts are separate from system
315
accounts, but the <application>libpam-smbpass</application> package will sync
316
system users and passwords with the Samba user database.
298
<emphasis>security = domain:</emphasis> this mode allows the Samba server to appear to Windows clients as a Primary
299
Domain Controller (PDC), Backup Domain Controller (BDC), or a Domain Member Server (DMS). See
321
<emphasis>security = domain:</emphasis> this mode allows the Samba server to
322
appear to Windows clients as a Primary Domain Controller (PDC), Backup Domain
323
Controller (BDC), or a Domain Member Server (DMS). See
300
324
<xref linkend="samba-dc"/> for further information.
305
<emphasis>security = ADS:</emphasis> allows the Samba server to join an Active Directory domain as a native
306
member. See <xref linkend="samba-ad-integration"/> for details.
311
<emphasis>security = server:</emphasis> this mode is left over from before Samba could become a member server, and
312
due to some security issues should not be used. See the
313
<ulink url="http://samba.org/samba/docs/man/Samba-HOWTO-Collection/ServerType.html#id349531">Server Security</ulink>
314
section of the Samba guide for more details.
319
<emphasis>security = share:</emphasis> allows clients to connect to shares without supplying a username and
329
<emphasis>security = ADS:</emphasis> allows the Samba server to join an Active
330
Directory domain as a native member. See <xref linkend="samba-ad-integration"/>
336
<emphasis>security = server:</emphasis> this mode is left over from before Samba
337
could become a member server, and, due to some security issues, should not be
339
url="http://samba.org/samba/docs/man/Samba-HOWTO-Collection/ServerType.
340
html#id349531">Server Security</ulink> section of the Samba guide for more
346
<emphasis>security = share:</emphasis> allows clients to connect to shares
347
without supplying a username and password.
326
The security mode you choose will depend on your environment and what you need the Samba server to accomplish.
353
The preferred security mode depends on the environment and what the Samba
354
server needs to accomplish.
330
<sect2 id="samba-user-security" status="draft">
358
<sect2 id="samba-user-security">
331
359
<title>Security = User</title>
334
This section will reconfigure the Samba file and print server, from <xref linkend="samba-fileserver"/> and the
335
<ulink type="help" url="help:/kubuntu/printing/"> Print Server</ulink>, to require authentication.
362
This section will reconfigure the Samba file and print server, from <xref
363
linkend="samba-fileserver"/> and the
364
<ulink type="help" url="help:/kubuntu/printing/"> Print Server</ulink>, to
365
require authentication.
339
First, install the <application>libpam-smbpass</application> package which will sync the system users to the Samba
369
First, install the <application>libpam-smbpass</application> package which will
370
sync the system users to the Samba user database:
371
Now when connecting to the shared directories or printers you should be prompted for a username and password.
402
Now when connecting to the shared directories or printers, there will be a
403
prompt for a username and password.
376
If you choose to map a network drive to the share you can check the <quote>Reconnect at Logon</quote> check
377
box, which will require you to only enter the username and password once, at least until the password changes.
408
To map a network drive to the share, <quote>Reconnect at Logon</quote> should be
409
checked, which will require the username and password to be entered just once,
410
at least until the password changes.
382
<sect2 id="samba-share-security" status="draft">
415
<sect2 id="samba-share-security">
383
416
<title>Share Security</title>
386
There are several options available to increase the security for each individual shared directory. Using the
387
<emphasis>[share]</emphasis> example, this section will cover some common options.
419
There are several options available to increase the security for each individual
420
shared directory. Using the <emphasis>[share]</emphasis> example, this section
421
will cover some common options.
390
<sect3 id="windows-networking-groups" status="draft">
424
<sect3 id="windows-networking-groups">
391
425
<title>Groups</title>
394
Groups define a collection of computers or users which have a common level of access to particular network
395
resources and offer a level of granularity in controlling access to such resources. For example, if a group
396
<emphasis role="italic">qa</emphasis> is defined and contains the users <emphasis role="italic">freda</emphasis>,
397
<emphasis role="italic">danika</emphasis>, and <emphasis role="italic">rob</emphasis> and a second group
398
<emphasis role="italic">support</emphasis> is defined and consists of users <emphasis role="italic">danika</emphasis>,
399
<emphasis role="italic">jeremy</emphasis>, and <emphasis role="italic">vincent</emphasis> then certain network
400
resources configured to allow access by the <emphasis role="italic">qa</emphasis> group will subsequently enable
401
access by freda, danika, and rob, but not jeremy or vincent. Since the user <emphasis role="italic">danika</emphasis>
402
belongs to both the <emphasis role="italic">qa</emphasis> and <emphasis role="italic">support</emphasis> groups, she
403
will be able to access resources configured for access by both groups, whereas all other users will have only access
404
to resources explicitly allowing the group they are part of.
428
Groups define a collection of computers or users which have a common level of
429
access to particular network resources and offer a level of granularity in
430
controlling access to such resources. For example, if a group
431
<emphasis role="italic">qa</emphasis> is defined and contains the users
432
<emphasis role="italic">freda</emphasis>, <emphasis
433
role="italic">danika</emphasis>, and <emphasis role="italic">rob</emphasis> and
434
a second group <emphasis role="italic">support</emphasis> is defined and
435
consists of users <emphasis role="italic">danika</emphasis>,
436
<emphasis role="italic">jeremy</emphasis>, and <emphasis
437
role="italic">vincent</emphasis>, then certain network resources configured to
438
allow access by the <emphasis role="italic">qa</emphasis> group will
439
subsequently enable access by freda, danika, and rob, but not jeremy or
440
vincent. Since the user <emphasis role="italic">danika</emphasis>
441
belongs to both the <emphasis role="italic">qa</emphasis> and <emphasis
442
role="italic">support</emphasis> groups, she will be able to access resources
443
configured for access by both groups, whereas all other users will have only
444
access to resources explicitly allowing the group they are part of.
409
By default Samba looks for the local system groups defined in <filename>/etc/group</filename> to determine which users
410
belong to which groups. For more information on adding and removing users from groups see
449
By default Samba looks for the local system groups defined in
450
<filename>/etc/group</filename> to determine which users belong to which
451
groups. For more information on adding and removing users from groups see
411
452
<ulink type="help" url="help:/kubuntu/basics/"> Basics</ulink>.
415
When defining groups in the Samba configuration file, <filename>/etc/samba/smb.conf</filename>, the recognized syntax
416
is to preface the group name with an "@" symbol. For example, if you wished to define a group named
417
<emphasis role="italic">sysadmin</emphasis> in a certain section of the <filename>/etc/samba/smb.conf</filename>,
418
you would do so by entering the group name as <emphasis role="bold">@sysadmin</emphasis>.
456
When defining groups in the Samba configuration file,
457
<filename>/etc/samba/smb.conf</filename>, the recognized syntax
458
is to preface the group name with an "@" symbol. For example, to define a group
459
named <emphasis role="italic">sysadmin</emphasis> in a certain section of the
460
<filename>/etc/samba/smb.conf</filename>, the group name would be entered as
461
<emphasis role="bold">@sysadmin</emphasis>.
422
<sect3 id="samba-file-permissions" status="draft">
465
<sect3 id="samba-file-permissions">
423
466
<title>File Permissions</title>
426
File Permissions define the explicit rights a computer or user has to a particular directory, file, or set of
427
files. Such permissions may be defined by editing the <filename>/etc/samba/smb.conf</filename> file and specifying
428
the explicit permissions of a defined file share.
469
File Permissions define the explicit rights a computer or user has to a
470
particular directory, file, or set of files. Such permissions may be defined by
471
editing the <filename>/etc/samba/smb.conf</filename> file and specifying the
472
explicit permissions of a defined file share.
432
For example, if you have defined a Samba share called <emphasis>share</emphasis> and wish to give
433
<emphasis role="italic">read-only</emphasis> permissions to the group of users known as
434
<emphasis role="italic">qa</emphasis>, but wanted to allow writing to the share by the group called
435
<emphasis role="italic">sysadmin</emphasis> and the user named <emphasis role="italic">vincent</emphasis>,
436
then you could edit the <filename>/etc/samba/smb.conf</filename> file, and add the following entries under
437
the <emphasis>[share]</emphasis> entry:
476
For example, for a defined Samba share called <emphasis>share</emphasis> and
477
the need to give <emphasis role="italic">read-only</emphasis> permissions to the
478
group of users known as <emphasis role="italic">qa</emphasis>, while allowing
479
write permissions to the share by the group called
480
<emphasis role="italic">sysadmin</emphasis> and the user named <emphasis
481
role="italic">vincent</emphasis>, then the
482
<filename>/etc/samba/smb.conf</filename> file could be edited to add the
483
following entries under the <emphasis>[share]</emphasis> entry:
443
489
</programlisting>
446
Another possible Samba permission is to declare <emphasis>administrative</emphasis> permissions to a
447
particular shared resource. Users having administrative permissions may read, write, or modify any information
448
contained in the resource the user has been given explicit administrative permissions to.
492
Another possible Samba permission is to declare
493
<emphasis>administrative</emphasis> permissions to a particular shared resource.
494
Users having administrative permissions may read, write, or modify any
495
information contained in the resource where the user has been given explicit
496
administrative permissions.
452
For example, if you wanted to give the user <emphasis role="italic">melissa</emphasis> administrative permissions to
453
the <emphasis role="italic">share</emphasis> example, you would edit the
454
<filename>/etc/samba/smb.conf</filename> file, and add the following line under the
455
<emphasis>[share]</emphasis> entry:
500
For example, to give the user <emphasis role="italic">melissa</emphasis>
501
administrative permissions to the <emphasis role="italic">share</emphasis>
502
example, the <filename>/etc/samba/smb.conf</filename> file would be edited to
503
add the following line under the <emphasis>[share]</emphasis> entry:
472
For the <emphasis>read list</emphasis> and <emphasis>write list</emphasis> to work the Samba security mode
473
must <emphasis>not</emphasis> be set to <emphasis role="italic">security = share</emphasis>
520
For the <emphasis>read list</emphasis> and <emphasis>write list</emphasis> to
521
work the Samba security mode must <emphasis>not</emphasis> be set to <emphasis
522
role="italic">security = share</emphasis>
478
Now that Samba has been configured to limit which groups have access to the shared directory, the filesystem permissions
527
Now that Samba has been configured to limit which groups have access to the
528
shared directory, the filesystem permissions need to be updated.
483
Traditional Linux file permissions do not map well to Windows NT Access Control Lists (ACLs). Fortunately POSIX ACLs
484
are available on Kubuntu servers providing more fine grained control. For example, to enable ACLs on
485
<filename>/srv</filename> an EXT3 filesystem, edit <filename>/etc/fstab</filename> adding the
486
<emphasis>acl</emphasis> option:
532
Traditional Linux file permissions do not map well to Windows NT Access Control
533
Lists (ACLs). Fortunately POSIX ACLs are available on &kubuntu; servers
534
providing more fine grained control. For example, to enable ACLs on
535
<filename>/srv</filename> an EXT3 filesystem, edit
536
<filename>/etc/fstab</filename> adding the <emphasis>acl</emphasis> option:
490
UUID=66bcdd2e-8861-4fb0-b7e4-e61c569fe17d /srv ext3 noatime,relatime,acl 0 1
540
UUID=66bcdd2e-8861-4fb0-b7e4-e61c569fe17d /srv ext3 noatime,relatime,acl 0
491
542
</programlisting>
524
The <application>setfacl</application> command above gives <emphasis>execute</emphasis> permissions to all files in
525
the <filename>/srv/samba/share</filename> directory, which you may or may not want.
576
The <application>setfacl</application> command above gives
577
<emphasis>execute</emphasis> permissions to all files in the
578
<filename>/srv/samba/share</filename> directory, which may or may not be
530
Now from a Windows client you should notice the new file permissions are implemented. See the
531
<application>acl</application> and <application>setfacl</application> man pages for more information on POSIX ACLs.
584
A Windows client will show that the new file permissions are implemented. See
585
the <application>acl</application> and <application>setfacl</application> man
586
pages for more information on POSIX ACLs.
536
<sect2 id="samba-apparmor" status="draft">
591
<sect2 id="samba-apparmor">
537
592
<title>Samba AppArmor Profile</title>
540
Kubuntu comes with the <application>AppArmor</application> security module, which provides mandatory access controls.
541
The default AppArmor profile for Samba will need to be adapted to your configuration. For more details on using
542
AppArmor please refer to the<ulink url="https://help.ubuntu.com/community/AppArmor"> wiki</ulink>
595
&kubuntu; comes with the <application>AppArmor</application> security module,
596
which provides mandatory access controls. The default AppArmor profile for Samba
597
will need to be adapted to the proper configuration. For more details on using
598
AppArmor, please refer to the<ulink
599
url="https://help.ubuntu.com/community/AppArmor"> wiki</ulink>
546
There are default AppArmor profiles for <filename>/usr/sbin/smbd</filename> and <filename>/usr/sbin/nmbd</filename>, the
547
Samba daemon binaries, as part of the <application>apparmor-profiles</application> packages. To install the package,
548
from a terminal prompt enter:
603
There are default AppArmor profiles for <filename>/usr/sbin/smbd</filename> and
604
<filename>/usr/sbin/nmbd</filename>, the Samba daemon binaries, as part of the
605
<application>apparmor-profiles</application> packages. To install the package,
606
from a terminal prompt, enter:
634
<sect1 id="samba-dc" status="draft">
696
<sect1 id="samba-dc">
635
697
<title>Samba as a Domain Controller</title>
638
Although it cannot act as an Active Directory Primary Domain Controller (PDC), a Samba server can be configured to
639
appear as a Windows NT4-style domain controller. A major advantage of this configuration is the ability to centralize
640
user and machine credentials. Samba can also use multiple backends to store the user information.
700
Although it cannot act as an Active Directory Primary Domain Controller (PDC), a
701
Samba server can be configured to appear as a Windows NT4-style domain
702
controller. A major advantage of this configuration is the ability to
703
centralize user and machine credentials. Samba can also use multiple backends
704
to store the user information.
643
<sect2 id="samba-pdc-smbpasswd" status="draft">
707
<sect2 id="samba-pdc-smbpasswd">
644
708
<title>Primary Domain Controller</title>
647
This section covers configuring Samba as a Primary Domain Controller (PDC) using the default smbpasswd backend.
711
This section covers configuring Samba as a Primary Domain Controller (PDC) using
712
the default smbpasswd backend.
654
First, install Samba, and <application>libpam-smbpass</application> to sync the user accounts,
655
by entering the following in a terminal prompt:
719
Install Samba and <application>libpam-smbpass</application> to sync the user
720
accounts, by entering the following in a terminal prompt:
717
<emphasis>logon script:</emphasis> determines the script to be run locally once a user has logged in.
718
The script needs to be placed in the <emphasis>[netlogon]</emphasis> share.
786
<emphasis>logon script:</emphasis> determines the script to be run locally once
787
a user has logged in. The script needs to be placed in the
788
<emphasis>[netlogon]</emphasis> share.
723
<emphasis>add machine script:</emphasis> a script that will automatically create the
724
<emphasis>Machine Trust Account</emphasis> needed for a workstation to join the domain.
793
<emphasis>add machine script:</emphasis> a script that will automatically create
794
the <emphasis>Machine Trust Account</emphasis> needed for a workstation to join
727
In this example the <emphasis>machines</emphasis> group will need to be created using the
728
<application>addgroup</application> utility see <ulink type="help" url="help:/kubuntu/basics/"> Basics</ulink> for details.
798
In this example, the <emphasis>machines</emphasis> group will need to be created
799
using the <application>addgroup</application> utility. See <ulink type="help"
800
url="help:/kubuntu/basics/"> Basics</ulink> for details.
735
If you wish to not use <emphasis>Roaming Profiles</emphasis> leave the <emphasis>logon home</emphasis>
736
and <emphasis>logon path</emphasis> options commented.
807
If <emphasis>Roaming Profiles</emphasis> will not be used, leave the
808
<emphasis>logon home</emphasis> and <emphasis>logon path</emphasis> options
798
You can enter any normal Windows logon script commands in <filename>logon.cmd</filename> to customize the
799
client's environment.
873
Any normal Windows logon script commands can be entered in
874
<filename>logon.cmd</filename> to customize the client's environment.
806
With <emphasis>root</emphasis> being disabled by default, in order to join a workstation to the domain, a system
807
group needs to be mapped to the Windows <emphasis>Domain Admins</emphasis> group.
808
Using the <application>net</application> utility, from a terminal enter:
881
With <emphasis>root</emphasis> being disabled by default, in order to join a
882
workstation to the domain, a system group must be mapped to the Windows
883
<emphasis>Domain Admins</emphasis> group. Using the
884
<application>net</application> utility, from a terminal enter:
812
<command>sudo net groupmap add ntgroup="Domain Admins" unixgroup=sysadmin rid=512 type=d</command>
888
<command>sudo net groupmap add ntgroup="Domain Admins" unixgroup=sysadmin
889
rid=512 type=d</command>
817
Change <emphasis role="italic">sysadmin</emphasis> to whichever group you prefer. Also, the user
818
used to join the domain needs to be a member of the <emphasis>sysadmin</emphasis> group, as well
819
as a member of the system <emphasis>admin</emphasis> group. The <emphasis>admin</emphasis> group allows
894
Change <emphasis role="italic">sysadmin</emphasis> to the preferred group. The
895
user used to join the domain needs to be a member of the
896
<emphasis>sysadmin</emphasis> group, as well as a member of the system
897
<emphasis>admin</emphasis> group. The <emphasis>admin</emphasis> group allows
820
898
<application>sudo</application> use.
839
You should now be able to join Windows clients to the Domain in the same manner as joining them to an
840
NT4 domain running on a Windows server.
917
It is now possible to join Windows clients to the Domain in the same manner as
918
joining them to an NT4 domain running on a Windows server.
847
<sect2 id="samba-bdc-smbpasswd" status="draft">
925
<sect2 id="samba-bdc-smbpasswd">
848
926
<title>Backup Domain Controller</title>
851
With a Primary Domain Controller (PDC) on the network it is best to have a Backup Domain Controller (BDC) as well.
852
This will allow clients to authenticate in case the PDC becomes unavailable.
856
When configuring Samba as a BDC you need a way to sync account information with the PDC. There are multiple ways of
857
accomplishing this <application>scp</application>, <application>rsync</application>, or by using <application>LDAP</application> as
858
the <emphasis>passdb backend</emphasis>.
862
Using LDAP is the most robust way to sync account information, because both domain controllers can use the same information in real time.
863
However, setting up a LDAP server may be overly complicated for a small number of user and computer accounts.
864
See Samba<ulink url="http://wiki.samba.org/index.php/Samba_&_LDAP"> LDAP</ulink> page for details.
929
With a Primary Domain Controller (PDC) on the network, it is best to have a
930
Backup Domain Controller (BDC) as well. This will allow clients to authenticate
931
in case the PDC becomes unavailable.
935
When configuring Samba as a BDC, there must be a way to sync account information
936
with the PDC. There are multiple ways of accomplishing this, such as
937
<application>scp</application>, <application>rsync</application>, or by using
938
<application>LDAP</application> as the <emphasis>passdb backend</emphasis>.
942
Using LDAP is the most robust way to sync account information, because both
943
domain controllers can use the same information in real time. However, setting
944
up a LDAP server may be overly complicated for a small number of user and
945
computer accounts. See Samba<ulink
946
url="http://wiki.samba.org/index.php/Samba_&_LDAP"> LDAP</ulink> page for
1058
You should now be able to access any <application>Samba</application> shares from a Windows client. However, be sure to give
1059
the appropriate AD users or groups access to the share directory. See <xref linkend="samba-fileprint-security"/> for
1152
It should now be possible to access any <application>Samba</application> shares
1153
from a Windows client. However, be sure to give the appropriate AD users or
1154
groups access to the share directory. See <xref
1155
linkend="samba-fileprint-security"/> for
1065
<sect2 id="ad-integration-windows-share" status="draft">
1161
<sect2 id="ad-integration-windows-share">
1066
1162
<title>Accessing a Windows Share</title>
1069
Now that the Samba server is part of the Active Directory domain you can access any Windows server shares:
1165
Now that the Samba server is part of the Active Directory domain, any Windows
1166
server shares can be accessed:
1076
To mount a Windows file share enter the following in a terminal prompt:
1173
To mount a Windows file share, enter the following in a terminal prompt:
1079
1176
<command>mount.cifs //fs01.example.com/share mount_point</command>
1083
It is also possible to access shares on computers not part of an AD domain, but a username and password
1084
will need to be provided.
1180
It is also possible to access shares on computers not part of an AD domain, but
1181
a username and password must be provided.
1091
To mount the share during boot place an entry in <filename>/etc/fstab</filename>, for example:
1188
To mount the share during boot, place an entry in
1189
<filename>/etc/fstab</filename>, for example:
1094
1192
<programlisting>
1158
1259
Replace all instances of <emphasis>fs01.example.com/share</emphasis>, <emphasis>//192.168.0.5/share</emphasis>,
1159
<emphasis>username=steve,password=secret</emphasis>, and <emphasis>file.txt</emphasis> with your server's IP, hostname,
1160
share name, file name, and an actual username and password with rights to the share.
1260
<emphasis>username=steve,password=secret</emphasis>, and
1261
<emphasis>file.txt</emphasis> with the proper server IP, hostname,
1262
share name, file name, and an actual username and password with rights to the
1165
<sect2 id="ad-integration-resources" status="draft">
1268
<sect2 id="ad-integration-resources">
1166
1269
<title>Resources</title>
1169
For more <application>smbclient</application> options see the man page: <command>man smbclient</command>, also available
1272
For more <application>smbclient</application> options see the man page:
1273
<command>man smbclient</command>, also available
1170
1274
<ulink url="http://manpages.ubuntu.com/manpages/jaunty/en/man1/smbclient.1.html">online</ulink>.
1174
1278
The <application>mount.cifs</application>
1175
<ulink url="http://manpages.ubuntu.com/manpages/jaunty/en/man8/mount.cifs.8.html">man page</ulink> is also useful for
1176
more detailed information.
1280
url="http://manpages.ubuntu.com/manpages/jaunty/en/man8/mount.cifs.8.html">man
1281
page</ulink> is also useful for more detailed information.
1182
<sect1 id="likewise-open" status="draft">
1287
<sect1 id="likewise-open">
1183
1288
<title>Likewise Open</title>
1186
<application>Likewise Open</application> simplifies the necessary configuration needed to authenticate a Linux machine to an
1187
Active Directory domain. Based on <application>winbind</application>, the <application>likewise-open</application> package
1188
takes the pain out of integrating Kubuntu authentication into an existing Windows network.
1291
<application>Likewise Open</application> simplifies the necessary configuration
1292
needed to authenticate a Linux machine to an Active Directory domain. Based on
1293
<application>winbind</application>, the <application>likewise-open</application>
1294
package takes the pain out of integrating &kubuntu; authentication into an
1295
existing Windows network.
1191
<sect2 id="likewise-open-install" status="draft">
1298
<sect2 id="likewise-open-install">
1192
1299
<title>Installation</title>
1195
There are two ways to use Likewise Open, <application>likewise-open</application> the command line utility and
1196
<application>likewise-open-gui</application>. This section focuses on the command line utility.
1302
There are two ways to use Likewise Open,
1303
<application>likewise-open</application> the command line utility and
1304
<application>likewise-open-gui</application>. This section focuses on the
1305
command line utility.