fix problem windows xp not create User Profile on AD server because SAMBA V.4 up not support smbv1 them support smbv2 up
add this to /etc/samba/smb.conf
---------------
[global]
.
.
ntlm auth = ntlmv1-permitted
---------------
systemctl restart samba-ad-dc
systemctl status samba-ad-dc
Add AD user with Profile
samba-tool user add user01 --profile-path=\\\IP\Profiles\\user01
Or change by Active Directory on windows
GPO command
Execute command
gpupdate /force
display execute
gpresult /r
How to setup additional failover replication AD with debian 10.03
1. setup IP and host name
vim /etc/network/interfaces
iface ens192 inet static
address 172.16.x.78/24
gateway 172.16.x.1
# dns-* options are implemented by the resolvconf package, if installed
dns-nameservers 172.16.x.77 172.16.x.67 172.16.x.68
dns-search ad.domain.com
vim /etc/hosts
127.0.0.1 localhost
172.16.x.77 dc1.ad.domain.com dc1
172.16.x.78 dc2.ad.domai.com dc2
vim /etc/resolv.conf
search ad.domain.com
nameserver 172.16.x.77
nameserver 172.16.x.67
nameserver 172.16.x.68
Reboot system
ping dc1.ad.domain.com
ping dc2.ad.domain.com
2. install package
apt install samba attr dnsutils net-tools smbclient krb5-user krb5-config winbind libpam-winbind libnss-winbind libpam-krb5
Disable lecacy samba daemons
systemctl stop smbd nmbd winbind
systemctl disable smbd nmbd winbind
Move or delete to default smb.conf file
mv /etc/samba/smb.conf /etc/samba/smb.conf.org
Configure kerberos to use the existing Active Directory. Copy the krb5.conf from Primary domain
scp root@ad.domain.com:/etc/krb5.conf /etc
And get a kerberos ticket for the Active Directory.
kinit administrator
Warning: Your password will expire in 40 days on Mon 01 Feb 2021 02:29:25 PM +07
klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: administrator@AD.DOMAIN.COM
2. run samba-tool command to join the realm using an account with administrative privileges on your domain
#samba-tool domain join ad.domain.com DC -U"administrator"
Finding a writeable DC for domain 'ad.domain.com'
Found DC dc1.ad.domain.com
Password for [WORKGROUP\adminstrator]:
3. Adding configure samba file
vim /etc/samba/smb.conf
dns forwarder = 172.16.x.67 (IP DNS)
idmap_ldb:use rfc2307 = yes
.
.
template shell = /bin/bash
winbind use default domain = true
winbind offline logon = false
winbind nss info = rfc2307
winbind enum users = yes
winbind enum groups = yes
4. Enable samba service
systemctl restart samba-ad-dc.service
systemctl status samba-ad-dc.service
systemctl enable samba-ad-dc.service
5. Check replication. Warning: No NC replicated for Connection! can be ignored
#samba-tool drs showrepl
Warning: No NC replicated for Connection!
6. create link krb5.conf
mv /etc/krb5.conf /etc/krb5.conf.initial
ln -s /var/lib/samba/private/krb5.conf /etc/
Test kerberos
# kinit administrator
Password for administrator@AD.DOMAIN.COM:
Warning: Your password will expire in 40 days on Mon 01 Feb 2021 02:29:25 PM +07
# klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: administrator@AD.DOMAIN.COM
7. finish test create user AD dc2.ad.domain.com
root@dc2:~# samba-tool user add 5712016
8. Check user at dc1.ad.domain.com
root@dc1:~# samba-tool user list
Unknown parameter encountered: "profile acls"
Ignoring unknown parameter "profile acls"
uservista
5712016
9. fix join domain debian to debian fail
root@proxy01:~# realm join -U administrator@dc1.ad.domain.com AD.DOMAIN.COM --verbose
* Resolving: _ldap._tcp.ad.domain.com
* Resolving: ad.domain.com
* Performing LDAP DSE lookup on: 172.16.9.77
* Successfully discovered: ad.domain.com
Password for administrator@ad.domain.com:
* Unconditionally checking packages
* Resolving required packages
! PackageKit not available: The name org.freedesktop.PackageKit was not provided by any .service files
! Necessary packages are not installed: sssd-tools sssd libnss-sss libpam-sss adcli
realm: Couldn't join realm: Necessary packages are not installed: sssd-tools sssd libnss-sss libpam-sss adcli
msktutil --auto-update --verbose -k /etc/squid/proxy.keytab --computer-name proxy01
fix with install package packagekit
apt install packagekit
Ref.
BASIC USER MANAGEMENT
# sudo su
Display domain users list
root@smb:~# samba-tool user list
Add a domain user
root@smb:~# samba-tool user create ubuntu
Delete a domain user
root@smb:~# samba-tool user delete ubuntu
Reset password for a user
root@smb:~# samba-tool user setpassword ubuntu
Set expiry for a user
root@smb:~# samba-tool user setexpiry ubuntu --days=7
Disable/Enable user account
root@smb:~# samba-tool user disable ubuntu
Display domain groups list
root@smb:~# samba-tool group list
Display members in a group
root@smb:~# samba-tool group listmembers "Domain Users"
Add a domain group
root@smb:~# samba-tool group add ServerWorld
Delete a domain group
root@smb:~# samba-tool group delete ServerWorld
Add a member from a domain group.
root@smb:~# samba-tool group addmembers ServerWorld ubuntu
Remove members to group ServerWorld
root@smb:~# samba-tool group removemembers ServerWorld ubuntu
Change Domain User Password
# sudo smbpasswd -a username
[sudo] password for admin:
New SMB password:
Retype new SMB password:
Ref:
1.
Samba-4-Active-Directory-Domain-Controller-on-Ubuntu-18-04-Server
2.
install-samba-4-7-6-ad-dc-ubuntu-18-04-bind-9-11-dns-backend-ad-rfc2307
3.
Profile
4.
Install AD Controller to windows
5.
Restrict website
6.
manage-samba4-active-directory-linux-command-line/