Musings on Linux, Opscode Chef, online gaming, and home cooking.
Ohio Linuxfest 2008 - Square Pegs in Round Holes, Linux in a Windows World
These are my presentation slides for the 2008 Ohio Linuxfest. I gave a well recieved talk on the topic of Windows, and Active Directory, Linux integration using Samba. My krb5 handles the krb5.conf and pam configurations outlined in the examples below.
## This is an example of how to setup Samba as a domain member # of CONTOSO.COM to provide file services.## The winbind method used in this example works much like a Windows# Domain Member file server in resolving usernames and groups over RPC.## idmap provides predictable UID and GID# generation based on the user's domain SID number[global]unix charset= LOCALE
workgroup= CONTOSO
realm= CONTOSO.COM
server string= Contoso File Server
security= ADS
allow trusted domains= no
log level= 1
log file= /var/log/samba/%m.log
max log size= 50
idmap backend= rid:CONTOSO=1000-1000000
idmap uid= 1000-1000000
idmap gid= 1000-1000000
winbind cache time= 3600
winbind enum groups= yes
winbind use default domain= yes
winbind normalize names= yes
admin users= @CONTOSO\domain_admins
map acl inherit= yes
disable netbios= no
/etc/httpd/conf.d/auth_kerb.conf
Example mod_auth_kerb configuration file for Apache2 authentication against Active Directory.
123456789101112131415161718192021
## This is an example of how to setup Kerberos# authentication in Apache against CONTOSO.COM and# SUBDOMAIN.CONTOSO.COM. The end result works much# like Windows Integrated Authentication.# Load the module into ApacheLoadModule auth_kerb_module modules/mod_auth_kerb.so
# Directory to protect with Kerberos authentication<Location /path/to/directory>
AuthType Kerberos
AuthName "Contoso Login" KrbMethodNegotiate Off
KrbMethodK5Passwd On
KrbSaveCredentials On
KrbVerifyKDC Off
KrbAuthRealms CONTOSO.COM SUBDOMAIN.CONTOSO.COM
Krb5KeyTab /etc/httpd/conf.d/auth_kerb.keytab
Require valid-user
</Location>
/etc/httpd/conf.d/auth_kerb.keytab
Example mod_auth_kerb keytabl for Apache2 authentication against Active Directory.
12345678
## This is an example of how to setup Kerberos# authentication in Apache against CONTOSO.COM and# SUBDOMAIN.CONTOSO.COM. The end result works much# like Windows Integrated Authentication.HTTP/webserv1.contoso.com@CONTOSO.COM
HTTP/webserv1.contoso.com@SUBDOMAIN.CONTOSO.COM
/etc/pam.d/system-auth
Example PAM configuration file for Kerberos 5 authentication against Active Directory Domain.