bonjour
je viens d installer samba sur le serveur je n ai aucun problème j’arrive à bien me connecte avec les utilisateur “test”.
après j’installe donc OpenLdap
aptitude install slapd db4.2-util ldap-utils
je configure le fichier slapd.conf mais des que je lance la commande net getlocalsid il me retourne
failed to bind to server ldap://127.0.0.1/ with dn="cn=operateur,dc=XXXXX,dc=smb" Error: Invalid credentials
(unknown)
voici le smb.conf
[code]#nom du domaine
workgroup = empruntis
mettre le meme nom que le nom de votre machine
netbios name = ldapsrv
#nom qui vas appartre dans le reseau
server string = Samba-LDAP Server
#controleur de domaine principale yes or no
domain master = Yes
local master = Yes
domain logons = Yes
os level = 40
#passwd program = /usr/sbin/smbldap-passwd ?u %u
ldap passwd sync = Yes
passdb backend = ldapsam:ldap://127.0.0.1/
l administrateur de ldap
ldap admin dn = cn=operateur,dc=XXXX,dc=smb
ldap suffix = dc=XXXX,dc=smb
ldap group suffix = ou=Groups
ldap user suffix = ou=user
ldap machine suffix = ou=Machines
add user script = /usr/sbin/smbldap-useradd -m “%u”
ldap delete dn = Yes
delete user script = /usr/sbin/smbldap-userdel “%u”
add machine script = /usr/sbin/smbldap-useradd -w “%u”
add group script = /usr/sbin/smbldap-groupadd -p “%g”
#delete group script = /usr/sbin/smbldap-groupdel “%g”
add user to group script = /usr/sbin/smbldap-groupmod -m “%u” “%g”
delete user from group script = /usr/sbin/smbldap-groupmod -x “%u” “%g”
set primary group script = /usr/sbin/smbldap-usermod -g “%g” “%u”
logon path = \%L\profile%U
logon drive = P:
logon home = \%L%U
socket options = TCP_NODELAY SO_RCVBUF=8192 SO_SNDBUF=8192
case sensitive = No
default case = lower
preserve case = yes
short preserve case = Yes
#domain admin group = @admin
dns proxy = No
#wins support = Yes
definition de la classe d adresse IP
; hosts allow = 10.0.3.
; hosts deny = ALL
winbind use default domain = Yes
nt acl support = Yes
msdfs root = Yes
hide files = /desktop.ini/ntuser.ini/NTUSER.*/
FIN DE LA PARTIE GLOBALE
LES PARTAGES
[netlogon]
#path = /srv/netlogon
#writable = No
#browseable = No
#write list = operateur
[profile]
path = srv/samba/home
browseable = No
writeable = Yes
profile acls = yes
create mask = 0700
directory mask = 0700[/code]
voici le slapd.conf
[code]#######################################
Global Directives:
Features to permit
allow bind_v2
Schema and objectClass definitions
include /etc/ldap/schema/core.schema
include /etc/ldap/schema/cosine.schema
include /etc/ldap/schema/nis.schema
include /etc/ldap/schema/inetorgperson.schema
include /etc/ldap/schema/samba.schema
Where the pid file is put. The init.d script
will not stop the server if you change this.
pidfile /var/run/slapd/slapd.pid
List of arguments that were passed to the server
argsfile /var/run/slapd/slapd.args
Read slapd.conf(5) for possible values
loglevel 296
Where the dynamically loaded modules are stored
modulepath /usr/lib/ldap
moduleload back_bdb
The maximum number of entries that is returned for a search operation
sizelimit 500
The tool-threads parameter sets the actual amount of cpu’s that is used
for indexing.
tool-threads 1
##############################################
Specific Backend Directives for bdb:
Backend specific directives apply to this backend until another
‘backend’ directive occurs
backend bdb
checkpoint 512 30
###############################################
Specific Backend Directives for ‘other’:
Backend specific directives apply to this backend until another
‘backend’ directive occurs
#backend
################################################
Specific Backend Directives for ‘other’:
Backend specific directives apply to this backend until another
‘backend’ directive occurs
#backend
#################################################
Specific Directives for database #1, of type bdb:
Database specific directives apply to this databasse until another
‘database’ directive occurs
database bdb
The base of your directory in database #1
suffix “dc=smb”
rootdn “cn=operateur,dc=XXXX,dc=smb”
rootpw {SSHA}sJE+5l8gVOEofdHLbqyOdNzDuqOOp1cX
rootdn directive for specifying a superuser on the database. This is needed
for syncrepl.
rootdn “cn=admin,dc=local”
Where the database file are physically stored for database #1
directory “/var/lib/ldap”
For the Debian package we use 2MB as default but be sure to update this
value if you have plenty of RAM
dbconfig set_cachesize 0 2097152 0
Sven Hartge reported that he had to set this value incredibly high
to get slapd running at all. See http://bugs.debian.org/303057
for more information.
Number of objects that can be locked at the same time.
dbconfig set_lk_max_objects 1500
Number of locks (both requested and granted)
dbconfig set_lk_max_locks 1500
Number of lockers
dbconfig set_lk_max_lockers 1500
Indexing options for database #1
index objectClass eq
Save the time that the entry gets modified, for database #1
lastmod on
Where to store the replica logs for database #1
replogfile /var/lib/ldap/replog
The userPassword by default can be changed
by the entry owning it if they are authenticated.
Others should not be able to see it, except the
admin entry below
These access lines apply to database #1 only
access to attrs=userPassword,shadowLastChange
by dn=“cn=operateur,dc=smb” write
by anonymous auth
by self write
by * none
Ensure read access to the base for things like
supportedSASLMechanisms. Without this you may
have problems with SASL not knowing what
mechanisms are available and the like.
Note that this is covered by the ‘access to *’
ACL below too but if you change that as people
are wont to do you’ll still need this if you
want SASL (and possible other things) to work
happily.
access to dn.base="" by * read
The admin dn has full write access, everyone else
can read everything.
access to *
by dn=“cn=operateur,dc=smb” write
by * read
For Netscape Roaming support, each user gets a roaming
profile for which they have write access to
#access to dn=".*,ou=Roaming,o=morsnet"
by dn=“cn=admin,dc=local” write
by dnattr=owner write
supportedSASLMechanisms. Without this you may
have problems with SASL not knowing what
mechanisms are available and the like.
Note that this is covered by the ‘access to *’
ACL below too but if you change that as people
are wont to do you’ll still need this if you
want SASL (and possible other things) to work
happily.
access to dn.base="" by * read
The admin dn has full write access, everyone else
can read everything.
access to *
by dn=“cn=operateur,dc=smb” write
by * read
For Netscape Roaming support, each user gets a roaming
profile for which they have write access to
#access to dn=".*,ou=Roaming,o=morsnet"
by dn=“cn=admin,dc=local” write
by dnattr=owner write
###################################################
Specific Directives for database #2, of type ‘other’ (can be bdb too):
Database specific directives apply to this databasse until another
‘database’ directive occurs
#database
The base of your directory for database #2
#suffix “dc=debian,dc=org”[/code]
merci de votre aide à tous
je ne sais plus quoi faire