4.2.2 Authenticating with a Windows domain
In this section we look at all technical issues that need to be considered when
planning for authentication of Linux clients within an existing Windows domain.
Reasons for authenticating a Linux client in an existing Windows domain include:
Network services that require domain authentication need to be accessed
from the Linux client (network file servers, printers, etc.)
Users will have only a single user name/password combination (network
services single sign on).
Administrators will only need to administer a single user collection.
After deciding to authenticate with a domain, the following technically driven
decisions have to be made:
Are domain users created on all clients, or can we use winbind to enforce an
unified login environment? (Using winbind you can force a Linux client login
event to authenticate with a Windows domain. The end result of this is that
the Linux client system becomes a full member of the Windows domain.)
Using winbind means carefully choosing some parameters, specifically the
winbind separator.
Do we authenticate with an NT4 domain or natively with an Active Directory
domain? In the latter case we also need Kerberos.
Choosing to create users locally on the client means extra administrative
overhead. In this case when a user is added to the domain, the user ID has to
also be added to any of the Linux clients that the user will be using to connect
with that domain. Even though this process could be automated, it is really not
necessary when using winbind.
Using winbind will lead to a choice for what is used as the winbind separator.
This is the character that will separate the domain name from the user name in
the Linux user name. For example, AD6380+Administrator is the Linux user
name of the user Administrator in domain AD6380 when the winbind separator is
a plus sign (+). The impact of the chosen character has to be studied in all
applications and network services being used. Using the plus (+) character for
separation generally is the best choice for most Linux shells and applications.
Planning tip:
Plan and test winbind and the winbind separator extensively to
validate the setting prior to migrating clients.
In the case of authenticating natively with an Active Directory domain, Kerberos
has to be configured as well as Samba.
Chapter 4. Technical planning
47
footer
Our partners:
PHP: Hypertext Preprocessor Cheap Web Hosting
JSP Web Hosting
Ontario Web Hosting
Jsp Web Hosting
Cheapest Web Hosting
Java Hosting
Cheapest Hosting
Visionwebhosting.net Business web hosting division of Vision Web Hosting Inc.. All rights reserved