Support #386
Updated by Daniel Curtis almost 9 years ago
This is a guide how I installed Samba4 and got it working as a replacement for AD domain controllers on FreeBSD 9. Here’s the overview of the network: # DC1: dc01.example.com == 192.168.1.254 # DC2: dc02.example.com == 192.168.1.253 # Router: 192.168.1.1 # Domain: example.com h2. Preparing the Environment * First of all, Samba4 is really bleeding edge at the time of this writing, so you’ll want to make sure pkg is up to date: <pre> pkg update && pkg upgrade </pre> * Now Samba4 requires ACL’s to be enabled on the file system. Wherever you’ve installed the Samba4 data is the partition you’ll need to add ACL’s. This example is the bare bones simple install of /swap and / <pre> edit /etc/fstab </pre> #* * Add the @acls@ ACL option to the / partition: partition. I am using the @--use-ntvfs@ option, so the ACLs are stored in a file, rather than the filesystem metadata: <pre> # Device Mountpoint FStype Options Dump Pass# /dev/ada0p2 / ufs rw,acls 1 1 /dev/ada0p3 none swap sw 0 0 </pre> #* *NOTE*: If installing in a jail, make sure to add the @acls@ option to +the host fstab+ and not the jail fstab. * Since I don’t feel like rebooting my system to apply it, I’ll simply remount the partition: <pre> mount -o acls / </pre> * You will also need to update your @resolv.conf@ file to reflect the domain: <pre> edit /etc/resolv.conf </pre> #* Here’s an example of what it should look like: <pre> # Generated by resolvconf search EXAMPLE.COM domain example.com nameserver 192.168.1.254 nameserver 192.168.1.253 nameserver 192.168.1.1 #Fallback DNS IP </pre> h2. Installing Samba4 * Install Samba4: <pre> pkg install samba4 </pre> * Now let’s provision Samba4 as a Domain Controller: <pre> /usr/local/samba/bin/samba-tool domain provision --use-rfc2307 --interactive </pre> #* Realm: *example.com* #* Domain [example]: *example* #* Server Role (dc, member, standalone) [dc]: *dc* #* DNS backend (SAMBA_INTERNAL, BIND9_FLATFILE, BIND9_DLZ, NONE) [SAMBA_INTERNAL]: *SAMBA_INTERNAL* #* DNS forwarder IP address (write 'none' to disable forwarding): *192.168.1.1* #* Administrator password: *SuperSecretPassword* #* Retype password: *SuperSecretPassword* * Add the following line to the [global] section of @/usr/local/etc/smb4.conf@: <pre> [global] nsupdate command = /usr/local/bin/samba-nsupdate -g </pre> * Start and enable Enable Samba to start at boot: <pre> echo 'samba_server_enable="YES"' >> /etc/rc.conf </pre> * Now let’s start Samba4: <pre> service samba_server start </pre> * Now let’s finish configuring Kerberos <pre> ln -s /var/db/samba4/private/krb5.conf /etc/krb5.conf vi /etc/krb5.conf </pre> h2. Testing Samba4 * First let’s run this to test the domain: <pre> /usr/local/samba/bin/smbclient -L localhost -U% </pre> * You should see output for your domain. Now let’s test the administrative login: <pre> /usr/local/samba/bin/smbclient //localhost/netlogon -UAdministrator -c 'ls' </pre> * If that’s all good, let’s test DNS: <pre> host -t SRV _ldap._tcp.example.com </pre> > _ldap._tcp.example.com has SRV record 0 100 389 sambaLDAP01.example.com. * And now let’s test the Kerberos DNS record: <pre> host -t SRV _kerberos._udp.example.com </pre> > _kerberos._udp.example.com has SRV record 0 100 88 sambaLDAP01.example.com. * And finally, let’s test our DNS A record: <pre> host -t A sambaLDAP01.example.com </pre> > sambaLDAP01.example.com has address 192.168.1.254 * Now let’s test logging in as Administrator user (using Kerberos): <pre> kinit administrator@EXAMPLE.COM </pre> * And now run this to see your Kerberos ticket: <pre> klist </pre> h2. Resources * http://wiki.samba.org/index.php/Samba_AD_DC_HOWTO * http://www.whitneytechnologies.com/?p=422