Linux+Windows Single Sign-on 40
musichead writes "Bill Boswell (writing for redmondmag.com) has posted an interesting
article on configuring Linux clients to utilize a single sign-on and play nicely in a Microsoft Active Directory network. The article focuses on Fedora Core 2 (and the Core 3 beta), but he has examples and instructions for SuSE Linux 9.1 Professional, Mandrake 10.1 and Xandros Desktop 2.5 on his website."
Won't work with XP Home (Score:2)
Re:Won't work with XP Home (Score:1)
Re:Won't work with XP Home (Score:3, Insightful)
That hip "underground" (read: mom's basement) crowd that doesn't see the benefit in something like this. The minute people like the parent see the word microsoft they go into a self-induced froth and start posting flames annonymously. Does your face get red too?
A lot of existing businesses already have the Microsoft infrastructure in place(AD included). Something like this would open the door for Linux clients/servers as a gradual upgrade option for those businesses that c
Re:Won't work with XP Home (Score:2)
Re:Won't work with XP Home (Score:3)
Re:Won't work with XP Home (Score:2)
I admit it, it's not that apropos to the discussion, but I did fancy having another gripe about it!
Re:Won't work with XP Home (Score:1)
Multi-processor support
Dynamic Disk Support
RIS
IIS built in
The list goes on, but aside from IIS would the average joe really need Remote Installation or Multi-processor support? Home is a cheaper license, and you lose features that you probably don't use anyway.
Re:Won't work with XP Home (Score:3, Funny)
mit has single sign-on using kerberos (Score:4, Informative)
Re:mit has single sign-on using kerberos (Score:3, Informative)
Re:mit has single sign-on using kerberos (Score:2, Informative)
Re:mit has single sign-on using kerberos (Score:2)
use it...
University of Michigan single sign-on w/Kerberos (Score:1)
Odd seeing this come from Redmond... (Score:2, Insightful)
I wonder why the various Linux Vendors have not had some kind of setting during install to allow authentication to an Active Directory. It would make the "Linux infiltration" simpler!
Re:Odd seeing this come from Redmond... (Score:4, Informative)
Re:Odd seeing this come from Redmond... (Score:2)
Last time I installed Red Hat, sometime around version 7.3 or 8, there was a choice to authenticate against SMB and LDAP, both would allow auth against the Active Directory. I would assume that it was dropped from Fedora since its target wasn't enter
Re:Odd seeing this come from Redmond... (Score:2)
Joining AD with fedora is trivial, and is basically the same as in RHEL.
Re:Odd seeing this come from Redmond... (Score:2)
Re:Odd seeing this come from Redmond... (Score:2)
The system-config-authentication is the same as (will be) in RHEL, Fedora just just a step or two in front of the current RHEL.)
Mandrake ... (Score:2)
Full AD support is available in 10.1 and Corporate Desktop 3.
Easier the other way (Score:3, Interesting)
I also integrated a number of web applications into it so they authenticate against the LDAP server as well. This isn't always quite as nice - you usually have to type your user/pass in again - but at least it's synchronized with your main account.
As far as end-users are concerned, the result is the same. None of my end-users know any difference between running on this or a Windows server, I don't have any more work to do (things seem to break less than they did with NT
Re:Easier the other way (Score:2)
Re:Easier the other way (Score:2)
I am setting up at home a UNIX kerberos realm and have a Windows 2000 AD using a cross-realm trust and LDAP referals. When I get around to finnishing it, including pamifying Slackware, I should have a complete SSO across all my systems.
Re:Easier the other way (Score:2)
Re:Easier the other way (Score:2, Interesting)
There are good reasons to do things the other way around. That is, a network of Windows AD servers providing the SSO and Unix clients authenticating against them.
I run a large distributed network where I rely on Windows capabilities to minimize maintenance on client desktops. Group Policy is at the top of the list here. When Linux can natively subsitute itself for an AD controller ins
AFAIK... (Score:2)
Re:AFAIK... (Score:1)
Thanks, though.
Just tried this out. (Score:3, Informative)
In particular, this is a huge oversite because things don't work as expected. After some googling I discovered that you must specify the domain as MYDOMAIN.LOCAL, all caps. This must be done in several places, otherwise it throws cryptic errors.
With that one proviso in place, I would say the rest of the instructions were sufficient for me to figure it out in 30 minutes. Both directions authenticate properly.
Re:Just tried this out. (Score:2)
One exception is authenticating Windows clients against a non-Windows KDC's since Windows will only use DNS to locate Windows KDC's
Re:Just tried this out. (Score:2)
Under [libdefaults] you want to add 'supported_enctypes = des-cbc-crc' and 'supported_enctypes_des = des-cbc-crc'. After that kpasswd should talk the language that the Windows KDC speaks. New users in the AD, except admin untill you change their password, will already be using those encryption types.
If you w
Laptop Configuration (Score:1)
Further Resources (Score:2, Informative)
One is the official HOWTO
http://us4.samba.org/samba/docs/man/Samba-HOWTO-Co llection/winbind.html [samba.org]
The other is from the Samba 3 by Example
http://us4.samba.org/samba/docs/man/Samba-Guide/ke rberos.html [samba.org]