一.×××服务器加入AD域名
1.安装kerberos、samba、ntpdate
yum -y install krb5-workstation pam_krb5 krb5-devel krb5-libs samba ntpdate
2.修改DNS文件
vim /etc/resolv.conf
#在第一行加入
nameserver 192.168.100.238
3.与AD同步时间
ntpdate 192.168.100.238
echo "* */2 * * * /sbin/ntpdate 192.168.100.238" >> /etc/crontab
4.修改vim /etc/krb5.conf
vim /etc/krb5.conf
[logging]default = FILE:/var/log/krb5libs.logkdc = FILE:/var/log/krb5kdc.logadmin_server = FILE:/var/log/kadmind.log
[libdefaults]default_realm = LUSHARE.COMdns_lookup_realm = falsedns_lookup_kdc = falseticket_lifetime = 24hrenew_lifetime = 7dforwardable = true
[realms]LUSHARE.COM = {kdc = adserver.lushare.comadmin_server = adserver.lushare.com}
[domain_realm].lushare.com = LUSHARE.COMlushare.com = LUSHARE.COM
5.测试kerberos(需要注意域名的大小写)
kinit administrator@LUSHARE.COM
Password for administrator@LUSHARE.COM:
PS:需要注意LUSHARE.COM一定是大写,否则会出现
kinit: Cannot find KDC for requested realm while getting initial credentials
6.修改/etc/samba/smb.conf
vim /etc/samba/smb.conf
#修改如下内容
workgroup = LUSHARE
server string = pptpd Server
security = ads
realm = LUSHARE.COM
encrypt passwords = yes
password server = adserver.lushare.com
#添加如下内容
idmap uid = 50001-550000
idmap gid = 50001-550000
winbind separator = +
winbind refresh tickets =yes
winbind use default domain= no
winbind enum users = yes
winbind enum groups = yes
template shell = /bin/bash
template homedir =/home/%D/%U
7.加入AD
#使用klist查看刚刚使用的kinit命令是否执行成功
[root@graceboy ~]# klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: administrator@LUSHARE.COM
Valid starting Expires Service principal
03/29/14 14:34:47 03/30/14 00:34:47 krbtgt/LUSHARE.COM@LUSHARE.COMrenew until 04/05/14 14:34:47
#使用如下命令加入AD
net ads join -U administrator@LUSHARE.COM
Enter administrator@LUSHARE.COM's password:
Using short domain name -- LUSHARE
Joined 'GRACEBOY' to dns domain 'lushare.com'
8.启动相应的服务并测试加入AD是否正常
service smb restart ;chkconfig smb on
service nmb restart ;chkconfig nmb on
service winbind restart ;chkconfig winbind on
#测试是否可以获取AD中的信息
checking the trust secret for domain LUSHARE via RPC calls succeeded
#查看AD中的账户
wbinfo -u
LUSHARE+administrator
LUSHARE+guest
LUSHARE+support_388945a0
LUSHARE+krbtgt
LUSHARE+luke
LUSHARE+test
二.安装PPTPD(可参考http://fengwan.blog.51cto.com/508652/1385345)
1.安裝ppp
1 | yum -y install ppp perl |
2.下载及安装pptpd
1 2 | wget http: //poptop .sourceforge.net /yum/stable/rhel6/x86_64/pptpd-1 .4.0-1.el6.x86_64.rpm rpm -ivh pptpd-1.4.0-1.el6.x86_64.rpm |
3.配置×××的DNS
1 2 3 4 | vim /etc/ppp/options .pptpd #加入以下4行,前2行是设置DNS,后2行是加载AD验证模块 ms-dns 114.114.114.114
|
4.配置ppp的客户端IP
vim /etc/pptpd.conf
#加入以下2行,主要是本地IP,及远程×××客户端使用的IP,不建议使用内部网段
localip 172.16.0.1
remoteip 172.16.0.2-245
本文是参考:http://chengcai.blog.51cto.com/728195/1367677
另外本人测试,只要是启用的账户都可以进行连接,暂时还无法设置某些用户无法使用×××