Solved

Windows client authentication and administration within Linux

Posted on 2004-10-05
3
213 Views
Last Modified: 2013-12-16
How do i set up Windows 2000/XP clients, authenticate and manage them as as if they are Linux users on RH9 Server?

Regards

Mark
 
0
Comment
Question by:markacarey
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 6

Expert Comment

by:blkline
ID: 12226984
You will want to use Samba (http://www.samba.org), which will permit your Linux server to participate on a Windows network.  I use Samba as a PDC for my XP/2000 users.  

Feel free to ask specific questions about this, if you'd like.

Barry
0
 

Author Comment

by:markacarey
ID: 12229789
Barry

I need to manage the windows clients within the linux admin facility. As if they are linux clients. e.g. Setup user accounts, administer network shares on the linux server and change the windows logon passwords  

There are OS X clients set-up using NIS. However, i'm not sure if i can use this for windows clients...

Kind regards

Mark  
0
 
LVL 6

Accepted Solution

by:
blkline earned 125 total points
ID: 12229960
It sounds to me as though you definitely need to use Samba.   I suggest that you whip on over to www.samba.org and take a look around.  Then to make things as easy as possible, invest in a copy of "The Official Samba-3 HOWTO and Reference Guide (Prentice Hall ISBN 0-13-145355-6)" and its companion "Samba-3 by Example".    Most of the text of the first volume is available on-line but the most accurate and complete version is published.  

Samba is capable of using any number of authentication methods, including PAM, so I'm sure that you'll be able to find something to suit your needs.

Barry
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How many times have you wanted to quickly do the same thing to a list but found yourself typing it again and again? I first figured out a small time saver with the up arrow to recall the last command but that can only get you so far if you have a bi…
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question