Solved

Linux Active Directory Management

Posted on 2007-11-21
3
607 Views
Last Modified: 2013-12-15
I am running OpenSUSE 10.3 on my desktop. Is there a tool that will allow me to manage my Active Directory users, etc.. natively, other than using RDP to the actual domain controller?
0
Comment
Question by:Tharo_Systems
  • 2
3 Comments
 
LVL 2

Expert Comment

by:terrydavis
ID: 20328190
If by natively, you mean microsoft supported, no.  You can attempt to use an ldap management tool such as:
http://ldaptool.sourceforge.net/

However, generating passwords here will not be the same as setting them using AD Management tools on Windows.  You could attempt to install the windows 2003 admin pack with wine on linux but I am not sure how successful that will be:
http://www.microsoft.com/downloads/details.aspx?FamilyID=E487F885-F0C7-436A-A392-25793A25BAD7&displaylang=en

0
 

Author Comment

by:Tharo_Systems
ID: 20328284
By natively, I meant without Wine or VMWare. I'll check out these options. Thanks.
0
 
LVL 2

Accepted Solution

by:
terrydavis earned 125 total points
ID: 20328341
With a normal AD management tool that I linked above, you can edit normal text records in AD.  I have done this with success.  However, to edit the passwords, you'll need to generate an NTLM hashed password externally to get the password in a format that is compatible with windows.  This gets somewhat technical and involved but you can pretty easily generate this password.   Check this link out for more information about NTLM:
http://en.wikipedia.org/wiki/NTLM

In a nutshell, it is an md4 hash.   You can then take a password and get your md4 value like this:
[terry@server ~]# echo "my$password" | md4sum
e63aa8d198f5b16ae31f8836260ae2e5

Also, look at the field in ldap/ad, it might be formatted like NTLM{e63aa8d198f5b16ae31f8836260ae2e5}
(or something similar).
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Trying to figure out group policy inheritance and which settings apply where can be a chore.  Here's a very simple summary I've written which might help.  Keep in mind, this is just a high-level conceptual overview where I try to avoid getting bogge…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now