Solved

user directories: LDAP authentication Snow Leopard

Posted on 2010-09-21
6
728 Views
Last Modified: 2013-11-12
I've setup Snow Leopard clients to authenticate users via an LDAP server.  However, no directories ( /Users/<username>) are created when users log in.

I'm pretty new to Mac, and I'm not sure if I need to just create some kind of basic login script to create this.  If so, I'd appreciate some information on that.

Thanks_Ramble




0
Comment
Question by:ramble
  • 3
  • 3
6 Comments
 
LVL 14

Expert Comment

by:Justin Yeung
ID: 33728169
what is your LDAP server OS?
0
 

Author Comment

by:ramble
ID: 33728196
I don't control the LDAP server - but, I'm guessing it's windows based (definitely not Mac, but could be Linux).  Is there a way to poll it and find out without contacting the central admins?
0
 
LVL 14

Accepted Solution

by:
Justin Yeung earned 500 total points
ID: 33728342
LDAP server authenticate which mean it is not join to domian directly

and at this point when you logon, you will not pick up any thing from the domain (serverside)

0
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

 

Author Comment

by:ramble
ID: 33728520
Yeah, that was what I was suspecting.  So, how would I create these directories for the users when they login?
0
 
LVL 14

Expert Comment

by:Justin Yeung
ID: 33728772
the easier way is to join the machine to domain (i assume AD) and use the home folder in AD profile

and i don't think there is any script for Mac, the only thing that i can think of for Mac is using Open Directory (mac server).

you can setup a Open directory sync with AD domain, and user will authenticate via OD and you can do much more beside just mapping drives.
0
 

Author Closing Comment

by:ramble
ID: 33748484
I think I can figure out how to do a script now...but, for now - I'm awarding your initial assessment. Thanks!
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Syslogd is a utility that traps and logs messages sent by running processes. It is configured with the syslog.conf file, which consists of lines containing a pair of fields: "the selector field which specifies the types of messages and priorities to…
Information security is a multi-billion dollar industry. Just as lucrative is the black market industry which trades stolen identities, credit card numbers and software exploits all over the world. Nothing is hack-proof. The best one can do is make …
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now