Solved

How to manage user accounts on Mac's in Active Directory Server 2012 domain

Posted on 2013-10-22
1
413 Views
Last Modified: 2013-10-24
This environment consists of about 20 Win7 PC's (mostly laptops) & 50 MacBook Air laptops running OS X 10.7 or later.

They've been using just a NAS for central storage and we're just now introducing their first server into the environment. It's running Windows Server 2012 & is a Domain Controller. It will replace the NAS for the central data store along with providing authentication for the computers & users.

I've been researching how to manage the user accounts on the Mac's. So far it seems the Magic Triangle or Golden Triangle approach might be too old school and not too management-friendly. We're definitely going to need Mobile accounts so the users can log on when out of the office. But I'm not finding a best approach yet on how to migrate these existing local user accounts to a network account without doing some hacking on the Mac.

We're looking for authentication for the domain for the Mac's as well as the ability to lock down settings on the Mac's like you can with Group Policy for Windows PC's. I'm aware of Centrify and another one like it too.

I'm just wondering what you all are doing out there who have these environments. Thanks.
0
Comment
Question by:WineGeek
1 Comment
 
LVL 32

Accepted Solution

by:
nappy_d earned 500 total points
ID: 39593587
Unfortunately, you will have to migrate the data of their accounts from the local to network accounts.

As you have been discovering, Active Directory and a solution such as Centrify would be the go to choice for a single point of management.

If budget for your company is tough maybe just use AD to bind the Macs for authentication.  The users will not be given administrative privileges.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Information security is a multi-billion dollar industry. Just as lucrative is the black market industry which trades stolen identities, credit card numbers and software exploits all over the world. Nothing is hack-proof. The best one can do is make …
Issue: One Windows 2008 R2 64bit server on the network unable to connect to a buffalo Device (Linkstation) with firmware version 1.56. There are a total of four servers on the network this being one of them. Troubleshooting Steps: Connect via h…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question