Solved

mac in a server environment

Posted on 2014-10-28
3
299 Views
Last Modified: 2014-11-06
Hello,
We have a client that is in a PC/AD directory environment but they are in the process of migrating to basically an all mac environment. I can already see some issues with integrating macs into an AD environment.  i.e.: offline files etc. Is the OSX server a good alternative for management of mac devices in a networked environment?  Basically the client needs centralized authentication, files sharing and profile management.  Just wanted to see what peoples experience has been?
Any information will be greatly appreciated.
0
Comment
Question by:DaveKall42
  • 2
3 Comments
 
LVL 14

Expert Comment

by:JAN PAKULA
ID: 40409103
mac in ad works quite well  - works better if you have mac osx server (much simpler setup)

few problems are with .local domains

http://support.apple.com/kb/TS4041

also have a look here

http://www.edugeek.net/forums/mac/15199-active-directory-authentication-how.html




also you will want to download some files from the (complete solutuion)

http://www.edugeek.net/forums/mac/18340-new-od-ad-integration-paper.html

(requires free registration)
AD-OD-Sandbox.pdf
0
 

Author Comment

by:DaveKall42
ID: 40409110
I am finding the integration to be fine but where I am stumbling a little bit is with offline folders on the mac with a windows file server.  I can access the server share fine with smb but if the user is off network then no access to their files.   Any ideas about that?  Macs are on Mavericks and the servers are 2008R2.  Is the mac server an easier more efficient way to manage macs given that they are basically going to be a all mac shop here in a bit.
0
 
LVL 14

Accepted Solution

by:
JAN PAKULA earned 500 total points
ID: 40409215
i would definitely go with OSX Server

as for local files try that

http://support.apple.com/kb/PH11307?viewlocale=en_US&locale=en_US
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

You might have come across a situation when you have Exchange 2013 server in two different sites (Production and DR). After adding the Database copy in ECP console it displays Database copy status unknown for the DR exchange server. Issue is strange…
New Windows 7 Installations take days for Windows-Updates to show up and install. This can easily be fixed. I have finally decided to write an article because this seems to get asked several times a day lately. This Article and the Links apply to…
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will walk an individual through the steps necessary to configure their installation of BackupExec 2012 to use network shared disk space. Verify that the path to the shared storage is valid and that data can be written to that location:…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now