{"id":221,"date":"2012-06-21T17:08:02","date_gmt":"2012-06-21T16:08:02","guid":{"rendered":"http:\/\/www.bocciolesi.fr\/tutoriels-et-cours\/?p=221"},"modified":"2017-02-24T10:27:02","modified_gmt":"2017-02-24T09:27:02","slug":"samba-en-integration-ad","status":"publish","type":"post","link":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/","title":{"rendered":"Samba en int\u00e9gration AD (Windows Server 2012) &#8211; Tutoriel N\u00b03"},"content":{"rendered":"<div class=\"pdfprnt-buttons pdfprnt-buttons-post pdfprnt-top-right\"><a href=\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-json\/wp\/v2\/posts\/221?print=pdf\" class=\"pdfprnt-button pdfprnt-button-pdf\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/plugins\/pdf-print\/images\/pdf.png\" alt=\"image_pdf\" title=\"Afficher le PDF\" \/><span class=\"pdfprnt-button-title pdfprnt-button-pdf-title\">Enregistrer en PDF<\/span><\/a><a href=\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-json\/wp\/v2\/posts\/221?print=print\" class=\"pdfprnt-button pdfprnt-button-print\" target=\"_blank\"><\/a><\/div><h2><span style=\"color: #3366ff;\">Dans ce cours, nous allons voir comment int\u00e9grer un poste Linux avec des partages samba dans un domaine Active Directory ( Windows\u00a0Server\u00a02012 )<\/span><\/h2>\n<p><span style=\"text-decoration: underline;\"><strong>Rappel :<\/strong><\/span><br \/>\n<b>Active Directory<\/b>\u00a0(AD) est la mise en \u0153uvre par\u00a0Microsoft\u00a0des services d&#8217;annuaire\u00a0LDAP\u00a0pour les\u00a0syst\u00e8mes d&#8217;exploitation\u00a0Windows. AD fournit\u00a0des services centralis\u00e9s d&#8217;identification et d&#8217;authentification \u00e0 un r\u00e9seau d&#8217;ordinateurs WINDOWS et de contr\u00f4leur de domaines.<br \/>\n<span style=\"line-height: 1.714285714; font-size: 1rem;\">Une arborescence\u00a0<\/span><i style=\"line-height: 1.714285714; font-size: 1rem;\">AD<\/i><span style=\"line-height: 1.714285714; font-size: 1rem;\">\u00a0comprend :<br \/>\n<\/span><span style=\"line-height: 1.714285714; font-size: 1rem;\">La for\u00eat\u00a0: structure hi\u00e9rarchique d&#8217;un ou plusieurs domaines\u00a0<\/span>ind\u00e9pendants<span style=\"line-height: 1.714285714; font-size: 1rem;\">\u00a0.C&#8217;est l&#8217;ensemble de tous les sous domaines\u00a0<\/span><i style=\"line-height: 1.714285714; font-size: 1rem;\">Active Directory<\/i><span style=\"line-height: 1.714285714; font-size: 1rem;\">.<br \/>\nAD utilise les services de Kerberos pour l&#8217;authentification et les informations de session.<\/span><\/p>\n<p><span style=\"color: #3366ff;\"><strong>Au pr\u00e9alable, nous aurons besoin : <\/strong><\/span><\/p>\n<p>D&#8217;une machine VM avec Windows Server 2012 (AD et DNS), nous avons cr\u00e9\u00e9 un domaine comme ci-dessous repr\u00e9sent\u00e9<strong> :<\/strong><\/p>\n<p><a href=\"https:\/\/www.mb-creation-web.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-232\" src=\"https:\/\/www.mb-creation-web.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture5.png\" alt=\"Capture\" width=\"751\" height=\"362\" srcset=\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture5.png 751w, https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture5-300x144.png 300w, https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture5-624x300.png 624w\" sizes=\"auto, (max-width: 751px) 100vw, 751px\" \/><\/a><\/p>\n<p>\ud83d\ude42 Je vous renvoie \u00e0 l&#8217;excellent tutoriel de <a href=\"http:\/\/spasipe.wordpress.com\/2012\/07\/31\/installer-active-directory-domain-services-adds-sur-windows-server-2012\/\" target=\"_blank\">Benoit Jester pour installer AD\u00a0<\/a><\/p>\n<p><strong><span style=\"color: #3366ff;\"><span style=\"line-height: 1.714285714; font-size: 1rem;\">Nous aurons besoin sur la machine VM linux d&#8217;installer\u00a0<\/span>les paquets Samba (et WinBind) , Kerberos et NTP.<\/span><\/strong><\/p>\n<p>Samba \u00e9videmment permet de g\u00e9rer le partage en monde h\u00e9t\u00e9rog\u00e8ne &#8230; Kerberos g\u00e8re l&#8217;authentification r\u00e9seau sur le domaine AD.<\/p>\n<h2><span style=\"color: #3366ff;\">I &#8211; NTP et \/etc\/resolv.conf:<\/span><\/h2>\n<p><span style=\"font-size: 1rem;\">NTP permet de synchroniser avec un serveur de temps la machine Linux et le serveur AD.<\/span><\/p>\n<p>apt-get install ntp<br \/>\nvi \/etc\/ntp.conf<br \/>\non y ajoute la ligne :<br \/>\n<strong>server winserver.formation.local<\/strong><br \/>\n<strong>#server NomADServer.domaine.tld<\/strong><\/p>\n<p>Il faudra v\u00e9rifier dans le \/etc\/resolv.conf que l&#8217;on ait bien re\u00e7u les informations des DNS du r\u00e9seau !!!<\/p>\n<h2><span style=\"color: #3366ff;\">\u00a0II &#8211; KRB5-USER<\/span><\/h2>\n<p>apt-get install krb5-user<br \/>\n<em><span style=\"color: #3366ff;\"># pour utiliser l&#8217;authentification Kerberos en tant que client du server AD<\/span><\/em><br \/>\nAttention \u00e0 la <span style=\"text-decoration: underline;\"><strong>casse<\/strong> <\/span>dans l&#8217;\u00e9dition de \/etc\/krb5.conf<\/p>\n<p><strong>\u00a0[libdefaults]<\/strong><\/p>\n<p>default_realm = FOMATION.LOCAL<\/p>\n<p><strong>[realms]<br \/>\n<\/strong><br \/>\n<em id=\"__mceDel\">FOMATION.LOCAL<\/em>\u00a0= {<br \/>\nkdc = winserver.formation.local<br \/>\nadmin_server =\u00a0\u00a0winserver.formation.local<br \/>\ndefault_domain = formation.local<br \/>\n}<br \/>\n[domain_realm]<br \/>\n.formation.local=FORMATION.LOCAL<br \/>\nformation.local=FORMATION.LOCAL<\/p>\n<p><strong>[login]<\/strong><br \/>\nkrb4_convert = true<br \/>\nkrb4_get_tickets = false<\/p>\n<p><span style=\"line-height: 1.714285714; font-size: 1rem;\">Pour cr\u00e9er le compte machine et faire partie de Active Directory de Windows Server 2012, Kerberos doit tout d&#8217;abord \u00eatre initialis\u00e9 comme serveur membre faisant partie du domaine AD<\/span><\/p>\n<p>Pour cr\u00e9er un ticket administratif pour Kerberos :<\/p>\n<p><strong>[root@\/home\/tux] kinit michel@FORMATION.LOCAL<br \/>\n<\/strong><strong>Password for michel@FORMATION.LOCAL:<br \/>\n<\/strong><strong>[root@\/home\/tux]\u00a0<\/strong><\/p>\n<p><strong><span style=\"color: #3366ff;\">klist<\/span> <\/strong>permet de v\u00e9rifier l&#8217;int\u00e9grit\u00e9 du ticket \ud83d\ude42<\/p>\n<p>Si il n&#8217;y a pas de message d&#8217;erreur c&#8217;est OK.<\/p>\n<h2><span style=\"color: #3366ff;\">III &#8211; SAMBA &#8211; SMB.CONF<\/span><\/h2>\n<p><strong><span style=\"line-height: 1.714285714; font-size: 1rem;\">[global]<\/span><\/strong><br \/>\nworkgroup = <span style=\"color: #3366ff;\">FORMATION <em><span style=\"color: #000000;\">#Nom de Domaine<\/span><\/em><\/span><br \/>\npassword server = <span style=\"color: #3366ff;\">WINSERVER.formation.local <em><span style=\"color: #000000;\">#NomADServer.domain.tld<\/span><\/em><\/span><br \/>\nrealm = <span style=\"color: #3366ff;\">FORMATION.LOCAL<em><span style=\"color: #000000;\"> #domain.tld<\/span><\/em><\/span><br \/>\nsecurity = <span style=\"color: #3366ff;\">ADS<\/span><br \/>\nidmap uid = 10000-20000<br \/>\nidmap gid = 10000-20000<br \/>\nwinbind separator = <strong><span style=\"color: #3366ff;\">\/<br \/>\n<\/span><\/strong><span style=\"color: #3366ff;\"><em>#on peut se connecter en console comme ci-dessous : le s\u00e9parateur entre le nom de domaine et le user<br \/>\n# lorsqu&#8217;on teste le bind avec AD wbinfo -u, on verra<br \/>\nFORMATION+michel<\/em><\/span><\/p>\n<p><a href=\"https:\/\/www.mb-creation-web.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-259\" src=\"https:\/\/www.mb-creation-web.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture7.png\" alt=\"Capture\" width=\"404\" height=\"35\" srcset=\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture7.png 404w, https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture7-300x25.png 300w\" sizes=\"auto, (max-width: 404px) 100vw, 404px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>template shell = \/bin\/bash<br \/>\nwinbind use default domain = true<br \/>\n<span style=\"color: #3366ff;\">#on peut se passer de l&#8217;authentification \\\\domaine\\login<\/span><br \/>\nwinbind offline logon = false<br \/>\nnetbios name = <span style=\"color: #3366ff;\">DEBIAN<\/span><br \/>\npreferred master = no<br \/>\nserver string = Samba Server version %v<br \/>\nencrypt passwords = yes<br \/>\nlog level = 3<br \/>\nlog file = \/var\/log\/samba\/%m<br \/>\nmax log size = 50<br \/>\nprintcap name = cups<br \/>\nprinting = cups<br \/>\nwinbind enum users = Yes<br \/>\n<span style=\"color: #3366ff;\">#samba doit faire appel \u00e0 Winbind pour g\u00e9rer ses users<\/span><br \/>\nwinbind enum groups = Yes<br \/>\n<span style=\"color: #3366ff;\">#samba doit faire appel \u00e0 Winbind pour g\u00e9rer ses groupes<\/span><br \/>\n<strong><span style=\"color: #333333; font-size: 1rem; line-height: 1.714285714;\">template homedir = \/home\/%D\/%U<\/span><\/strong><br \/>\n<span style=\"color: #3366ff;\"><em style=\"line-height: 1.714285714; font-size: 1rem;\"># r\u00e9pertoire cr\u00e9\u00e9 sur le serveur Linux samba sous home avec le nom de domaine puis le nom du user<br \/>\n<\/em><\/span><\/p>\n<p><em id=\"__mceDel\"><strong>[homes]<\/strong><br \/>\nwritable = yes<br \/>\nbrowsable = no<br \/>\nvalid users = %S<\/em><\/p>\n<p><strong style=\"line-height: 1.714285714; font-size: 1rem;\">[tmp]<\/strong><\/p>\n<p>comment = Partage SAMBA de tmp<br \/>\npath= \/tmp<br \/>\n# NETWORK<strong><span style=\"color: #3366ff;\">\/<\/span><\/strong>USER_AD @NETWORK\/GROUP_AD<br \/>\nValid Users = @&#8221;Admins du domaine&#8221; , @TECHNIQUE , Administrateur<br \/>\nwritable=yes<br \/>\nbrowseable=yes<em id=\"__mceDel\" style=\"line-height: 1.714285714; font-size: 1rem;\">\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/www.mb-creation-web.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-236\" src=\"https:\/\/www.mb-creation-web.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture6.png\" alt=\"Capture\" width=\"531\" height=\"522\" srcset=\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture6.png 531w, https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture6-300x294.png 300w\" sizes=\"auto, (max-width: 531px) 100vw, 531px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"color: #3366ff;\">IV &#8211; NSSWITCH\u00a0<\/span><\/h2>\n<p>\/etc\/nsswitch permet d&#8217;indiquer comment et dans quel ordre la r\u00e9solution des noms des machines va se faire, cela peut \u00eatre le dns, un fichier de hosts \ud83d\ude41 , etc &#8230; et surtout WinBind dans notre cas qui est capable de nous &#8216;lier&#8217; \u00e0 l&#8217;annuaire Windows \ud83d\ude42<\/p>\n<p><strong>vi \/etc\/nsswitch.conf<\/strong><br \/>\n<span style=\"line-height: 1.714285714; font-size: 1rem;\">passwd: files <span style=\"color: #3366ff;\">winbind<\/span><\/span><br \/>\nshadow: files <span style=\"color: #3366ff;\">winbind<\/span><br \/>\ngroup: files <span style=\"color: #3366ff;\">winbind<\/span><\/p>\n<h2><span style=\"color: #3366ff;\">V &#8211; R\u00e8gles d&#8217;authentification PAM &#8211; Pluggable Authentification Module<\/span><\/h2>\n<p>La machine Linux est r\u00e9gie par des r\u00e8gles d&#8217;authentification communes \u00e0 plusieurs services.<br \/>\nAu lieu que chaque service utilise son propre syst\u00e8me d&#8217;authentification d&#8217;utilisateurs, Linux PAM <span style=\"color: #3366ff;\">fournit une biblioth\u00e8que dynamique <\/span><strong style=\"color: #3366ff;\">\/lib\/security<\/strong><span style=\"color: #3366ff;\">\u00a0contenant\u00a0les <\/span><strong style=\"color: #3366ff;\">fonctions<\/strong><span style=\"color: #3366ff;\"> appropri\u00e9es \u00e0 la m\u00e9thode d&#8217;authentification utilis\u00e9e.<\/span><\/p>\n<p>Les fichiers de configuration de PAM sont stock\u00e9s dans <span style=\"color: #3366ff;\"><strong>\/etc\/pam.d\/ .<\/strong><\/span>Il existe un fichier pour chaque programme du syst\u00e8me qui authentifie les utilisateurs.<br \/>\nCes fichiers se composent de la mani\u00e8re suivante :<\/p>\n<p><strong>M\u00e9canisme \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Indicateur de\u00a0contr\u00f4le\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0chemin\/module \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Arguments<\/strong><br \/>\n4\u00a0principaux\u00a0<strong>m\u00e9canismes<\/strong> :<br \/>\n<span style=\"color: #3366ff;\">AUTH<\/span> : identification classique(login+mdp)<br \/>\n<span style=\"color: #3366ff;\">ACCOUNT<\/span> : v\u00e9rification du compte<br \/>\n<span style=\"color: #3366ff;\">PASSWORD<\/span> : v\u00e9rification du mdp<br \/>\n<span style=\"color: #3366ff;\">SESSION<\/span> : acc\u00e8s aux ressources pendant la\u00a0session\u00a0de connexion<\/p>\n<p>Les <strong>contr\u00f4les<\/strong> (flags) :<br \/>\n<span style=\"color: #3366ff;\">SUFFICIENT<\/span> : on attend 1 succ\u00e8s ou 1 \u00e9chec du module<br \/>\n<span style=\"color: #3366ff;\">REQUIRED<\/span> : le succ\u00e8s du module est n\u00e9cessaire pour autoriser le service<br \/>\n<span style=\"color: #3366ff;\">REQUISITE<\/span> : idem que REQUIRED mai sle test s&#8217;arr\u00eate illico apr\u00e8s le 1er \u00e9chec<br \/>\n<span style=\"color: #3366ff;\">OPTIONAL<\/span> : le succ\u00e8s du module n&#8217;est pas vital !<\/p>\n<p>commande cool \ud83d\ude42 :<strong> pam-auth-update<\/strong><\/p>\n<p><strong style=\"line-height: 1.714285714; font-size: 1rem;\"><span style=\"color: #3366ff;\">[root@\/etc\/pam.d] cat common-account<\/span> <\/strong><\/p>\n<p>account [success=2 new_authtok_reqd=done default=ignore] pam_unix.so<br \/>\n<strong>account [success=1 new_authtok_reqd=done default=ignore] pam_winbind.so<\/strong><br \/>\naccount requisite pam_deny.so<br \/>\naccount required pam_permit.so<\/p>\n<p><strong><span style=\"color: #3366ff;\">[root@\/etc\/pam.d] cat common-auth<\/span> <\/strong><\/p>\n<p>auth [success=2 default=ignore] pam_unix.so nullok_secure<br \/>\n<strong>auth [success=1 default=ignore] pam_winbind.so krb5_auth krb5_ccache_type=FILE cached_login try_first_pass<\/strong><br \/>\nauth requisite pam_deny.so<br \/>\nauth required pam_permit.so<br \/>\nauth optional pam_cap.so<\/p>\n<p><span style=\"color: #3366ff;\"><strong>[root@\/etc\/pam.d] cat common-password<\/strong> <\/span><\/p>\n<p>password [success=2 default=ignore] pam_unix.so obscure sha512<br \/>\n<strong>password [success=1 default=ignore] pam_winbind.so use_authtok try_first_pass<\/strong><br \/>\npassword requisite pam_deny.so<br \/>\npassword required pam_permit.so<br \/>\npassword optional pam_gnome_keyring.so<\/p>\n<p><strong><span style=\"color: #3366ff;\">[root@\/etc\/pam.d] cat common-session<\/span><\/strong><\/p>\n<p>session [default=1] pam_permit.so<br \/>\nsession requisite pam_deny.so<br \/>\nsession required pam_permit.so<br \/>\nsession required pam_unix.so<br \/>\n<strong>session optional pam_winbind.so<\/strong><br \/>\nsession optional pam_ck_connector.so nox11<br \/>\n<strong>session required pam_mkhomedir.so skel=\/etc\/skel<\/strong><\/p>\n<h2><span style=\"color: #3366ff;\">VI &#8211; Red\u00e9marrage des serveurs<\/span><\/h2>\n<p>\/etc\/init.d\/samba restart<br \/>\n\/etc\/init.d\/winbind\/restart<\/p>\n<h2><span style=\"color: #3366ff;\">VII &#8211; Int\u00e9gration de la machine Linux au domaine AD<\/span><\/h2>\n<p>[root@\/etc\/pam.d] <strong><span style=\"color: #3366ff;\">net join -U Administrateur<br \/>\n<\/span><\/strong><em id=\"__mceDel\" style=\"line-height: 1.714285714; font-size: 1rem;\">Enter Administrateur&#8217;s password: # le mot de passe administrateur de AD<br \/>\n<\/em><strong>Joined domain FORMATION.<\/strong><\/p>\n<p>Du c\u00f4t\u00e9 de AD, on peut v\u00e9rifier en regardant les machines int\u00e9gr\u00e9es et l&#8217;on voir bien le nom netBIOS de SMB.CONF (debian dans notre cas)<\/p>\n<p><em id=\"__mceDel\"><em id=\"__mceDel\"><a href=\"https:\/\/www.mb-creation-web.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-231\" src=\"https:\/\/www.mb-creation-web.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture4.png\" alt=\"Capture\" width=\"779\" height=\"568\" srcset=\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture4.png 779w, https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture4-300x218.png 300w, https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture4-624x454.png 624w\" sizes=\"auto, (max-width: 779px) 100vw, 779px\" \/><\/a><\/em><\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Pour tester et interroger l&#8217;annuaire LDAP :<br \/>\nwbinfo -u <span style=\"color: #3366ff;\">#montre tous les users du domaine<\/span><br \/>\nwbinfo -g <span style=\"color: #3366ff;\">#montre tous les groupes du domaine<\/span><\/p>\n<p><strong><span style=\"color: #3366ff;\">VIII &#8211; LOGIN<\/span><\/strong><\/p>\n<p><span style=\"color: #3366ff;\"><span style=\"color: #333333;\">Depuis un terminal Linux :<br \/>\nsu &#8211; michel<\/span><\/span><span style=\"color: #3366ff;\"><br \/>\n<span style=\"color: #333333;\">&#8230; cr\u00e9ation du r\u00e9pertoire etc &#8230;<br \/>\n<span style=\"color: #3366ff;\">#pour tester la connexion<\/span><\/span><\/span><\/p>\n<p>Il ne reste plus qu&#8217;\u00e0 s&#8217;authentifier depuis une\u00a0machine\u00a0Windows &#8230;<\/p>\n<p><a style=\"line-height: 1.714285714; font-size: 1rem;\" href=\"https:\/\/www.mb-creation-web.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-233\" src=\"https:\/\/www.mb-creation-web.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture11.png\" alt=\"Capture1\" width=\"568\" height=\"559\" srcset=\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture11.png 568w, https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2013\/02\/Capture11-300x295.png 300w\" sizes=\"auto, (max-width: 568px) 100vw, 568px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans ce cours, nous allons voir comment int\u00e9grer un poste Linux avec des partages samba dans un domaine Active Directory ( Windows\u00a0Server\u00a02012 ) Rappel : Active Directory\u00a0(AD) est &#8230;<\/p>\n","protected":false},"author":1,"featured_media":1588,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,39],"tags":[26],"class_list":["post-221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux-admin","category-tutoriels","tag-active-directory"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Samba en int\u00e9gration AD (Windows Server 2012) - Tutoriel N\u00b03 - Tutoriels et Cours<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Samba en int\u00e9gration AD (Windows Server 2012) - Tutoriel N\u00b03 - Tutoriels et Cours\" \/>\n<meta property=\"og:description\" content=\"Dans ce cours, nous allons voir comment int\u00e9grer un poste Linux avec des partages samba dans un domaine Active Directory ( Windows\u00a0Server\u00a02012 ) Rappel : Active Directory\u00a0(AD) est ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/\" \/>\n<meta property=\"og:site_name\" content=\"Tutoriels et Cours\" \/>\n<meta property=\"article:published_time\" content=\"2012-06-21T16:08:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-02-24T09:27:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2012\/06\/Samba-AD.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"551\" \/>\n\t<meta property=\"og:image:height\" content=\"236\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michel BOCCIOLESI\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michel BOCCIOLESI\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/\",\"url\":\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/\",\"name\":\"Samba en int\u00e9gration AD (Windows Server 2012) - Tutoriel N\u00b03 - Tutoriels et Cours\",\"isPartOf\":{\"@id\":\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2012\/06\/Samba-AD.jpg\",\"datePublished\":\"2012-06-21T16:08:02+00:00\",\"dateModified\":\"2017-02-24T09:27:02+00:00\",\"author\":{\"@id\":\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/#\/schema\/person\/6bdfe0a1263b803645c69e3d5748dabe\"},\"breadcrumb\":{\"@id\":\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/#primaryimage\",\"url\":\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2012\/06\/Samba-AD.jpg\",\"contentUrl\":\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2012\/06\/Samba-AD.jpg\",\"width\":551,\"height\":236,\"caption\":\"Tutoriels Linux - Samba\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Samba en int\u00e9gration AD (Windows Server 2012) &#8211; Tutoriel N\u00b03\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/#website\",\"url\":\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/\",\"name\":\"Tutoriels et Cours\",\"description\":\"Michel Bocciolesi | Formateur Consultant en Informatique\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/#\/schema\/person\/6bdfe0a1263b803645c69e3d5748dabe\",\"name\":\"Michel BOCCIOLESI\",\"description\":\"Michel Bocciolesi est consultant et formateur sp\u00e9cialis\u00e9 en Informatique.\",\"sameAs\":[\"https:\/\/www.mb-creation-web.fr\"],\"url\":\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/author\/michel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Samba en int\u00e9gration AD (Windows Server 2012) - Tutoriel N\u00b03 - Tutoriels et Cours","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/","og_locale":"fr_FR","og_type":"article","og_title":"Samba en int\u00e9gration AD (Windows Server 2012) - Tutoriel N\u00b03 - Tutoriels et Cours","og_description":"Dans ce cours, nous allons voir comment int\u00e9grer un poste Linux avec des partages samba dans un domaine Active Directory ( Windows\u00a0Server\u00a02012 ) Rappel : Active Directory\u00a0(AD) est ...","og_url":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/","og_site_name":"Tutoriels et Cours","article_published_time":"2012-06-21T16:08:02+00:00","article_modified_time":"2017-02-24T09:27:02+00:00","og_image":[{"width":551,"height":236,"url":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2012\/06\/Samba-AD.jpg","type":"image\/jpeg"}],"author":"Michel BOCCIOLESI","twitter_misc":{"\u00c9crit par":"Michel BOCCIOLESI","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/","url":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/","name":"Samba en int\u00e9gration AD (Windows Server 2012) - Tutoriel N\u00b03 - Tutoriels et Cours","isPartOf":{"@id":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/#primaryimage"},"image":{"@id":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/#primaryimage"},"thumbnailUrl":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2012\/06\/Samba-AD.jpg","datePublished":"2012-06-21T16:08:02+00:00","dateModified":"2017-02-24T09:27:02+00:00","author":{"@id":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/#\/schema\/person\/6bdfe0a1263b803645c69e3d5748dabe"},"breadcrumb":{"@id":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/#primaryimage","url":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2012\/06\/Samba-AD.jpg","contentUrl":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2012\/06\/Samba-AD.jpg","width":551,"height":236,"caption":"Tutoriels Linux - Samba"},{"@type":"BreadcrumbList","@id":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/samba-en-integration-ad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/"},{"@type":"ListItem","position":2,"name":"Samba en int\u00e9gration AD (Windows Server 2012) &#8211; Tutoriel N\u00b03"}]},{"@type":"WebSite","@id":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/#website","url":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/","name":"Tutoriels et Cours","description":"Michel Bocciolesi | Formateur Consultant en Informatique","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/#\/schema\/person\/6bdfe0a1263b803645c69e3d5748dabe","name":"Michel BOCCIOLESI","description":"Michel Bocciolesi est consultant et formateur sp\u00e9cialis\u00e9 en Informatique.","sameAs":["https:\/\/www.mb-creation-web.fr"],"url":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/author\/michel\/"}]}},"_links":{"self":[{"href":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-json\/wp\/v2\/posts\/221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-json\/wp\/v2\/comments?post=221"}],"version-history":[{"count":39,"href":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-json\/wp\/v2\/posts\/221\/revisions"}],"predecessor-version":[{"id":1531,"href":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-json\/wp\/v2\/posts\/221\/revisions\/1531"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-json\/wp\/v2\/media\/1588"}],"wp:attachment":[{"href":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-json\/wp\/v2\/media?parent=221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-json\/wp\/v2\/categories?post=221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-json\/wp\/v2\/tags?post=221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}