Mac OS X:Configuring Access to an Active Directory Domain

Server Admin 10.6 Help

Using the Active Directory connector listed in Directory Utility, you can configure MacOSX to access basic user account information in an Active Directory domain on a Windows server.

The Active Directory connector generates all attributes required for MacOSX authentication. No changes to the Active Directory schema are required.

The Active Directory connector detects and accesses standard MacOSX record types and attributes (such as the attributes required for MacOSX client management), if the Active Directory schema has been extended to include them.

WARNING: With the advanced options of the Active Directory connector, you can map to the MacOSX unique user ID (UID), primary group ID (GID), and group GID attribute to the correct attributes that have been added to the Active Directory schema. If you change the setting of these mapping options later, users might lose access to previously created files.
Important: If your computer name contains a hyphen you might not be able to join or bind to a Directory Domain such as LDAP or Active Directory. To establish binding, use a computer name that does not contain a hyphen.

To configure access to an Active Directory domain:

  1. Open System Preferences and click Accounts.

  2. If the lock icon is locked, unlock it by clicking it and entering the name and password of an administrator.

  3. Click Login Options, then click Join or Edit.

  4. Click Open Directory Utility.

  5. If the lock icon is locked, unlock it by clicking it and entering the name and password of an administrator.

  6. Click Services.

  7. In the list of services, select Active Directory and click the Edit (/) button.

  8. Enter the DNS name of the Active Directory domain you want to bind to the computer you’re configuring.

    The administrator of the Active Directory domain can tell you the DNS name to enter.

  9. If necessary, edit the Computer ID.

    The Computer ID is the name the computer is known by in the Active Directory domain, and it’s preset to the name of the computer. You might change this to conform to your organization’s established scheme for naming computers in the Active Directory domain. If you’re not sure, ask the Active Directory domain administrator.

  10. (Optional) Set advanced options.

    If the advanced options are hidden, click Show Advanced Options and set options in the User Experience, Mappings, and Administrative panes. You can also change advanced option settings later.

    For more information about advanced options, see:

  11. Click Bind, use the following to authenticate as a user who has rights to bind a computer to the Active Directory domain, select the search policies you want Active Directory added to (see below), and click OK:

    • Username and Password: You might be able to authenticate by entering the name and password of your Active Directory user account, or the Active Directory domain administrator might need to provide a name and password.

    • Computer OU: Enter the organizational unit (OU) for the computer you’re configuring.

    • Use for authentication: Use to determine whether Active Directory is added to the computer’s authentication search policy.

    • Use for contacts: Use to determine whether Active Directory is added to the computer’s contacts search policy.

    When you click OK, Directory Utility sets up trusted binding between the computer you’re configuring and the Active Directory server. The computer’s search policies are set according to the options you selected when you authenticated, and Active Directory is enabled in Directory Utility’s Services pane.

    With the default settings for Active Directory advanced options, the Active Directory forest is added to the computer’s authentication search policy and contacts search policy if you selected “Use for authentication” or “Use for contacts.”

    However, if you deselect “Allow authentication from any domain in the forest” in the Administrative advanced options pane before clicking Bind, the nearest Active Directory domain is added instead of the forest.

    You can change search policies later by adding or removing the Active Directory forest or individual domains. For more information, see Defining Custom Search Policies .

  12. (Optional) Join the server to the Active Directory Kerberos realm:

    • On the server or an administrator computer that can connect to the server, open Server Admin and select Open Directory for the server.

    • Click Settings, then click General.

    • Click Join Kerberos, then choose the Active Directory Kerberos realm from the pop-up menu and enter credentials for a local administrator on this server.

For more information, see Joining a Server to a Kerberos Realm .

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值