This is for OMV6. Here is a newer version for OMV7.
This is basicly the same as the this post.
forum.openmediavault.org/index.php?thread/42307/More detail there for other AD etc.
Install debian 12 as minimal as possible. Be sure to put in your domain.
If network is not working use "omv-firstaid" to fix.
Allow ssh
update to current
Install OMV.
forum.openmediavault.org/index…&postID=371929#post371929apt install dnsutils…
Both seem to be working but read the whole thread because others have contributed to them.
Thanks
Update:
This seems to be working fine and surviving updates. There is some info about ftp and ssh in the 8th post. Thanks to WiiFriik for that. Please read the whole thread before trying this. There are a few recommendations for other servers.
For freeipa AD see RE: OMV 6.X (RC1) Active Directory . Thanks MacroMars
Feedback welcome.
If anybody can write a plugin that would be welcome.
This is early so try at your own risk. It works with my 2012r2 server. That is all I have to test against. Hopefully it work with other AD servers. No idea if this will work on other than x86 hardware or vm. See post 14 below for samba ad controller. Thanks.
The goal is to only use debian packages and do as little manipulation as possible. I wanted to do it with sssd only and not include winbind but could not get it to work. Adding winbind later seems to be necessary or realm will use winbind and I was not able to get it working that way.
This is my notes and I hope the format is readable. I use ssh as root to enter the commands. I think the order is important but some of the apt commands can probably be combined.
#######
Domain = example.com
There are two domain controllers = dc1,dc2 both are also dns
#######
Clean install of 6.0-34 iso
Might work for existing install but not tested
Be sure to set domain name
root@omvad3:~# apt update
root@omvad3:~# apt dist-upgrade
Could be done in web ui. Not tested
reboot to run new kernel
In web ui apply the changes
Be sure these are correct
If you use dhcp it may be ok but check these!
Set ntp to domain time server and time zone
If more than one use coma separator and no spaces
Set network to static and domain dns servers
root@omvad3:~# apt install realmd policykit-1
Will install some dependencies too
root@omvad3:~# realm discover example.com
Should give details including "client-software: sssd"
root@omvad3:~# apt install sssd sssd-tools libnss-sss libpam-sss adcli samba-common-bin packagekit-tools
Will install some deoendancies too
root@omvad3:~# realm join example.com -U donadmin
root@omvad3:~# systemctl status sssd
Should report "Active: active (running)"
root@omvad3:~# apt install libsss-simpleifp0 libsss-sudo
root@omvad3:~# sssctl domain-list
Should show your domain
root@omvad3:~# id donadmin@example.com
Should show info about user
root@omvad3:~# sssctl domain-status example.com
Should show info about domain
Online status: Online
Active servers:
AD Global Catalog: dc1.example.com
AD Domain Controller: dc1.example.com
Discovered AD Global Catalog servers:
- dc1.example.com
- dc2.example.com
Discovered AD Domain Controller servers:
- dc1.example.com
- dc2.example.com
In the web ui setup SMB/CIFS
Set workgroup in capital letters
Home directories not tested but might work
Can be added later
In extra options set this
security = ads
kerberos method = secrets and keytab
realm = EXAMPLE.COM
winbind enum users = yes
winbind enum groups = yes
# Default ID mapping configuration using the rid
# idmap backend. This will work out of the box for simple setups
# as well as complex setups with trusted domains.
idmap config * : backend = tdb
idmap config * : range = 3000-7999
idmap config EXAMPLE : backend = rid
idmap config EXAMPLE : range = 10000-9999999
winbind use default domain = yes
root@omvad3:~# apt install winbind libsss-sudo libnss-winbind libpam-winbind libwbclient0
root@omvad3:~# cp /etc/nsswitch.conf /etc/nsswitch.conf.bak
root@omvad3:~# nano /etc/nsswitch.conf
Change these two lines
passwd: files sss
group: files sss
to
passwd: files winbind
group: files winbind
root@omvad3:~# "net rpc join -U donadmin" or "net ads join -U donadmin"
root@omvad3:~# reboot #May not be needed
####
Users and Groups from the domain should show in the web ui now
Create a share and you should be able to add acl as needed
Suggestions and other input welcome.
Good luck
Thanks
forum.openmediavault.org/wsc/index.php?attachment/23679/
FYI
System Information
Hostname
omvad3.jhcopiers.com
Version
6.0.15-1 (Shaitan)
Processor
AMD Opteron(tm) Processor 6366 HE
Kernel
Linux 5.15.0-0.bpo.3-amd64
System time
3/4/2022, 11:51:48 AM
Uptime
an hour