Roughly (off the top of my head): You need Samba with winbind. Stop samba and run use net join to join your box to the windows domain. Service smb start. Use wbinfo -p to get a list of users on the AD domain (so testing winbind works) Use authconfig to authenticate against with kerberos, the realm will be your AD domain and the server an AD server. Edit nsswitch.conf so use winbind for user/group/shadow In the winbind pam config file in /etc/pam.d the line session required /lib/security/pam_mkhomedir.so skel=/etc/skel/ umask=0077 Ensures users get a home when they log in. John On Tue 07 Jun 2005 at 08:21, Shane Presley (shane.presley@xxxxxxxxx) wrote: > Hello, > > I'd like to authenticate our users via Active Directory. I know AD > has a native LDAP interface. But we've also installed a RADIUS > interface, and that's how our Cisco Routers and firewalls authenticate > users. > > Any docs on how to set this up with Red Hat? I would prefer Radius, > but not sure if it would be capable of passing back a home directory? > > Shane > > -- > redhat-list mailing list > unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe > https://www.redhat.com/mailman/listinfo/redhat-list -- redhat-list mailing list unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe https://www.redhat.com/mailman/listinfo/redhat-list