Active Directory Microsoft Uam Connect To Mac

05.04.2020by
Active Directory Microsoft Uam Connect To Mac Rating: 3,7/5 2307 reviews
  1. Active Directory Microsoft Uam Connect To Mac Free
  2. Active Directory Microsoft Uam Connect To Mac Computer

In this section I'd like to talk about adding aMacintosh client to a Windows Active Directory domain.Active Directory is the Microsoft implementationof a directory service and it's something youmay not have on a small network.It's really geared more towards medium and large networks.If you are in fact, working with an Active Directory domain,you might be a little. 2015-9-17  Particularly, in the Library and certain kiosk machines, we have Macs that are bound to an Active Directory domain (I don't administrate this, just the Macs). These Macs have some prefs being set by a Mac OS X server, but nothing regarding Open Directory. All Active Directory. The majority of the machines are running 10.7.5. May 07, 2019 Using Microsoft SCCM and Parallels® Mac Management for Microsoft® SCCM is a significantly easier way for administrators to integrate Mac clients into an Active Directory network. The SCCM Active Directory System Discovery tool automatically identifies new Mac devices on the network. ← Azure Active Directory Implement the ability to join Mac OS X to Azure AD It would great to have the ability to allow Mac OS X users with the ability to join Azure AD. 2019-9-18  So this idea keeps getting rejected one way or another. So here we go again: Microsoft needs to fix this - and take responsibility for the ability for Windows AND Macintosh to connect to Azure AD from the login prompt. This way we can ditch our on premise Active Directory servers once and for all. Then and only then will I stop making these posts.

Learning has never been so easy!

Most networks use Active Directory to provide LDAP services to their network. And with the rise of Macs in the enterprise they need to be able to access the same resources seemlessly that their Wintel siblings do.

OS X is a standards based OS making it very flexible. Since Active Directory is simply Microsoft's implementation of LDAP Apple has included a utiltity for binding a Mac to AD. This utility is called Directory Utility.

9 Steps total

Step 1: Open Directory Utility.

In Leopard - Open the Finder and navigate to Applications > Utilities and double click the Directory Utility.

In Snow Leopard - Open System Preferences > Accounts > Login Options > Network Account Server: Join > Open Directory Utility..

In Lion - Open System Preferences > Users & Groups > Login Options > Network Account Server: Join > Open Directory Utility..

Step 2: Authenticate as Admin

Click the lock in the bottom left to unlock the Directory Utility for changes. Enter your local administrator credentials.

Step 3: Add the LDAP/AD Server

Click the + symbol to add a Directory server.
Select Active Directory from the drop down menu.
Enter the AD Kerberos Domain.
The Computer ID autopopulates with your Share preferences setting.
Enter your AD Admin username and password.
Click OK

Step 4: Set Active Directory Services Preferences

Once connected to the domain you will be able to change your AD preferences.

In Directory Utility click the 'Show Advanced Settings' button in the bottom right to show the toolbar.
Select 'Services'.
Select 'Active Directory' and click the Edit button just under the Services list.

Step 5: Services - User Experience

Unbind - Pretty much leave this alone. Removing the Directory server does the same thing.

Create mobile account at login - Creates a local Home folder. If using roaming profiles in AD it will sync this folder to the Home folder on the Windows share.

Require confirmation before creating a mobile account - Prompts users to create the folder. Generally leave this unchecked.

Use UNC path from Active Directory to derive network home location - Gets home folder from users AD profile.

Network protocol to be used: - Generally leave as SMB unless you have an OS X share serving it via AFP.

Default user shell: - Just leave this as is. bash is pretty much the unix standard anyway.

Step 6: Services - Mappings

Unless you have a really good reason to map UID and GID information, leave this alone.

Map UID to attribute - Used to map UID to a uniqueID attribute in Active Directory.

Map user GID to attribute - Used to map user's GID to a primaryGroupID attribute in Active Directory.

Map group GID to attribute - Used to map user's group GID to a gidNumber attribute in Active Directory.

Step 7: Services - Administrative

Prefer this domain server: - If you prefer OS X to authenticate to a specific domain controller enter the DC's FQDN here.

Allow administration by: - I recommend checking this box and leaving it at the default. This allows domain and enterprise admins to manage OS X as though the were local admins.

Allow authentication from any domain in the forest - If you have a large AD forest implementation this setting allows cross-authentication across the entire AD forest.

Active Directory Microsoft Uam Connect To Mac Free

Step 8: Logging In - User List View

To log into Active Directory with your AD credentials first select 'Other..' Then enter your Windows credentials.

If you've set the Services to create a Mobile User, your Home directory will be created when you first log in. After which your Mobile username will appear in the list. On further logins, use your Mobile username to log in.

Step 9: Logging In - Name and Password (Recommended)

If your admin has set the local preference to use Name and Password, log into Active Directory with AD username and password.

If you've set the Services to create a Mobile User, your Home directory will be created when you first log in and will be connected upon further logins.

Binding OS X to an Active Directory domain is quite simple. Once completed users access network resources using standard Kerberos authentication. After setup has been completed users will be able to access all resources.

For password changes and additional “GPO functionality” you will either need to bind to an Open Directory OS X Server for machine management (the Golden Triangle setup, coming later) or use a third party AD binding application that extends Windows AD GPO to manage your OS X Operating system’s machine preferences, such as Likewise or Centrify.

Active Directory Microsoft Uam Connect To Mac Computer

Published: Mar 04, 2009 · Last Updated: Oct 25, 2017

References

  • Server Admin 10.5 Help - Configuring Access to an Active Directory Domain

16 Comments

  • Pimiento
    tony_farson Feb 22, 2010 at 04:55pm

    Awesome! Thanks for this. If you don't mind, I do have a couple of questions..

    1. I can successfully bind the client mac to my AD, but when I try to login as any user including domain admin OS X wiggles its screen and makes me try again, all to no avail.

    2. I have a couple of users who want to use their existing profiles (settings and files in their home directory on local OS X). Is there a way to identify an existing home folder or an easy way to migrate one to a network user?

    Microsoft word macro crashes word. Thanks!

  • Thai Pepper
    Michael2024 Feb 22, 2010 at 05:36pm

    PM’d

  • Pimiento
    Joshua5700 Apr 15, 2010 at 06:00pm

    I can't wait to see your 'golden triangle' setup article. This one saved me a bunch of time.

  • Jalapeno
    FCOE Spice May 10, 2011 at 07:07am

    Came to add this article after thinking about how much we wrestled with it. Lo and behold! AND yours is way more comprehensive. Thank you!

  • Pimiento
    Sinergi Feb 5, 2012 at 05:42am

    #5. Would you happen to know if you unchecked 'create mobile account..' & 'force local home..' why it still creates local accounts and mounts the network homes share in the dock?

  • Habanero
    Edward_Elric Mar 12, 2012 at 11:32am

    Brilliant, thanks for this, i've been scratching my head over this for a while

  • Cayenne
    macfixer Dec 12, 2012 at 08:28pm

    This is terrific!

  • Pimiento
    Hamilton2280 Jan 16, 2013 at 03:59pm

    Ok! I'm in need of some help. I have used this method of binding MACs to AD for about 2 years now. Our main domain controller recently became corrupt. We now have it back up and running but our MACs will no longer talk to it. At the login screen it says 'Network Accounts Available' with a green light, but when the users enter their login info the computer jiggles and denies them access (no errors are displayed). I have removed the computer from AD and then rebound it but no luck. Suggestions to try? Please! I have three MAC labs that are out of commission right now. ;-(

  • Sonora
    autumnwalker Feb 8, 2013 at 03:23am

    Thanks for sharing this! Did the 'golden triangle' article ever get written?

  • Pimiento
    dolphan2k Feb 8, 2013 at 05:13pm

    I have a user who is going to be traveling for over 10 months, currently the macbook is joined to the domain and he is authenticating to get in. He has a mobile account so he can login outside of the domain , but i am afraid after a long period of no authentication thru AD , the account will not log in. So my question is , does any one know the amount of time or logins allowed MACOSX will use the cached credentials? Or should i just create a local profile and transfer his profile from a domain to a local profile?

  • Pimiento
    AnthonyShane Nov 21, 2013 at 12:38am

    Great work! Thanks!! Been looking all over for a comprehensive guide to achieving this.

  • Thai Pepper
    Nelson9480 Jan 21, 2014 at 12:14pm

    Great steps! Also I have found that if the user account is not shown at login then check to see if you have added the user account to the Filevault keychain.

  • Cayenne
    Daniel Yu Aug 6, 2014 at 10:16pm

    Thank you for sharing. Great job! This is a valuable resource.

  • Pimiento
    Alan2999 Dec 17, 2014 at 11:39am

    Lets say everything is binded and so on - how do I get the mac password changes to sync with the AD password?

  • Jalapeno
    Glenn1741 Mar 5, 2018 at 09:25pm

    Does this method still work with Sierra or High Sierra?

  • prev
  • 1
  • 2
  • next
Comments are closed.