The company puts Linux servers in the subnet for data security needs, but Linux is not too convenient to view documents. Then the leader says toss a Windows dedicated to viewing documents.
The online search for the next Pgina can be used for Windows LDAP authentication. Because ad is not in that subnet, for installation reasons, only LDAP authentication with Linux is used.
Directly from a Windows 2008 virtual machine. Install the Pgina inside. Open the software.
1: Hook up the LDAP-related options. The gateway is also hooked up because you want to operate the group. Then click Configure
650) this.width=650; "Src=" https://s3.51cto.com/wyfs02/M01/8F/F0/wKioL1jt5fayse5vAAHLUWnpGqQ229.jpg-wh_500x0-wm_ 3-wmp_4-s_1771218704.jpg "style=" Float:none; "title=" 1.jpg "alt=" Wkiol1jt5fayse5vaahluwnpgqq229.jpg-wh_50 "/>
2: Change the LDAP address and base directly here
650) this.width=650; "Src=" https://s3.51cto.com/wyfs02/M02/8F/F1/wKiom1jt5faRD7DrAADvHBYAh30686.jpg-wh_500x0-wm_ 3-wmp_4-s_2490779132.jpg "style=" Float:none; "title=" 2.jpg "alt=" Wkiom1jt5fard7draadvhbyah30686.jpg-wh_50 "/>
3: Click Gateway. My side is set to automatically add to the Remote Desktop Users group as soon as the logins are added. and then save
650) this.width=650; "Src=" https://s4.51cto.com/wyfs02/M02/8F/F1/wKiom1jt5ffC7YPdAADoU-pJTXA115.jpg-wh_500x0-wm_ 3-wmp_4-s_2536479350.jpg "style=" Float:none; "title=" 3.jpg "alt=" Wkiom1jt5ffc7ypdaadou-pjtxa115.jpg-wh_50 "/>
4: Remember to change the authentication order.
650) this.width=650; "Src=" https://s4.51cto.com/wyfs02/M02/8F/F0/wKioL1jt5feReIspAADpKkvb1R0965.jpg-wh_500x0-wm_ 3-wmp_4-s_3116115158.jpg "style=" Float:none; "title=" 4.jpg "alt=" Wkiol1jt5fereispaadpkkvb1r0965.jpg-wh_50 "/>
5: You can now enter the relevant account test. If LDAP is green, you can. In the beginning, if not,
This account, perhaps the local machine is red. Never mind.
650) this.width=650; "Src=" https://s4.51cto.com/wyfs02/M02/8F/F0/wKioL1jt5fjhrPurAAGow6nVD7Y141.jpg-wh_500x0-wm_ 3-wmp_4-s_1525766382.jpg "style=" Float:none; "title=" 5.jpg "alt=" Wkiol1jt5fjhrpuraagow6nvd7y141.jpg-wh_50 "/>
6: Now telnet to this server is the case. To some finish
650) this.width=650; "Src=" https://s1.51cto.com/wyfs02/M00/8F/F0/wKioL1jt5zGijAf9AABw8CAKTWI695.jpg-wh_500x0-wm_ 3-wmp_4-s_3777068480.jpg "title=" 6.jpg "alt=" Wkiol1jt5zgijaf9aabw8caktwi695.jpg-wh_50 "/>
After the certification is done, consider the documentation on Linux NFS, and then install the NFS client, Windows 2008
You can add the file Services role directly.
NFS is mounted automatically after logging in to the system. The front with bat wrote the script, but really did not toss out, has been wrong,
There is no way to write a golang with a.
package mainimport ( "OS" "Os/exec" "FMT" "Bufio" "strings" "Time") func main () { conf := make (map[string]string) User := os. Getenv ("USERNAME") // related NFS server information is stored directly in the file below. f, err := os. Open (' C:\Windows\auto.nfs ') if err != nil { fmt. Println ("Open config file error") os. Exit (1) } defer f.close () rd := bufio. Newscanner (f) for rd. Scan () { trim := strings. Trimspace (Rd. Text ()) split := strings. Split (trim, ' \ ') conf[split[len (split) -1]] = trim } if _, exist := conf[user]; exist { for i:=0; i<5; i++ { exec. Command ("Mount", "-o rsize=32,wsize=32,fileaccess=755", Conf[user], "Z:"). Run () time. Sleep (2000000000) if _, err := os. Open (' z:\ '); err == nil { fmt. Println ("Mount nfs ok") os. Exit (0) } else { fmt. Println ("Mount nfs error") } } }}
Once compiled, put it in the Startup folder of all users.
In addition above this mount NFS is read-only. Because the user name is not mapped, consider that they are just looking at the document and no toss.
If the Linux NFS server is version 4.1, it might be better to use this to support LDAP authentication
Ms-nfs41-client only supports 4.1
Pgina
Windows 2008 uses Linux LDAP authentication