1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-31 17:18:04 +03:00
samba-mirror/source/rpc_server/remote
Stefan Metzmacher ed4c7ce547 r20114: from Julien Kerihuel <j.kerihuel@openchange.org>, thanks!:
I've attached the patch which fix this problem. I've only added
  DCERPC_NDR_REF_ALLOC to the connection flags. This way it is processed
  correctly by ndr_pull_init_flags and added to the ndr flags of the pull
  structure.

metze
2007-10-10 14:29:09 -05:00
..
dcesrv_remote.c r20114: from Julien Kerihuel <j.kerihuel@openchange.org>, thanks!: 2007-10-10 14:29:09 -05:00
README r13265: Clarify how delegation works with the remote RPC backend. 2007-10-10 13:51:40 -05:00

This is an RPC backend that implements all operations in terms of
remote RPC operations.  This may be useful in certain debugging
situations, where the traffic is encrypted, or you wish to validate
that IDL is correct before implementing full test clients, or with
windows clients.

There are two modes of operation: Password specified and delegated
credentials.

Password specified:
-------------------

This uses a static username/password in the config file, example:

[global]
	dcerpc endpoint servers = remote
	dcerpc_remote:binding = ncacn_np:win2003
	dcerpc_remote:username = administrator
	dcerpc_remote:password = PASSWORD
	dcerpc_remote:interfaces = samr, lsarpc, netlogon

Delegated credentials:
----------------------

If your incoming user is authenticated with Kerberos, and the machine
account for this Samba4 proxy server is 'trusted for delegation', then
the Samba4 proxy can forward the client's credentials to the target.

You must be joined to the domain (net join <domain> member).

To set 'trusted for delegation' with MMC, see the checkbox in the
Computer account property page under Users and Computers.

[global]
	dcerpc endpoint servers = remote
	dcerpc_remote:binding = ncacn_np:win2003
	dcerpc_remote:interfaces = samr, lsarpc, netlogon