: Charles Edge, Zack Smith, Beau Hunter, Roderick Smith
: Enterprise Mac Administrators Guide
: Apress
: 9781430224440
: 1
: CHF 39.90
:
: Allgemeines, Lexika
: English
: 500
: Wasserzeichen/DRM
: PC/MAC/eReader/Tablet
: PDF

Charles Edge,Zack Smith, andBeau Hunter provide detailed explanations of the technology required for large-scale Mac OS X deployments and show you how to integrate it with other operating systems and applications.

Enter rise Mac Administrator's Guide addresses the growing size and spread of Mac OS X deployments in corporations and institutions worldwide. In some cases, this is due to the growth of traditional Mac environments, but for the most part it has to do with 'switcher' campaigns, where Windows and/or Linux environments are migrating to Mac OS X. However, there is a steep culture shock with these types of migrations. The products that are used are different, the nomenclature is different, and most importantly the best practices for dealing with the operating system are different.

Apple provides a number of tools to help automate and guide IT toward managing a large number of Mac OS X computers-it has since before Mac OS X was initially released. However, if you want to put together all of the pieces to tell a compelling story about how to run an IT department or a deployment of Macs, you need to compile information from a number of different sources. This book will provide explanations of the technology required.

  • Provides complete solutions for the large- and medium-scale integration of directory services, imaging, and security
  • Complete guide for integrating Macs and Mac OS X into mixed environments with confidence and no down time
  • One-stop volume for IT professionals who need the technical details to get their job done as efficiently and effectively as possible


Charles Edge has been working with Apple products since he was a child. Professionally, Charles started with the Mac OS and Apple server offerings in 1999 after years working with various flavors of Unix. Charles began his consulting career working with Support Technologies and Andersen Consulting. In 2000, he found a new home at 318, Inc., a consulting firm in Santa Monica, California which is now the largest Mac consultancy in the country. At 318, Charles leads a team of over 40 engineers and has worked with network architecture, security and storage for various vertical and horizontal markets. Charles has spoken at a variety of conferences including DefCon, BlackHat, LinuxWorld, MacWorld and the WorldWide Developers Conference. Charles' first book, Mac Tiger Server Little Black Book, can be purchased through Paraglyph Press. Charles recently hung up his surfboard and moved to Minneapolis, Minnesota, with his wife, Lisa. Charles can be contacted at krypted@mac.com.
Contents at a Glance5
Table of Contents 6
About the Authors15
About the Technical Reviewers16
Acknowledgments17
Introduction18
Paradigm Shifts18
Measure Twice, Cut Once19
Application Availability19
How This Book Is Organized20
Chaos Theory21
Chapter 1 Directory Services22
Local Accounts23
Creating Accounts24
Granting Administrative Privileges25
The Root Account27
How the Local Directory Service Works29
dscl32
Changing Accounts En Masse35
Account Creation Scripts36
Parachuting Accounts into Clients36
Hiding Administrative Accounts37
Raw Mode38
Set Search Paths39
Create Additional Local Directory Nodes39
External Accounts40
Open Directory41
LDAP41
Kerberos42
Setting up Open Directory Using Server Admin45
Setting up Open Directory from the Command Line49
Demoting an Open Directory Master50
Set up an Open Directory Replica50
Removing a Replica51
Using Workgroup Manager to Create New Users51
Backing up Open Directory54
Troubleshooting Directory Services56
Directory Services Debug Logs56
Cache56
Verifying Authentication57
Summary58
Chapter 2 Directory Services Clients60
The Lay of the Land61
Basic Binding67
Plug-ins68
Unauthenticated Dynamic Binding70
Unauthenticated Static Binding72
Trusted Static Binding76
Pushing Out SSL Certificates78
Custom LDAP Settings82
Managing the Search Policy88
Binding with the Command Line91
Scripting Binding93
NIS93
Kerberos96
Kerberising Services102
Troubleshooting Kerberised Services105
Directory Services Preferences110
Summary111
Chapter 3 Active Directory112
Binding to Active Directory114
Directory Utility114
Testing Your Connection119
Testing Authentication123
Testing Authentication at the