Edge / Smith / Hunter | Enterprise Mac Administrators Guide | E-Book | www.sack.de
E-Book

E-Book, Englisch, 500 Seiten

Edge / Smith / Hunter Enterprise Mac Administrators Guide


1. ed
ISBN: 978-1-4302-2444-0
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 500 Seiten

ISBN: 978-1-4302-2444-0
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark



Charles Edge, Zack Smith, and Beau Hunter provide detailed explanations of the technology required for large-scale Mac OS X deployments and show you how to integrate it with other operating systems and applications. Enterprise Mac Administrator's Guide addresses the growing size and spread of Mac OS X deployments in corporations and institutions worldwide. In some cases, this is due to the growth of traditional Mac environments, but for the most part it has to do with 'switcher' campaigns, where Windows and/or Linux environments are migrating to Mac OS X. However, there is a steep culture shock with these types of migrations. The products that are used are different, the nomenclature is different, and most importantly the best practices for dealing with the operating system are different. Apple provides a number of tools to help automate and guide IT toward managing a large number of Mac OS X computers-it has since before Mac OS X was initially released. However, if you want to put together all of the pieces to tell a compelling story about how to run an IT department or a deployment of Macs, you need to compile information from a number of different sources. This book will provide explanations of the technology required. Provides complete solutions for the large- and medium-scale integration of directory services, imaging, and security Complete guide for integrating Macs and Mac OS X into mixed environments with confidence and no down time One-stop volume for IT professionals who need the technical details to get their job done as efficiently and effectively as possible

Charles Edge has been working with Apple products since he was a child. Professionally, Charles started with the Mac OS and Apple server offerings in 1999 after years working with various flavors of Unix. Charles began his consulting career working with Support Technologies and Andersen Consulting. In 2000, he found a new home at 318, Inc., a consulting firm in Santa Monica, California which is now the largest Mac consultancy in the country. At 318, Charles leads a team of over 40 engineers and has worked with network architecture, security and storage for various vertical and horizontal markets. Charles has spoken at a variety of conferences including DefCon, BlackHat, LinuxWorld, MacWorld and the WorldWide Developers Conference. Charles' first book, Mac Tiger Server Little Black Book, can be purchased through Paraglyph Press. Charles recently hung up his surfboard and moved to Minneapolis, Minnesota, with his wife, Lisa. Charles can be contacted at krypted@mac.com.

Edge / Smith / Hunter Enterprise Mac Administrators Guide jetzt bestellen!

Weitere Infos & Material


1;Contents at a Glance;5
2;Table of Contents ;6
3;About the Authors;15
4;About the Technical Reviewers;16
5;Acknowledgments;17
6;Introduction;18
6.1;Paradigm Shifts;18
6.2;Measure Twice, Cut Once;19
6.3;Application Availability;19
6.4;How This Book Is Organized;20
6.5;Chaos Theory;21
7;Chapter 1 Directory Services;22
7.1;Local Accounts;23
7.1.1;Creating Accounts;24
7.1.2;Granting Administrative Privileges;25
7.1.3;The Root Account;27
7.1.4;How the Local Directory Service Works;29
7.1.4.1;dscl;32
7.1.4.2;Changing Accounts En Masse;35
7.1.4.3;Account Creation Scripts;36
7.1.4.4;Parachuting Accounts into Clients;36
7.1.4.5;Hiding Administrative Accounts;37
7.1.4.6;Raw Mode;38
7.1.5;Set Search Paths;39
7.1.6;Create Additional Local Directory Nodes;39
7.2;External Accounts;40
7.3;Open Directory;41
7.3.1;LDAP;41
7.3.2;Kerberos;42
7.3.3;Setting up Open Directory Using Server Admin;45
7.3.4;Setting up Open Directory from the Command Line;49
7.3.4.1;Demoting an Open Directory Master;50
7.3.5;Set up an Open Directory Replica;50
7.3.5.1;Removing a Replica;51
7.3.6;Using Workgroup Manager to Create New Users;51
7.3.6.1;Backing up Open Directory;54
7.4;Troubleshooting Directory Services;56
7.4.1;Directory Services Debug Logs;56
7.4.2;Cache;56
7.4.3;Verifying Authentication;57
7.5;Summary;58
8;Chapter 2 Directory Services Clients;60
8.1;The Lay of the Land;61
8.2;Basic Binding;67
8.2.1;Plug-ins;68
8.2.2;Unauthenticated Dynamic Binding;70
8.2.3;Unauthenticated Static Binding;72
8.2.4;Trusted Static Binding;76
8.2.5;Pushing Out SSL Certificates;78
8.2.6;Custom LDAP Settings;82
8.2.7;Managing the Search Policy;88
8.2.8;Binding with the Command Line;91
8.2.9;Scripting Binding;93
8.3;NIS;93
8.4;Kerberos;96
8.4.1;Kerberising Services;102
8.4.2;Troubleshooting Kerberised Services;105
8.5;Directory Services Preferences;110
8.6;Summary;111
9;Chapter 3 Active Directory;112
9.1;Binding to Active Directory;114
9.1.1;Directory Utility;114
9.1.1.1;Testing Your Connection;119
9.1.1.2;Testing Authentication;123
9.1.1.3;Testing Authentication at the Login Window;124
9.1.2;Home Directories and the Apple Active Directory Plug-in;125
9.1.2.1;DNS Concerns;126
9.2;Bind to AD;127
9.2.1;Naming Conventions and Scripting Automated Binding;129
9.2.2;Map UID and GID;132
9.2.3;Namespace Support Using dsconfigad;133
9.2.4;Active Directory Packet Encryption Options;133
9.3;Dual Directory;134
9.3.1;Nesting;136
9.3.2;MCX via Dual Directory;137
9.3.3;MCX via Active Directory;140
9.3.4;Configuring AD Admin Groups;143
9.3.5;Nesting Administrators in the Local Admin Group;144
9.4;Third-Party Solutions;145
9.4.1;Centrify’s DirectControl;145
9.4.1.1;DirectControl Installation;145
9.4.1.2;Configuring DirectControl;148
9.4.1.3;Using DirectControl;152
9.4.2;Likewise;154
9.4.3;Likewise Enterprise;155
9.4.4;Thursby ADmitMac;155
9.4.5;Quest;156
9.5;Summary;159
10;Chapter 4 Storage;161
10.1;Client Storage;161
10.1.1;AFP;162
10.1.2;SMB;164
10.1.3;NFS;165
10.1.4;Automounts;166
10.1.5;Home-Directory Storage Provisioning;169
10.2;SAN Storage;169
10.2.1;Xsan;170
10.2.1.1;Cabling and Transceivers;170
10.2.1.2;Storage;171
10.2.1.3;Virtualized Storage;172
10.2.1.4;Initiators;172
10.2.1.5;Switches;173
10.2.1.5.1;Brocade Switches;175
10.2.1.5.2;Emulex Switches;175
10.2.1.5.3;QLogic Switches;175
10.2.1.5.4;Cisco Switches;175
10.2.1.6;Zones;175
10.2.2;Configuring Storage;176
10.2.2.1;Promise Vtrak;177
10.2.2.2;Xserve RAID;178
10.2.3;Configuring Ethernet;183
10.2.4;Setting up the Xsan;184
10.2.5;Installation;184
10.2.6;Creating a Volume;189
10.2.6.1;Adding a Computer;197
10.2.7;Resharing the Volume;197
10.2.7.1;Xsan Block Sizes;198
10.2.7.2;AFP Tuning;198
10.2.7.3;Tickle Times;199
10.2.8;Using Third-Party Clients;200
10.2.8.1;Installing Linux Clients;200
10.2.8.2;Windows Clients;201
10.2.9;Xsan Management;203
10.2.9.1;Reinstalling the Software;203
10.2.10;Upgrades to your Xsan;203
10.2.10.1;Operating System Upgrades;204
10.2.11;Upgrading the Volume;204
10.2.11.1;Changing IP Addresses;206
10.2.12;Common Xsan Repair and Troubleshooting Procedures;207
10.2.12.1;Resetting Xsan Client settings;207
10.2.12.2;Rebuilding an Array on an Xserve RAID;207
10.2.12.3;Rebuilding an Array on a Promise RAID;207
10.2.12.4;Latency;208
10.2.12.5;Schedules;209
10.2.13;Fragmentation;209
10.2.14;Backup;210
10.2.15;The Xsan Command Line;210
10.2.15.1;Fibreconfig;211
10.2.15.2;Labeling LUNs;212
10.2.15.3;cvadmin;213
10.2.15.4;Repairing Volumes;215
10.2.15.5;Other Commands;215
10.3;iSCSI;216
10.4;ExtremeZ-IP;222
10.4.1;Setting up AFP in ExtremeZ-IP;222
10.4.2;Configuring ExtremeZ-IP;224
10.4.3;Setting up DFS in ExtremeZ-IP;227
10.5;Managing Filesystem Permissions in OS X;227
10.5.1;POSIX-Based Permissions;227
10.5.2;Access Control Lists;230
10.5.2.1;Administration;232
10.5.2.2;Read Permissions;232
10.5.2.3;Write Permissions;232
10.5.2.4;Inheritance;233
10.5.3;Using chown and chmod to manage permissions;234
10.6;.DS_Store Files;235
10.7;Summary;236
11;Chapter 5 Messaging andGroupware ;238
11.1;Exchange Integration;239
11.1.1;Entourage;239
11.1.1.1;Paths;240
11.1.1.2;Troubleshooting Exchange 2007 Virtual Directories;241
11.1.1.3;Entourage Setup;242
11.1.1.4;Automatic Client Configuration;249
11.1.1.5;Deploying the Package;250
11.1.1.6;Custom Package Installation;250
11.1.1.7;Account Setup;252
11.1.1.8;Postflight Tasks;252
11.1.1.9;AutoUpdate;253
11.1.1.10;Disable Sync Services;254
11.1.1.11;Archiving Mail;254
11.1.2;Native Groupware Support;255
11.1.2.1;Manual Setup;255
11.2;GroupWise and Lotus Notes;260
11.3;iCal Server;260
11.3.1;Setting up iCal Server;260
11.3.2;Managing Calendars;265
11.3.3;Delegating Access;269
11.3.4;Backing up Calendars;270
11.3.5;Clustering CalDAV;270
11.3.6;Wiki Integration;271
11.3.7;Troubleshooting;271
11.4;Address Book Server;273
11.4.1;Setting up Address Book Server;273
11.4.2;Connecting to the Address Book Server;277
11.4.3;Backing up Address Books;280
11.5;Instant Messaging;280
11.5.1;Solutions;280
11.5.2;Microsoft Messenger;280
11.5.3;iChat Server;281
11.5.3.1;Transcripts;282
11.5.3.2;Archiving Transcripts via iChat;284
11.5.3.3;Autobuddy;285
11.6;Mac OS X Mail Server;286
11.6.1;Setting up a Mail Server;286
11.6.2;Configuring Mail with ServerAdmin;287
11.6.3;Protecting the Mail Servers;290
11.6.3.1;Mailing Lists;295
11.6.3.2;Logging;295
11.6.3.3;The Command Line;296
11.6.4;Choosing Mailbox Locations;297
11.6.5;The Dovecot Mailstore;298
11.6.6;Setting up Public folders;300
11.6.7;Backing up Mail;300
11.6.8;Clustering Mail Services;301
11.7;Leveraging Push Notification;304
11.8;Summary;305
11.9;Further Reading;305
12;Chapter 6 Mass Deployment;306
12.1;Planning Your Mass Deployment;307
12.1.1;Monolithic vs. Package-Based Imaging;309
12.1.2;Automation;312
12.2;Image Delivery;313
12.2.1;Creating an Image;313
12.2.2;Creating an Image from the Command Line;316
12.2.3;Operating System Packaging with Composer;320
12.2.4;Bare-Metal Images;321
12.3;Deploying Images;321
12.3.1;Restoring with Disk Utility;322
12.3.2;Using Apple Software Restore;324
12.3.3;NetInstall;326
12.3.3.1;Boot Modifier Keys;330
12.3.3.2;Bless;331
12.3.4;Apple’s NetRestore;333
12.3.5;DeployStudio;336
12.3.6;Other Third-Party Solutions;348
12.3.7;Casper Suite;349
12.4;Automation;349
12.4.1;Types of Automations;349
12.4.2;User Templates;351
12.4.3;Migrating from Monolithic Images;351
12.4.4;Custom Packages with Composer;352
12.4.5;InstallEase and Iceberg;356
12.4.6;FileWave;356
12.4.7;PackageMaker;357
12.4.8;Negative Packages;361
12.4.9;Installing a Package;363
12.4.10;Package Scripts;363
12.4.11;Customizing Prebuilt Packages;364
12.4.12;Customizing OS X Preferences;365
12.4.13;PlistBuddy;369
12.4.13.1;When Not to Use PlistBuddy;371
12.4.14;Defaults;366
12.4.14.1;When Not to Use Defaults;368
12.4.15;PlistBuddy;369
12.4.15.1;When Not to Use PlistBuddy;371
12.5;Image Regression Testing;371
12.6;Summary;372
13;Chapter 7 Client Management;374
13.1;Managed Preferences;375
13.1.1;Preference Interactions;377
13.1.2;Utilizing Tiered Management;379
13.2;Managed Preferences in Action;380
13.2.1;Preference Manifests and Custom Preferences;380
13.2.2;Setting MCX from the Command Line;382
13.2.3;Automated Client Setup;383
13.2.3.1;Mail;383
13.2.3.2;iCal;385
13.2.3.3;Address Book;386
13.2.3.4;Application Preferences;387
13.2.3.5;Deploying Proxy Settings via a PAC File;390
13.2.3.6;Network Printing;391
13.2.3.7;Restricting Applications;394
13.2.3.8;Computer Access Filters;397
13.2.3.9;Common Tasks;399
13.2.4;Troubleshooting and Testing;402
13.3;User Home Folders;404
13.3.1;Local Home Folders;404
13.3.1.1;Local Home Folder Configuration;407
13.3.1.1.1;No Directory Services;408
13.3.1.1.2;Open Directory;408
13.3.1.1.3;Active Directory;410
13.3.1.1.4;Third Party LDAP Directory;410
13.3.2;Network Home Folders;410
13.3.2.1;Redirection;412
13.3.2.2;Network Home Folder Configuration;417
13.3.2.2.1;Open Directory;417
13.3.3;Home Directory Syncing;420
13.3.3.1;Troubleshooting Syncing Issues;425
13.4;Password Policies;426
13.4.1;Password Changes at Loginwindow;428
13.4.2;Managing Keychains;429
13.5;Apple Remote Desktop;430
13.5.1;Scanning Networks with ARD;431
13.5.2;Controlling machines;431
13.5.3;Sending Commands, Packages, and Scripts;432
13.5.4;Enabling Directory Service groups;434
13.5.5;Enabling Directory-Based Administrator Groups;435
13.6;Quota Management;436
13.7;Login Hooks;437
13.8;Software Update Server;439
13.9;Further Reading;441
14;Chapter 8 AutomatingAdministrative Tasks;442
14.1;The Basics;443
14.2;Scripting the Bash Shell;447
14.2.1;Declaring Variables;448
14.2.2;Variable Mangling;450
14.2.3;Standard Streams and Pipelines;452
14.2.4;If and Case Statements;453
14.2.5;For, While, and Until Statements;457
14.2.6;Arrays;459
14.2.7;Exit Codes;460
14.2.8;Constructing a Shell Script;461
14.2.8.1;Passing Arguments to Shell Scripts;465
14.2.9;Scheduling Automations;466
14.2.9.1;launchd;466
14.2.9.2;cron;468
14.2.9.3;Daily, Weekly & Monthly Scripts;469
14.2.10;Triggered Automations;470
14.2.11;Self-Destructing Scripts;471
14.3;Automating User Creation from a Third-Party Database;472
14.4;Logging;477
14.4.1;Working with Date and Time;478
14.5;Automating System Tasks;479
14.5.1;Configuring Local Administrative Permissions;479
14.5.2;Allow Local Users to Manage Printers;483
14.5.2.1;Home Folder Permission Maintenance;484
14.5.2.2;Enabling the Software Firewall;491
14.5.3;Managing Items in ARD;494
14.5.4;Disk Utilization;494
14.5.5;Network Setup;495
14.5.6;Power Management;500
14.5.7;ServerAdmin Backups and Change Monitoring;502
14.5.8;Xserve Lights-Out Management;506
14.6;Troubleshooting;507
14.7;Further Reading;509
15;Chapter 9 Virtualization;511
15.1;Boot C512
15.2;Thin Clients;513
15.3;VMware;513
15.3.1;VMware Fusion in Monolithic Imaging;514
15.3.2;VMware Fusion with a Package-Based Deployment;519
15.4;Virtual Machines;521
15.4.1;Preparing the Virtual Machine for Mass Deployment;523
15.4.2;Virtual Machine Deployment;524
15.4.2.1;Populating the Virtual Machine List;528
15.4.3;Parallels;529
15.4.3.1;Parallels on a Monolithic Image;530
15.4.3.2;Virtual Machine Deployment;532
15.4.3.3;Automating the Parallels Installation;537
15.4.3.4;Automated Virtual Machine Deployment;538
15.4.4;Managing Windows;539
15.4.4.1;Sysprep;539
15.4.4.2;Configuration Management;543
15.4.4.3;Policies and Open Directory;545
15.4.4.3.1;Computer Configurations;546
15.4.4.3.2;User Configurations;547
15.4.4.3.3;Other Virtualization Solutions;547
15.4.5;Wine;547
15.4.6;Managing VMs and Boot camp Through GPOs;548
15.4.7;AntiVirus;550
15.4.8;Further Resources;550
16;Chapter 10 iPhone;552
16.1;The iPhone Simulator;553
16.2;Email;554
16.2.1;IMAP, POP, and SMTP;555
16.2.2;Setting Up the Exchange Client;557
16.3;Installing Certificates;559
16.4;Network Connections;561
16.5;Leveraging the Web Browser;563
16.6;Citrix;563
16.7;iPhone Configuration Utility;565
16.7.1;Building Configurations;565
16.7.2;Deploying Configurations;581
16.7.2.1;Importing and Exporting Profiles;584
16.8;The App Store;586
16.9;KACE;587
16.10;Managing iTunes;588
16.11;Troubleshooting;589
16.11.1;Updates;590
16.11.2;Leveraging the Logs;591
16.11.3;Backup and Restoration;591
16.11.4;Bypassing the Passcode;593
16.12;Further Reading;593
17;Index;594



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.