[Users] oVirt 3.2.2 successfully connected to Samba4

Hello, in the past there were some threads related to this subject. Today I successfully connected my oVirt 3.2.2 (installed on f18 with ovirt-repo) to a CentOS 6 samba4 server. Basically I followed this nice page for CentOS 6 with the difference that I downloaded and compiled 4.0.6 version of Samba instead of 4.0.0: http://opentodo.net/2013/01/samba4-as-ad-domain-controller-on-centos-6/ One important thing is that I had to put samba4 server ip in resolv.conf as the first for my engine. But in my case this was not a problem because samba4 is then configured with the original corporate dns as forwarder, so all is ok for me Some commands' output [root@c6dc samba-4.0.6]# /usr/local/samba/bin/samba-tool domain provision --realm=ovtest.local --domain=OVTEST --adminpass 'XXXXXXXXX' --server-role=dc --dns-backend=BIND9_DLZ Looking up IPv4 addresses Looking up IPv6 addresses No IPv6 address will be assigned Setting up secrets.ldb Setting up the registry Setting up the privileges database Setting up idmap db Setting up SAM db Setting up sam.ldb partitions and settings Setting up sam.ldb rootDSE Pre-loading the Samba 4 and AD schema Adding DomainDN: DC=ovtest,DC=local Adding configuration container Setting up sam.ldb schema Setting up sam.ldb configuration data Setting up display specifiers Modifying display specifiers Adding users container Modifying users container Adding computers container Modifying computers container Setting up sam.ldb data Setting up well known security principals Setting up sam.ldb users and groups Setting up self join Adding DNS accounts Creating CN=MicrosoftDNS,CN=System,DC=ovtest,DC=local Creating DomainDnsZones and ForestDnsZones partitions Populating DomainDnsZones and ForestDnsZones partitions See /usr/local/samba/private/named.conf for an example configuration include file for BIND and /usr/local/samba/private/named.txt for further documentation required for secure DNS updates Setting up sam.ldb rootDSE marking as synchronized Fixing provision GUIDs A Kerberos configuration suitable for Samba 4 has been generated at /usr/local/samba/private/krb5.conf Once the above files are installed, your Samba4 server will be ready to use Server Role: active directory domain controller Hostname: c6dc NetBIOS Domain: OVTEST DNS Domain: ovtest.local DOMAIN SID: S-1-5-21-4186344073-955232896-1764362378 [root@c6dc samba-4.0.6]# rndc-confgen -a -r /dev/urandom wrote key file "/etc/rndc.key" - tests (see also http://www.alexwyn.com/computer-tips/centos-samba4-active-directory-domain-c...) [root@c6dc ]# /usr/local/samba/bin/smbclient -L localhost -U% Domain=[OVTEST] OS=[Unix] Server=[Samba 4.0.6] Sharename Type Comment --------- ---- ------- netlogon Disk sysvol Disk IPC$ IPC IPC Service (Samba 4.0.6) Domain=[OVTEST] OS=[Unix] Server=[Samba 4.0.6] Server Comment --------- ------- Workgroup Master --------- ------- [root@c6dc ntp-4.2.6p5]# host -t SRV _ldap._tcp.ovtest.local. _ldap._tcp.ovtest.local has SRV record 0 100 389 c6dc.ovtest.local. [root@c6dc ntp-4.2.6p5]# host -t SRV _kerberos._udp.ovtest.local. _kerberos._udp.ovtest.local has SRV record 0 100 88 c6dc.ovtest.local. [root@c6dc ntp-4.2.6p5]# kinit administrator@OVTEST.LOCAL Password for administrator@OVTEST.LOCAL: Warning: Your password will expire in 41 days on Fri Aug 9 13:30:59 2013 [root@c6dc ntp-4.2.6p5]# klist Ticket cache: FILE:/tmp/krb5cc_0 Default principal: administrator@OVTEST.LOCAL Valid starting Expires Service principal 06/28/13 14:55:11 06/29/13 00:55:11 krbtgt/OVTEST.LOCAL@OVTEST.LOCAL renew until 07/05/13 14:55:08 Users' mgmt can be done from windows with Samba AD management tools see: http://wiki.samba.org/index.php/Samba_AD_management_from_windows I managed from linux see: http://wiki.samba.org/index.php/Adding_users_with_samba_tool [root@c6dc ntp-4.2.6p5]# /usr/local/samba/bin/samba-tool user add OVIRTADM New Password: Retype Password: User 'OVIRTADM' created successfully [root@c6dc ntp-4.2.6p5]# /usr/local/samba/bin/wbinfo --name-to-sid OVIRTADM S-1-5-21-4186344073-955232896-1764362378-1104 SID_USER (1) [root@c6dc ntp-4.2.6p5]# /usr/local/samba/bin/wbinfo --sid-to-uid S-1-5-21-4186344073-955232896-1764362378-1104 3000016 I missed givenName and sn in user creation.... Unfortunately there is a only proposed patch for an "edit" subcommand but is not inside yet. http://samba.2283325.n4.nabble.com/Patch-for-samba-tool-user-modify-subcomma... See also: https://wiki.samba.org/index.php/Samba4/LDBIntro To modify users' attributes I used this: [root@c6dc ntp-4.2.6p5]# /usr/local/samba/bin/ldbedit -e vi -H /usr/local/samba/private/idmap.ldb objectsid=S-1-5-21-4186344073-955232896-1764362378-1104 here you enter into a vi session.... # editing 1 records # record 1 dn: CN=S-1-5-21-4186344073-955232896-1764362378-1104 cn: S-1-5-21-4186344073-955232896-1764362378-1104 objectClass: sidMap objectSid: S-1-5-21-4186344073-955232896-1764362378-1104 type: ID_TYPE_BOTH xidNumber: 3000016 givenName: oVirt <---- added sn: Admin <---- added distinguishedName: CN=S-1-5-21-4186344073-955232896-1764362378-1104 [root@c6dc ntp-4.2.6p5]# kinit ovirtadm@OVTEST.LOCAL Password for ovirtadm@OVTEST.LOCAL: Warning: Your password will expire in 41 days on Fri Aug 9 15:05:45 2013 [root@c6dc ntp-4.2.6p5]# klist Ticket cache: FILE:/tmp/krb5cc_0 Default principal: ovirtadm@OVTEST.LOCAL Valid starting Expires Service principal 06/28/13 15:12:30 06/29/13 01:12:30 krbtgt/OVTEST.LOCAL@OVTEST.LOCAL renew until 07/05/13 15:12:27 Without putting samba4 ip in resolv.conf of engine I got this error [root@f18engine ~]# engine-manage-domains -action=add -domain='OVTEST.LOCAL' -provider=ActiveDirectory -user='ovirtadm' -interactive No LDAP servers can be obtained for domain ovtest.local Now [root@f18engine ~]# engine-manage-domains -action=add -domain='OVTEST.LOCAL' -provider=ActiveDirectory -user='ovirtadm' -interactive Enter password: The domain ovtest.local has been added to the engine as an authentication source but no users from that domain have been granted permissions within the oVirt Manager. Users from this domain can be granted permissions from the Web administration interface. oVirt Engine restart is required in order for the changes to take place (service ovirt-engine restart). Manage Domains completed successfully restart engine with systemctl restart ovirt-engine Then I added the user to ovirt in webadmin gui: Configure --> System Permissions --> Add Selected ovirtadm and its domain ovtest.local and give him SuperUser role Tried to successfully connect to Webadmin Gui and create one VM as a test HIH others. I'm going to see if this works with VMware too.... Gianluca

Excellent, Gianluca, thanks for sharing the information! --Charlie On Fri, Jun 28, 2013 at 10:19 AM, Gianluca Cecchi <gianluca.cecchi@gmail.com
wrote:
Hello, in the past there were some threads related to this subject. Today I successfully connected my oVirt 3.2.2 (installed on f18 with ovirt-repo) to a CentOS 6 samba4 server.
Basically I followed this nice page for CentOS 6 with the difference that I downloaded and compiled 4.0.6 version of Samba instead of 4.0.0:
http://opentodo.net/2013/01/samba4-as-ad-domain-controller-on-centos-6/
One important thing is that I had to put samba4 server ip in resolv.conf as the first for my engine. But in my case this was not a problem because samba4 is then configured with the original corporate dns as forwarder, so all is ok for me
Some commands' output
[root@c6dc samba-4.0.6]# /usr/local/samba/bin/samba-tool domain provision --realm=ovtest.local --domain=OVTEST --adminpass 'XXXXXXXXX' --server-role=dc --dns-backend=BIND9_DLZ Looking up IPv4 addresses Looking up IPv6 addresses No IPv6 address will be assigned Setting up secrets.ldb Setting up the registry Setting up the privileges database Setting up idmap db Setting up SAM db Setting up sam.ldb partitions and settings Setting up sam.ldb rootDSE Pre-loading the Samba 4 and AD schema Adding DomainDN: DC=ovtest,DC=local Adding configuration container Setting up sam.ldb schema Setting up sam.ldb configuration data Setting up display specifiers Modifying display specifiers Adding users container Modifying users container Adding computers container Modifying computers container Setting up sam.ldb data Setting up well known security principals Setting up sam.ldb users and groups Setting up self join Adding DNS accounts Creating CN=MicrosoftDNS,CN=System,DC=ovtest,DC=local Creating DomainDnsZones and ForestDnsZones partitions Populating DomainDnsZones and ForestDnsZones partitions See /usr/local/samba/private/named.conf for an example configuration include file for BIND and /usr/local/samba/private/named.txt for further documentation required for secure DNS updates Setting up sam.ldb rootDSE marking as synchronized Fixing provision GUIDs A Kerberos configuration suitable for Samba 4 has been generated at /usr/local/samba/private/krb5.conf Once the above files are installed, your Samba4 server will be ready to use Server Role: active directory domain controller Hostname: c6dc NetBIOS Domain: OVTEST DNS Domain: ovtest.local DOMAIN SID: S-1-5-21-4186344073-955232896-1764362378
[root@c6dc samba-4.0.6]# rndc-confgen -a -r /dev/urandom wrote key file "/etc/rndc.key"
- tests (see also http://www.alexwyn.com/computer-tips/centos-samba4-active-directory-domain-c... )
[root@c6dc ]# /usr/local/samba/bin/smbclient -L localhost -U% Domain=[OVTEST] OS=[Unix] Server=[Samba 4.0.6]
Sharename Type Comment --------- ---- ------- netlogon Disk sysvol Disk IPC$ IPC IPC Service (Samba 4.0.6) Domain=[OVTEST] OS=[Unix] Server=[Samba 4.0.6]
Server Comment --------- -------
Workgroup Master --------- -------
[root@c6dc ntp-4.2.6p5]# host -t SRV _ldap._tcp.ovtest.local. _ldap._tcp.ovtest.local has SRV record 0 100 389 c6dc.ovtest.local.
[root@c6dc ntp-4.2.6p5]# host -t SRV _kerberos._udp.ovtest.local. _kerberos._udp.ovtest.local has SRV record 0 100 88 c6dc.ovtest.local.
[root@c6dc ntp-4.2.6p5]# kinit administrator@OVTEST.LOCAL Password for administrator@OVTEST.LOCAL: Warning: Your password will expire in 41 days on Fri Aug 9 13:30:59 2013
[root@c6dc ntp-4.2.6p5]# klist Ticket cache: FILE:/tmp/krb5cc_0 Default principal: administrator@OVTEST.LOCAL
Valid starting Expires Service principal 06/28/13 14:55:11 06/29/13 00:55:11 krbtgt/OVTEST.LOCAL@OVTEST.LOCAL renew until 07/05/13 14:55:08
Users' mgmt can be done from windows with Samba AD management tools see: http://wiki.samba.org/index.php/Samba_AD_management_from_windows
I managed from linux see: http://wiki.samba.org/index.php/Adding_users_with_samba_tool
[root@c6dc ntp-4.2.6p5]# /usr/local/samba/bin/samba-tool user add OVIRTADM New Password: Retype Password: User 'OVIRTADM' created successfully
[root@c6dc ntp-4.2.6p5]# /usr/local/samba/bin/wbinfo --name-to-sid OVIRTADM S-1-5-21-4186344073-955232896-1764362378-1104 SID_USER (1)
[root@c6dc ntp-4.2.6p5]# /usr/local/samba/bin/wbinfo --sid-to-uid S-1-5-21-4186344073-955232896-1764362378-1104 3000016
I missed givenName and sn in user creation.... Unfortunately there is a only proposed patch for an "edit" subcommand but is not inside yet.
http://samba.2283325.n4.nabble.com/Patch-for-samba-tool-user-modify-subcomma...
See also: https://wiki.samba.org/index.php/Samba4/LDBIntro
To modify users' attributes I used this: [root@c6dc ntp-4.2.6p5]# /usr/local/samba/bin/ldbedit -e vi -H /usr/local/samba/private/idmap.ldb objectsid=S-1-5-21-4186344073-955232896-1764362378-1104
here you enter into a vi session....
# editing 1 records # record 1 dn: CN=S-1-5-21-4186344073-955232896-1764362378-1104 cn: S-1-5-21-4186344073-955232896-1764362378-1104 objectClass: sidMap objectSid: S-1-5-21-4186344073-955232896-1764362378-1104 type: ID_TYPE_BOTH xidNumber: 3000016 givenName: oVirt <---- added sn: Admin <---- added distinguishedName: CN=S-1-5-21-4186344073-955232896-1764362378-1104
[root@c6dc ntp-4.2.6p5]# kinit ovirtadm@OVTEST.LOCAL Password for ovirtadm@OVTEST.LOCAL: Warning: Your password will expire in 41 days on Fri Aug 9 15:05:45 2013
[root@c6dc ntp-4.2.6p5]# klist Ticket cache: FILE:/tmp/krb5cc_0 Default principal: ovirtadm@OVTEST.LOCAL
Valid starting Expires Service principal 06/28/13 15:12:30 06/29/13 01:12:30 krbtgt/OVTEST.LOCAL@OVTEST.LOCAL renew until 07/05/13 15:12:27
Without putting samba4 ip in resolv.conf of engine I got this error
[root@f18engine ~]# engine-manage-domains -action=add -domain='OVTEST.LOCAL' -provider=ActiveDirectory -user='ovirtadm' -interactive No LDAP servers can be obtained for domain ovtest.local
Now [root@f18engine ~]# engine-manage-domains -action=add -domain='OVTEST.LOCAL' -provider=ActiveDirectory -user='ovirtadm' -interactive Enter password:
The domain ovtest.local has been added to the engine as an authentication source but no users from that domain have been granted permissions within the oVirt Manager. Users from this domain can be granted permissions from the Web administration interface. oVirt Engine restart is required in order for the changes to take place (service ovirt-engine restart). Manage Domains completed successfully
restart engine with
systemctl restart ovirt-engine
Then I added the user to ovirt in webadmin gui:
Configure --> System Permissions --> Add Selected ovirtadm and its domain ovtest.local and give him SuperUser role
Tried to successfully connect to Webadmin Gui and create one VM as a test
HIH others.
I'm going to see if this works with VMware too....
Gianluca _______________________________________________ Users mailing list Users@ovirt.org http://lists.ovirt.org/mailman/listinfo/users

Hello everybody, Thanks Gianluca for share your experience. I have now installed and configured a Samba 4.0.6 over Debian 7 Stable distro and I'm in the step of importing all my users from my production OpenLDAP + Samba 3 server to this new server which it's now working. After that I want join it to my oVirt engine. I will share too my experience when I have the system all working. Thanks again, Juanjo. On Fri, Jun 28, 2013 at 4:44 PM, Charlie <medievalist@gmail.com> wrote:
Excellent, Gianluca, thanks for sharing the information! --Charlie
On Fri, Jun 28, 2013 at 10:19 AM, Gianluca Cecchi < gianluca.cecchi@gmail.com> wrote:
Hello, in the past there were some threads related to this subject. Today I successfully connected my oVirt 3.2.2 (installed on f18 with ovirt-repo) to a CentOS 6 samba4 server.
Basically I followed this nice page for CentOS 6 with the difference that I downloaded and compiled 4.0.6 version of Samba instead of 4.0.0:
http://opentodo.net/2013/01/samba4-as-ad-domain-controller-on-centos-6/
One important thing is that I had to put samba4 server ip in resolv.conf as the first for my engine. But in my case this was not a problem because samba4 is then configured with the original corporate dns as forwarder, so all is ok for me
Some commands' output
[root@c6dc samba-4.0.6]# /usr/local/samba/bin/samba-tool domain provision --realm=ovtest.local --domain=OVTEST --adminpass 'XXXXXXXXX' --server-role=dc --dns-backend=BIND9_DLZ Looking up IPv4 addresses Looking up IPv6 addresses No IPv6 address will be assigned Setting up secrets.ldb Setting up the registry Setting up the privileges database Setting up idmap db Setting up SAM db Setting up sam.ldb partitions and settings Setting up sam.ldb rootDSE Pre-loading the Samba 4 and AD schema Adding DomainDN: DC=ovtest,DC=local Adding configuration container Setting up sam.ldb schema Setting up sam.ldb configuration data Setting up display specifiers Modifying display specifiers Adding users container Modifying users container Adding computers container Modifying computers container Setting up sam.ldb data Setting up well known security principals Setting up sam.ldb users and groups Setting up self join Adding DNS accounts Creating CN=MicrosoftDNS,CN=System,DC=ovtest,DC=local Creating DomainDnsZones and ForestDnsZones partitions Populating DomainDnsZones and ForestDnsZones partitions See /usr/local/samba/private/named.conf for an example configuration include file for BIND and /usr/local/samba/private/named.txt for further documentation required for secure DNS updates Setting up sam.ldb rootDSE marking as synchronized Fixing provision GUIDs A Kerberos configuration suitable for Samba 4 has been generated at /usr/local/samba/private/krb5.conf Once the above files are installed, your Samba4 server will be ready to use Server Role: active directory domain controller Hostname: c6dc NetBIOS Domain: OVTEST DNS Domain: ovtest.local DOMAIN SID: S-1-5-21-4186344073-955232896-1764362378
[root@c6dc samba-4.0.6]# rndc-confgen -a -r /dev/urandom wrote key file "/etc/rndc.key"
- tests (see also http://www.alexwyn.com/computer-tips/centos-samba4-active-directory-domain-c... )
[root@c6dc ]# /usr/local/samba/bin/smbclient -L localhost -U% Domain=[OVTEST] OS=[Unix] Server=[Samba 4.0.6]
Sharename Type Comment --------- ---- ------- netlogon Disk sysvol Disk IPC$ IPC IPC Service (Samba 4.0.6) Domain=[OVTEST] OS=[Unix] Server=[Samba 4.0.6]
Server Comment --------- -------
Workgroup Master --------- -------
[root@c6dc ntp-4.2.6p5]# host -t SRV _ldap._tcp.ovtest.local. _ldap._tcp.ovtest.local has SRV record 0 100 389 c6dc.ovtest.local.
[root@c6dc ntp-4.2.6p5]# host -t SRV _kerberos._udp.ovtest.local. _kerberos._udp.ovtest.local has SRV record 0 100 88 c6dc.ovtest.local.
[root@c6dc ntp-4.2.6p5]# kinit administrator@OVTEST.LOCAL Password for administrator@OVTEST.LOCAL: Warning: Your password will expire in 41 days on Fri Aug 9 13:30:59 2013
[root@c6dc ntp-4.2.6p5]# klist Ticket cache: FILE:/tmp/krb5cc_0 Default principal: administrator@OVTEST.LOCAL
Valid starting Expires Service principal 06/28/13 14:55:11 06/29/13 00:55:11 krbtgt/OVTEST.LOCAL@OVTEST.LOCAL renew until 07/05/13 14:55:08
Users' mgmt can be done from windows with Samba AD management tools see: http://wiki.samba.org/index.php/Samba_AD_management_from_windows
I managed from linux see: http://wiki.samba.org/index.php/Adding_users_with_samba_tool
[root@c6dc ntp-4.2.6p5]# /usr/local/samba/bin/samba-tool user add OVIRTADM New Password: Retype Password: User 'OVIRTADM' created successfully
[root@c6dc ntp-4.2.6p5]# /usr/local/samba/bin/wbinfo --name-to-sid OVIRTADM S-1-5-21-4186344073-955232896-1764362378-1104 SID_USER (1)
[root@c6dc ntp-4.2.6p5]# /usr/local/samba/bin/wbinfo --sid-to-uid S-1-5-21-4186344073-955232896-1764362378-1104 3000016
I missed givenName and sn in user creation.... Unfortunately there is a only proposed patch for an "edit" subcommand but is not inside yet.
http://samba.2283325.n4.nabble.com/Patch-for-samba-tool-user-modify-subcomma...
See also: https://wiki.samba.org/index.php/Samba4/LDBIntro
To modify users' attributes I used this: [root@c6dc ntp-4.2.6p5]# /usr/local/samba/bin/ldbedit -e vi -H /usr/local/samba/private/idmap.ldb objectsid=S-1-5-21-4186344073-955232896-1764362378-1104
here you enter into a vi session....
# editing 1 records # record 1 dn: CN=S-1-5-21-4186344073-955232896-1764362378-1104 cn: S-1-5-21-4186344073-955232896-1764362378-1104 objectClass: sidMap objectSid: S-1-5-21-4186344073-955232896-1764362378-1104 type: ID_TYPE_BOTH xidNumber: 3000016 givenName: oVirt <---- added sn: Admin <---- added distinguishedName: CN=S-1-5-21-4186344073-955232896-1764362378-1104
[root@c6dc ntp-4.2.6p5]# kinit ovirtadm@OVTEST.LOCAL Password for ovirtadm@OVTEST.LOCAL: Warning: Your password will expire in 41 days on Fri Aug 9 15:05:45 2013
[root@c6dc ntp-4.2.6p5]# klist Ticket cache: FILE:/tmp/krb5cc_0 Default principal: ovirtadm@OVTEST.LOCAL
Valid starting Expires Service principal 06/28/13 15:12:30 06/29/13 01:12:30 krbtgt/OVTEST.LOCAL@OVTEST.LOCAL renew until 07/05/13 15:12:27
Without putting samba4 ip in resolv.conf of engine I got this error
[root@f18engine ~]# engine-manage-domains -action=add -domain='OVTEST.LOCAL' -provider=ActiveDirectory -user='ovirtadm' -interactive No LDAP servers can be obtained for domain ovtest.local
Now [root@f18engine ~]# engine-manage-domains -action=add -domain='OVTEST.LOCAL' -provider=ActiveDirectory -user='ovirtadm' -interactive Enter password:
The domain ovtest.local has been added to the engine as an authentication source but no users from that domain have been granted permissions within the oVirt Manager. Users from this domain can be granted permissions from the Web administration interface. oVirt Engine restart is required in order for the changes to take place (service ovirt-engine restart). Manage Domains completed successfully
restart engine with
systemctl restart ovirt-engine
Then I added the user to ovirt in webadmin gui:
Configure --> System Permissions --> Add Selected ovirtadm and its domain ovtest.local and give him SuperUser role
Tried to successfully connect to Webadmin Gui and create one VM as a test
HIH others.
I'm going to see if this works with VMware too....
Gianluca _______________________________________________ Users mailing list Users@ovirt.org http://lists.ovirt.org/mailman/listinfo/users
_______________________________________________ Users mailing list Users@ovirt.org http://lists.ovirt.org/mailman/listinfo/users

Hello everybody, I can confirm also that after implement my Samba4 Active Directory emulation and add it to my engine it works fine. I can add users to my Samba4 and after that I can grant the permission in my engine webadmin portal and use my VMs. Now, as I told before I will try to create a process to import my OpenLDAP users to this Samba 4.0.6 to be able to use the ovirt by the students. Many thanks. Juanjo. On Mon, Jul 1, 2013 at 1:56 PM, Juan Jose <jj197005@gmail.com> wrote:
Hello everybody,
Thanks Gianluca for share your experience. I have now installed and configured a Samba 4.0.6 over Debian 7 Stable distro and I'm in the step of importing all my users from my production OpenLDAP + Samba 3 server to this new server which it's now working. After that I want join it to my oVirt engine. I will share too my experience when I have the system all working.
Thanks again,
Juanjo.
On Fri, Jun 28, 2013 at 4:44 PM, Charlie <medievalist@gmail.com> wrote:
Excellent, Gianluca, thanks for sharing the information! --Charlie
On Fri, Jun 28, 2013 at 10:19 AM, Gianluca Cecchi < gianluca.cecchi@gmail.com> wrote:
Hello, in the past there were some threads related to this subject. Today I successfully connected my oVirt 3.2.2 (installed on f18 with ovirt-repo) to a CentOS 6 samba4 server.
Basically I followed this nice page for CentOS 6 with the difference that I downloaded and compiled 4.0.6 version of Samba instead of 4.0.0:
http://opentodo.net/2013/01/samba4-as-ad-domain-controller-on-centos-6/
One important thing is that I had to put samba4 server ip in resolv.conf as the first for my engine. But in my case this was not a problem because samba4 is then configured with the original corporate dns as forwarder, so all is ok for me
Some commands' output
[root@c6dc samba-4.0.6]# /usr/local/samba/bin/samba-tool domain provision --realm=ovtest.local --domain=OVTEST --adminpass 'XXXXXXXXX' --server-role=dc --dns-backend=BIND9_DLZ Looking up IPv4 addresses Looking up IPv6 addresses No IPv6 address will be assigned Setting up secrets.ldb Setting up the registry Setting up the privileges database Setting up idmap db Setting up SAM db Setting up sam.ldb partitions and settings Setting up sam.ldb rootDSE Pre-loading the Samba 4 and AD schema Adding DomainDN: DC=ovtest,DC=local Adding configuration container Setting up sam.ldb schema Setting up sam.ldb configuration data Setting up display specifiers Modifying display specifiers Adding users container Modifying users container Adding computers container Modifying computers container Setting up sam.ldb data Setting up well known security principals Setting up sam.ldb users and groups Setting up self join Adding DNS accounts Creating CN=MicrosoftDNS,CN=System,DC=ovtest,DC=local Creating DomainDnsZones and ForestDnsZones partitions Populating DomainDnsZones and ForestDnsZones partitions See /usr/local/samba/private/named.conf for an example configuration include file for BIND and /usr/local/samba/private/named.txt for further documentation required for secure DNS updates Setting up sam.ldb rootDSE marking as synchronized Fixing provision GUIDs A Kerberos configuration suitable for Samba 4 has been generated at /usr/local/samba/private/krb5.conf Once the above files are installed, your Samba4 server will be ready to use Server Role: active directory domain controller Hostname: c6dc NetBIOS Domain: OVTEST DNS Domain: ovtest.local DOMAIN SID: S-1-5-21-4186344073-955232896-1764362378
[root@c6dc samba-4.0.6]# rndc-confgen -a -r /dev/urandom wrote key file "/etc/rndc.key"
- tests (see also http://www.alexwyn.com/computer-tips/centos-samba4-active-directory-domain-c... )
[root@c6dc ]# /usr/local/samba/bin/smbclient -L localhost -U% Domain=[OVTEST] OS=[Unix] Server=[Samba 4.0.6]
Sharename Type Comment --------- ---- ------- netlogon Disk sysvol Disk IPC$ IPC IPC Service (Samba 4.0.6) Domain=[OVTEST] OS=[Unix] Server=[Samba 4.0.6]
Server Comment --------- -------
Workgroup Master --------- -------
[root@c6dc ntp-4.2.6p5]# host -t SRV _ldap._tcp.ovtest.local. _ldap._tcp.ovtest.local has SRV record 0 100 389 c6dc.ovtest.local.
[root@c6dc ntp-4.2.6p5]# host -t SRV _kerberos._udp.ovtest.local. _kerberos._udp.ovtest.local has SRV record 0 100 88 c6dc.ovtest.local.
[root@c6dc ntp-4.2.6p5]# kinit administrator@OVTEST.LOCAL Password for administrator@OVTEST.LOCAL: Warning: Your password will expire in 41 days on Fri Aug 9 13:30:59 2013
[root@c6dc ntp-4.2.6p5]# klist Ticket cache: FILE:/tmp/krb5cc_0 Default principal: administrator@OVTEST.LOCAL
Valid starting Expires Service principal 06/28/13 14:55:11 06/29/13 00:55:11 krbtgt/OVTEST.LOCAL@OVTEST.LOCAL renew until 07/05/13 14:55:08
Users' mgmt can be done from windows with Samba AD management tools see: http://wiki.samba.org/index.php/Samba_AD_management_from_windows
I managed from linux see: http://wiki.samba.org/index.php/Adding_users_with_samba_tool
[root@c6dc ntp-4.2.6p5]# /usr/local/samba/bin/samba-tool user add OVIRTADM New Password: Retype Password: User 'OVIRTADM' created successfully
[root@c6dc ntp-4.2.6p5]# /usr/local/samba/bin/wbinfo --name-to-sid OVIRTADM S-1-5-21-4186344073-955232896-1764362378-1104 SID_USER (1)
[root@c6dc ntp-4.2.6p5]# /usr/local/samba/bin/wbinfo --sid-to-uid S-1-5-21-4186344073-955232896-1764362378-1104 3000016
I missed givenName and sn in user creation.... Unfortunately there is a only proposed patch for an "edit" subcommand but is not inside yet.
http://samba.2283325.n4.nabble.com/Patch-for-samba-tool-user-modify-subcomma...
See also: https://wiki.samba.org/index.php/Samba4/LDBIntro
To modify users' attributes I used this: [root@c6dc ntp-4.2.6p5]# /usr/local/samba/bin/ldbedit -e vi -H /usr/local/samba/private/idmap.ldb objectsid=S-1-5-21-4186344073-955232896-1764362378-1104
here you enter into a vi session....
# editing 1 records # record 1 dn: CN=S-1-5-21-4186344073-955232896-1764362378-1104 cn: S-1-5-21-4186344073-955232896-1764362378-1104 objectClass: sidMap objectSid: S-1-5-21-4186344073-955232896-1764362378-1104 type: ID_TYPE_BOTH xidNumber: 3000016 givenName: oVirt <---- added sn: Admin <---- added distinguishedName: CN=S-1-5-21-4186344073-955232896-1764362378-1104
[root@c6dc ntp-4.2.6p5]# kinit ovirtadm@OVTEST.LOCAL Password for ovirtadm@OVTEST.LOCAL: Warning: Your password will expire in 41 days on Fri Aug 9 15:05:45 2013
[root@c6dc ntp-4.2.6p5]# klist Ticket cache: FILE:/tmp/krb5cc_0 Default principal: ovirtadm@OVTEST.LOCAL
Valid starting Expires Service principal 06/28/13 15:12:30 06/29/13 01:12:30 krbtgt/OVTEST.LOCAL@OVTEST.LOCAL renew until 07/05/13 15:12:27
Without putting samba4 ip in resolv.conf of engine I got this error
[root@f18engine ~]# engine-manage-domains -action=add -domain='OVTEST.LOCAL' -provider=ActiveDirectory -user='ovirtadm' -interactive No LDAP servers can be obtained for domain ovtest.local
Now [root@f18engine ~]# engine-manage-domains -action=add -domain='OVTEST.LOCAL' -provider=ActiveDirectory -user='ovirtadm' -interactive Enter password:
The domain ovtest.local has been added to the engine as an authentication source but no users from that domain have been granted permissions within the oVirt Manager. Users from this domain can be granted permissions from the Web administration interface. oVirt Engine restart is required in order for the changes to take place (service ovirt-engine restart). Manage Domains completed successfully
restart engine with
systemctl restart ovirt-engine
Then I added the user to ovirt in webadmin gui:
Configure --> System Permissions --> Add Selected ovirtadm and its domain ovtest.local and give him SuperUser role
Tried to successfully connect to Webadmin Gui and create one VM as a test
HIH others.
I'm going to see if this works with VMware too....
Gianluca _______________________________________________ Users mailing list Users@ovirt.org http://lists.ovirt.org/mailman/listinfo/users
_______________________________________________ Users mailing list Users@ovirt.org http://lists.ovirt.org/mailman/listinfo/users

--_000_5F9E965F5A80BC468BE5F40576769F092E6EE955exchange21_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 SGkhDQoNCkkgY2FuIGFsc28gY29uZmlybSB0aGlzIHRvIGJlIHdvcmtpbmcuIEkgc2V0IHVwIGEg U0FNQkE0IERDIG9uIGEgZnJlZWJzZC1iYXNlZCBWTSBhbmQgaXMgc3VjY2Vzc2Z1bGx5IGNvbm5l Y3RlZCB0byBpdCBvbiBteSBleHBlcmltZW50YWwgb1ZpcnQtMy4xIGVuZ2luZS4gSnVzdCBGWUku DQoNCi9LYXJsaQ0KDQpmcmUgMjAxMy0wNi0yOCBrbG9ja2FuIDE2OjE5ICswMjAwIHNrcmV2IEdp YW5sdWNhIENlY2NoaToNCg0KDQpIZWxsbywNCmluIHRoZSBwYXN0IHRoZXJlIHdlcmUgc29tZSB0 aHJlYWRzIHJlbGF0ZWQgdG8gdGhpcyBzdWJqZWN0Lg0KVG9kYXkgSSBzdWNjZXNzZnVsbHkgY29u bmVjdGVkIG15IG9WaXJ0IDMuMi4yIChpbnN0YWxsZWQgb24gZjE4IHdpdGgNCm92aXJ0LXJlcG8p IHRvIGEgQ2VudE9TIDYgc2FtYmE0IHNlcnZlci4NCg0KQmFzaWNhbGx5IEkgZm9sbG93ZWQgdGhp cyBuaWNlIHBhZ2UgZm9yIENlbnRPUyA2IHdpdGggdGhlIGRpZmZlcmVuY2UNCnRoYXQgSSBkb3du bG9hZGVkIGFuZCBjb21waWxlZCA0LjAuNiB2ZXJzaW9uIG9mIFNhbWJhIGluc3RlYWQgb2YNCjQu MC4wOg0KDQpodHRwOi8vb3BlbnRvZG8ubmV0LzIwMTMvMDEvc2FtYmE0LWFzLWFkLWRvbWFpbi1j b250cm9sbGVyLW9uLWNlbnRvcy02Lw0KDQpPbmUgaW1wb3J0YW50IHRoaW5nIGlzIHRoYXQgSSBo YWQgdG8gcHV0IHNhbWJhNCBzZXJ2ZXIgaXAgaW4NCnJlc29sdi5jb25mIGFzIHRoZSBmaXJzdCBm b3IgbXkgZW5naW5lLg0KQnV0IGluIG15IGNhc2UgdGhpcyB3YXMgbm90IGEgcHJvYmxlbSBiZWNh dXNlIHNhbWJhNCBpcyB0aGVuDQpjb25maWd1cmVkIHdpdGggdGhlIG9yaWdpbmFsIGNvcnBvcmF0 ZSBkbnMgYXMgZm9yd2FyZGVyLCBzbyBhbGwgaXMgb2sNCmZvciBtZQ0KDQpTb21lIGNvbW1hbmRz JyBvdXRwdXQNCg0KW3Jvb3RAYzZkYyBzYW1iYS00LjAuNl0jIC91c3IvbG9jYWwvc2FtYmEvYmlu L3NhbWJhLXRvb2wgZG9tYWluDQpwcm92aXNpb24gLS1yZWFsbT1vdnRlc3QubG9jYWwgLS1kb21h aW49T1ZURVNUIC0tYWRtaW5wYXNzICdYWFhYWFhYWFgnDQotLXNlcnZlci1yb2xlPWRjIC0tZG5z LWJhY2tlbmQ9QklORDlfRExaDQpMb29raW5nIHVwIElQdjQgYWRkcmVzc2VzDQpMb29raW5nIHVw IElQdjYgYWRkcmVzc2VzDQpObyBJUHY2IGFkZHJlc3Mgd2lsbCBiZSBhc3NpZ25lZA0KU2V0dGlu ZyB1cCBzZWNyZXRzLmxkYg0KU2V0dGluZyB1cCB0aGUgcmVnaXN0cnkNClNldHRpbmcgdXAgdGhl IHByaXZpbGVnZXMgZGF0YWJhc2UNClNldHRpbmcgdXAgaWRtYXAgZGINClNldHRpbmcgdXAgU0FN IGRiDQpTZXR0aW5nIHVwIHNhbS5sZGIgcGFydGl0aW9ucyBhbmQgc2V0dGluZ3MNClNldHRpbmcg dXAgc2FtLmxkYiByb290RFNFDQpQcmUtbG9hZGluZyB0aGUgU2FtYmEgNCBhbmQgQUQgc2NoZW1h DQpBZGRpbmcgRG9tYWluRE46IERDPW92dGVzdCxEQz1sb2NhbA0KQWRkaW5nIGNvbmZpZ3VyYXRp b24gY29udGFpbmVyDQpTZXR0aW5nIHVwIHNhbS5sZGIgc2NoZW1hDQpTZXR0aW5nIHVwIHNhbS5s ZGIgY29uZmlndXJhdGlvbiBkYXRhDQpTZXR0aW5nIHVwIGRpc3BsYXkgc3BlY2lmaWVycw0KTW9k aWZ5aW5nIGRpc3BsYXkgc3BlY2lmaWVycw0KQWRkaW5nIHVzZXJzIGNvbnRhaW5lcg0KTW9kaWZ5 aW5nIHVzZXJzIGNvbnRhaW5lcg0KQWRkaW5nIGNvbXB1dGVycyBjb250YWluZXINCk1vZGlmeWlu ZyBjb21wdXRlcnMgY29udGFpbmVyDQpTZXR0aW5nIHVwIHNhbS5sZGIgZGF0YQ0KU2V0dGluZyB1 cCB3ZWxsIGtub3duIHNlY3VyaXR5IHByaW5jaXBhbHMNClNldHRpbmcgdXAgc2FtLmxkYiB1c2Vy cyBhbmQgZ3JvdXBzDQpTZXR0aW5nIHVwIHNlbGYgam9pbg0KQWRkaW5nIEROUyBhY2NvdW50cw0K Q3JlYXRpbmcgQ049TWljcm9zb2Z0RE5TLENOPVN5c3RlbSxEQz1vdnRlc3QsREM9bG9jYWwNCkNy ZWF0aW5nIERvbWFpbkRuc1pvbmVzIGFuZCBGb3Jlc3REbnNab25lcyBwYXJ0aXRpb25zDQpQb3B1 bGF0aW5nIERvbWFpbkRuc1pvbmVzIGFuZCBGb3Jlc3REbnNab25lcyBwYXJ0aXRpb25zDQpTZWUg L3Vzci9sb2NhbC9zYW1iYS9wcml2YXRlL25hbWVkLmNvbmYgZm9yIGFuIGV4YW1wbGUgY29uZmln dXJhdGlvbg0KaW5jbHVkZSBmaWxlIGZvciBCSU5EDQphbmQgL3Vzci9sb2NhbC9zYW1iYS9wcml2 YXRlL25hbWVkLnR4dCBmb3IgZnVydGhlciBkb2N1bWVudGF0aW9uDQpyZXF1aXJlZCBmb3Igc2Vj dXJlIEROUyB1cGRhdGVzDQpTZXR0aW5nIHVwIHNhbS5sZGIgcm9vdERTRSBtYXJraW5nIGFzIHN5 bmNocm9uaXplZA0KRml4aW5nIHByb3Zpc2lvbiBHVUlEcw0KQSBLZXJiZXJvcyBjb25maWd1cmF0 aW9uIHN1aXRhYmxlIGZvciBTYW1iYSA0IGhhcyBiZWVuIGdlbmVyYXRlZCBhdA0KL3Vzci9sb2Nh bC9zYW1iYS9wcml2YXRlL2tyYjUuY29uZg0KT25jZSB0aGUgYWJvdmUgZmlsZXMgYXJlIGluc3Rh bGxlZCwgeW91ciBTYW1iYTQgc2VydmVyIHdpbGwgYmUgcmVhZHkgdG8gdXNlDQpTZXJ2ZXIgUm9s ZTogICAgICAgICAgIGFjdGl2ZSBkaXJlY3RvcnkgZG9tYWluIGNvbnRyb2xsZXINCkhvc3RuYW1l OiAgICAgICAgICAgICAgYzZkYw0KTmV0QklPUyBEb21haW46ICAgICAgICBPVlRFU1QNCkROUyBE b21haW46ICAgICAgICAgICAgb3Z0ZXN0LmxvY2FsDQpET01BSU4gU0lEOiAgICAgICAgICAgIFMt MS01LTIxLTQxODYzNDQwNzMtOTU1MjMyODk2LTE3NjQzNjIzNzgNCg0KDQpbcm9vdEBjNmRjIHNh bWJhLTQuMC42XSMgcm5kYy1jb25mZ2VuIC1hIC1yIC9kZXYvdXJhbmRvbQ0Kd3JvdGUga2V5IGZp bGUgIi9ldGMvcm5kYy5rZXkiDQoNCg0KLSB0ZXN0cw0KKHNlZSBhbHNvIGh0dHA6Ly93d3cuYWxl eHd5bi5jb20vY29tcHV0ZXItdGlwcy9jZW50b3Mtc2FtYmE0LWFjdGl2ZS1kaXJlY3RvcnktZG9t YWluLWNvbnRyb2xsZXIpDQoNCltyb290QGM2ZGMgXSMgL3Vzci9sb2NhbC9zYW1iYS9iaW4vc21i Y2xpZW50IC1MIGxvY2FsaG9zdCAtVSUNCkRvbWFpbj1bT1ZURVNUXSBPUz1bVW5peF0gU2VydmVy PVtTYW1iYSA0LjAuNl0NCg0KU2hhcmVuYW1lICAgICAgIFR5cGUgICAgICBDb21tZW50DQotLS0t LS0tLS0gICAgICAgLS0tLSAgICAgIC0tLS0tLS0NCm5ldGxvZ29uICAgICAgICBEaXNrDQpzeXN2 b2wgICAgICAgICAgRGlzaw0KSVBDJCAgICAgICAgICAgIElQQyAgICAgICBJUEMgU2VydmljZSAo U2FtYmEgNC4wLjYpDQpEb21haW49W09WVEVTVF0gT1M9W1VuaXhdIFNlcnZlcj1bU2FtYmEgNC4w LjZdDQoNClNlcnZlciAgICAgICAgICAgICAgIENvbW1lbnQNCi0tLS0tLS0tLSAgICAgICAgICAg IC0tLS0tLS0NCg0KV29ya2dyb3VwICAgICAgICAgICAgTWFzdGVyDQotLS0tLS0tLS0gICAgICAg ICAgICAtLS0tLS0tDQoNCltyb290QGM2ZGMgbnRwLTQuMi42cDVdIyBob3N0IC10IFNSViBfbGRh cC5fdGNwLm92dGVzdC5sb2NhbC4NCl9sZGFwLl90Y3Aub3Z0ZXN0LmxvY2FsIGhhcyBTUlYgcmVj b3JkIDAgMTAwIDM4OSBjNmRjLm92dGVzdC5sb2NhbC4NCg0KW3Jvb3RAYzZkYyBudHAtNC4yLjZw NV0jIGhvc3QgLXQgU1JWIF9rZXJiZXJvcy5fdWRwLm92dGVzdC5sb2NhbC4NCl9rZXJiZXJvcy5f dWRwLm92dGVzdC5sb2NhbCBoYXMgU1JWIHJlY29yZCAwIDEwMCA4OCBjNmRjLm92dGVzdC5sb2Nh bC4NCg0KDQpbcm9vdEBjNmRjIG50cC00LjIuNnA1XSMga2luaXQgYWRtaW5pc3RyYXRvckBPVlRF U1QuTE9DQUw8bWFpbHRvOmFkbWluaXN0cmF0b3JAT1ZURVNULkxPQ0FMPg0KUGFzc3dvcmQgZm9y IGFkbWluaXN0cmF0b3JAT1ZURVNULkxPQ0FMPG1haWx0bzphZG1pbmlzdHJhdG9yQE9WVEVTVC5M T0NBTD46DQpXYXJuaW5nOiBZb3VyIHBhc3N3b3JkIHdpbGwgZXhwaXJlIGluIDQxIGRheXMgb24g RnJpIEF1ZyAgOSAxMzozMDo1OSAyMDEzDQoNCltyb290QGM2ZGMgbnRwLTQuMi42cDVdIyBrbGlz dA0KVGlja2V0IGNhY2hlOiBGSUxFOi90bXAva3JiNWNjXzANCkRlZmF1bHQgcHJpbmNpcGFsOiBh ZG1pbmlzdHJhdG9yQE9WVEVTVC5MT0NBTDxtYWlsdG86YWRtaW5pc3RyYXRvckBPVlRFU1QuTE9D QUw+DQoNClZhbGlkIHN0YXJ0aW5nICAgICBFeHBpcmVzICAgICAgICAgICAgU2VydmljZSBwcmlu Y2lwYWwNCjA2LzI4LzEzIDE0OjU1OjExICAwNi8yOS8xMyAwMDo1NToxMSAga3JidGd0L09WVEVT VC5MT0NBTEBPVlRFU1QuTE9DQUw8bWFpbHRvOk9WVEVTVC5MT0NBTEBPVlRFU1QuTE9DQUw+DQpy ZW5ldyB1bnRpbCAwNy8wNS8xMyAxNDo1NTowOA0KDQpVc2VycycgbWdtdCBjYW4gYmUgZG9uZSBm cm9tIHdpbmRvd3Mgd2l0aCBTYW1iYSBBRCBtYW5hZ2VtZW50IHRvb2xzDQpzZWU6IGh0dHA6Ly93 aWtpLnNhbWJhLm9yZy9pbmRleC5waHAvU2FtYmFfQURfbWFuYWdlbWVudF9mcm9tX3dpbmRvd3MN Cg0KSSBtYW5hZ2VkIGZyb20gbGludXgNCnNlZTogaHR0cDovL3dpa2kuc2FtYmEub3JnL2luZGV4 LnBocC9BZGRpbmdfdXNlcnNfd2l0aF9zYW1iYV90b29sDQoNCltyb290QGM2ZGMgbnRwLTQuMi42 cDVdIyAvdXNyL2xvY2FsL3NhbWJhL2Jpbi9zYW1iYS10b29sIHVzZXIgYWRkIE9WSVJUQURNDQpO ZXcgUGFzc3dvcmQ6DQpSZXR5cGUgUGFzc3dvcmQ6DQpVc2VyICdPVklSVEFETScgY3JlYXRlZCBz dWNjZXNzZnVsbHkNCg0KW3Jvb3RAYzZkYyBudHAtNC4yLjZwNV0jIC91c3IvbG9jYWwvc2FtYmEv YmluL3diaW5mbyAtLW5hbWUtdG8tc2lkIE9WSVJUQURNDQpTLTEtNS0yMS00MTg2MzQ0MDczLTk1 NTIzMjg5Ni0xNzY0MzYyMzc4LTExMDQgU0lEX1VTRVIgKDEpDQoNCltyb290QGM2ZGMgbnRwLTQu Mi42cDVdIyAvdXNyL2xvY2FsL3NhbWJhL2Jpbi93YmluZm8gLS1zaWQtdG8tdWlkDQpTLTEtNS0y MS00MTg2MzQ0MDczLTk1NTIzMjg5Ni0xNzY0MzYyMzc4LTExMDQNCjMwMDAwMTYNCg0KSSBtaXNz ZWQgZ2l2ZW5OYW1lIGFuZCBzbiBpbiB1c2VyIGNyZWF0aW9uLi4uLg0KVW5mb3J0dW5hdGVseSB0 aGVyZSBpcyBhIG9ubHkgcHJvcG9zZWQgcGF0Y2ggZm9yIGFuICJlZGl0IiBzdWJjb21tYW5kDQpi dXQgaXMgbm90IGluc2lkZSB5ZXQuDQpodHRwOi8vc2FtYmEuMjI4MzMyNS5uNC5uYWJibGUuY29t L1BhdGNoLWZvci1zYW1iYS10b29sLXVzZXItbW9kaWZ5LXN1YmNvbW1hbmQtdGQ0NjM0ODg0Lmh0 bWwNCg0KU2VlIGFsc286DQpodHRwczovL3dpa2kuc2FtYmEub3JnL2luZGV4LnBocC9TYW1iYTQv TERCSW50cm8NCg0KVG8gbW9kaWZ5IHVzZXJzJyBhdHRyaWJ1dGVzIEkgdXNlZCB0aGlzOg0KW3Jv b3RAYzZkYyBudHAtNC4yLjZwNV0jIC91c3IvbG9jYWwvc2FtYmEvYmluL2xkYmVkaXQgLWUgdmkg LUgNCi91c3IvbG9jYWwvc2FtYmEvcHJpdmF0ZS9pZG1hcC5sZGINCm9iamVjdHNpZD1TLTEtNS0y MS00MTg2MzQ0MDczLTk1NTIzMjg5Ni0xNzY0MzYyMzc4LTExMDQNCg0KaGVyZSB5b3UgZW50ZXIg aW50byBhIHZpIHNlc3Npb24uLi4uDQoNCiMgZWRpdGluZyAxIHJlY29yZHMNCiMgcmVjb3JkIDEN CmRuOiBDTj1TLTEtNS0yMS00MTg2MzQ0MDczLTk1NTIzMjg5Ni0xNzY0MzYyMzc4LTExMDQNCmNu OiBTLTEtNS0yMS00MTg2MzQ0MDczLTk1NTIzMjg5Ni0xNzY0MzYyMzc4LTExMDQNCm9iamVjdENs YXNzOiBzaWRNYXANCm9iamVjdFNpZDogUy0xLTUtMjEtNDE4NjM0NDA3My05NTUyMzI4OTYtMTc2 NDM2MjM3OC0xMTA0DQp0eXBlOiBJRF9UWVBFX0JPVEgNCnhpZE51bWJlcjogMzAwMDAxNg0KZ2l2 ZW5OYW1lOiBvVmlydCA8LS0tLSBhZGRlZA0Kc246IEFkbWluIDwtLS0tIGFkZGVkDQpkaXN0aW5n dWlzaGVkTmFtZTogQ049Uy0xLTUtMjEtNDE4NjM0NDA3My05NTUyMzI4OTYtMTc2NDM2MjM3OC0x MTA0DQoNCg0KW3Jvb3RAYzZkYyBudHAtNC4yLjZwNV0jIGtpbml0IG92aXJ0YWRtQE9WVEVTVC5M T0NBTDxtYWlsdG86b3ZpcnRhZG1AT1ZURVNULkxPQ0FMPg0KUGFzc3dvcmQgZm9yIG92aXJ0YWRt QE9WVEVTVC5MT0NBTDxtYWlsdG86b3ZpcnRhZG1AT1ZURVNULkxPQ0FMPjoNCldhcm5pbmc6IFlv dXIgcGFzc3dvcmQgd2lsbCBleHBpcmUgaW4gNDEgZGF5cyBvbiBGcmkgQXVnICA5IDE1OjA1OjQ1 IDIwMTMNCg0KW3Jvb3RAYzZkYyBudHAtNC4yLjZwNV0jIGtsaXN0DQpUaWNrZXQgY2FjaGU6IEZJ TEU6L3RtcC9rcmI1Y2NfMA0KRGVmYXVsdCBwcmluY2lwYWw6IG92aXJ0YWRtQE9WVEVTVC5MT0NB TDxtYWlsdG86b3ZpcnRhZG1AT1ZURVNULkxPQ0FMPg0KDQpWYWxpZCBzdGFydGluZyAgICAgRXhw aXJlcyAgICAgICAgICAgIFNlcnZpY2UgcHJpbmNpcGFsDQowNi8yOC8xMyAxNToxMjozMCAgMDYv MjkvMTMgMDE6MTI6MzAgIGtyYnRndC9PVlRFU1QuTE9DQUxAT1ZURVNULkxPQ0FMPG1haWx0bzpP VlRFU1QuTE9DQUxAT1ZURVNULkxPQ0FMPg0KcmVuZXcgdW50aWwgMDcvMDUvMTMgMTU6MTI6MjcN Cg0KDQpXaXRob3V0IHB1dHRpbmcgc2FtYmE0IGlwIGluIHJlc29sdi5jb25mIG9mIGVuZ2luZSBJ IGdvdCB0aGlzIGVycm9yDQoNCltyb290QGYxOGVuZ2luZSB+XSMgZW5naW5lLW1hbmFnZS1kb21h aW5zIC1hY3Rpb249YWRkDQotZG9tYWluPSdPVlRFU1QuTE9DQUwnIC1wcm92aWRlcj1BY3RpdmVE aXJlY3RvcnkgLXVzZXI9J292aXJ0YWRtJw0KLWludGVyYWN0aXZlDQpObyBMREFQIHNlcnZlcnMg Y2FuIGJlIG9idGFpbmVkIGZvciBkb21haW4gb3Z0ZXN0LmxvY2FsDQoNCk5vdw0KW3Jvb3RAZjE4 ZW5naW5lIH5dIyBlbmdpbmUtbWFuYWdlLWRvbWFpbnMgLWFjdGlvbj1hZGQNCi1kb21haW49J09W VEVTVC5MT0NBTCcgLXByb3ZpZGVyPUFjdGl2ZURpcmVjdG9yeSAtdXNlcj0nb3ZpcnRhZG0nDQot aW50ZXJhY3RpdmUNCkVudGVyIHBhc3N3b3JkOg0KDQpUaGUgZG9tYWluIG92dGVzdC5sb2NhbCBo YXMgYmVlbiBhZGRlZCB0byB0aGUgZW5naW5lIGFzIGFuDQphdXRoZW50aWNhdGlvbiBzb3VyY2Ug YnV0IG5vIHVzZXJzIGZyb20gdGhhdCBkb21haW4gaGF2ZSBiZWVuIGdyYW50ZWQNCnBlcm1pc3Np b25zIHdpdGhpbiB0aGUgb1ZpcnQgTWFuYWdlci4NClVzZXJzIGZyb20gdGhpcyBkb21haW4gY2Fu IGJlIGdyYW50ZWQgcGVybWlzc2lvbnMgZnJvbSB0aGUgV2ViDQphZG1pbmlzdHJhdGlvbiBpbnRl cmZhY2UuDQpvVmlydCBFbmdpbmUgcmVzdGFydCBpcyByZXF1aXJlZCBpbiBvcmRlciBmb3IgdGhl IGNoYW5nZXMgdG8gdGFrZQ0KcGxhY2UgKHNlcnZpY2Ugb3ZpcnQtZW5naW5lIHJlc3RhcnQpLg0K TWFuYWdlIERvbWFpbnMgY29tcGxldGVkIHN1Y2Nlc3NmdWxseQ0KDQpyZXN0YXJ0IGVuZ2luZSB3 aXRoDQoNCnN5c3RlbWN0bCByZXN0YXJ0IG92aXJ0LWVuZ2luZQ0KDQpUaGVuIEkgYWRkZWQgdGhl IHVzZXIgdG8gb3ZpcnQgaW4gd2ViYWRtaW4gZ3VpOg0KDQpDb25maWd1cmUgLS0+IFN5c3RlbSBQ ZXJtaXNzaW9ucyAtLT4gQWRkDQpTZWxlY3RlZCBvdmlydGFkbSBhbmQgaXRzIGRvbWFpbiBvdnRl c3QubG9jYWwgYW5kIGdpdmUgaGltIFN1cGVyVXNlciByb2xlDQoNClRyaWVkIHRvIHN1Y2Nlc3Nm dWxseSBjb25uZWN0IHRvIFdlYmFkbWluIEd1aSBhbmQgY3JlYXRlIG9uZSBWTSBhcyBhIHRlc3QN Cg0KSElIIG90aGVycy4NCg0KSSdtIGdvaW5nIHRvIHNlZSBpZiB0aGlzIHdvcmtzIHdpdGggVk13 YXJlIHRvby4uLi4NCg0KR2lhbmx1Y2ENCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fDQpVc2VycyBtYWlsaW5nIGxpc3QNClVzZXJzQG92aXJ0Lm9yZzxtYWls dG86VXNlcnNAb3ZpcnQub3JnPg0KaHR0cDovL2xpc3RzLm92aXJ0Lm9yZy9tYWlsbWFuL2xpc3Rp bmZvL3VzZXJzDQoNCg0KLS0NCg0KTWVkIFbDpG5saWdhIEjDpGxzbmluZ2FyDQotLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tDQpLYXJsaSBTasO2YmVyZw0KU3dlZGlzaCBVbml2ZXJzaXR5IG9mIEFncmlj dWx0dXJhbCBTY2llbmNlcw0KQm94IDcwNzkgKFZpc2l0aW5nIEFkZHJlc3MgS3JvbsOlc3bDpGdl biA4KQ0KUy03NTAgMDcgVXBwc2FsYSwgU3dlZGVuDQpQaG9uZTogICs0Ni0oMCkxOC02NyAxNSA2 Ng0Ka2FybGkuc2pvYmVyZ0BzbHUuc2U8bWFpbHRvOmthcmxpLnNqb2JlcmdAYWRtLnNsdS5zZT4N Cg== --_000_5F9E965F5A80BC468BE5F40576769F092E6EE955exchange21_ Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: base64 PCFET0NUWVBFIEhUTUwgUFVCTElDICItLy9XM0MvL0RURCBIVE1MIDQuMCBUUkFOU0lUSU9OQUwv L0VOIj4NCjxodG1sPg0KPGhlYWQ+DQo8bWV0YSBodHRwLWVxdWl2PSJDb250ZW50LVR5cGUiIGNv bnRlbnQ9InRleHQvaHRtbDsgY2hhcnNldD11dGYtOCI+DQo8bWV0YSBuYW1lPSJHRU5FUkFUT1Ii IGNvbnRlbnQ9Ikd0a0hUTUwvNC40LjQiPg0KPC9oZWFkPg0KPGJvZHk+DQpIaSE8YnI+DQo8YnI+ DQpJIGNhbiBhbHNvIGNvbmZpcm0gdGhpcyB0byBiZSB3b3JraW5nLiBJIHNldCB1cCBhIFNBTUJB NCBEQyBvbiBhIGZyZWVic2QtYmFzZWQgVk0gYW5kIGlzIHN1Y2Nlc3NmdWxseSBjb25uZWN0ZWQg dG8gaXQgb24gbXkgZXhwZXJpbWVudGFsIG9WaXJ0LTMuMSBlbmdpbmUuIEp1c3QgRllJLjxicj4N Cjxicj4NCi9LYXJsaTxicj4NCjxicj4NCmZyZSAyMDEzLTA2LTI4IGtsb2NrYW4gMTY6MTkgJiM0 MzswMjAwIHNrcmV2IEdpYW5sdWNhIENlY2NoaToNCjxibG9ja3F1b3RlIHR5cGU9IkNJVEUiPg0K PHByZT4KSGVsbG8sCmluIHRoZSBwYXN0IHRoZXJlIHdlcmUgc29tZSB0aHJlYWRzIHJlbGF0ZWQg dG8gdGhpcyBzdWJqZWN0LgpUb2RheSBJIHN1Y2Nlc3NmdWxseSBjb25uZWN0ZWQgbXkgb1ZpcnQg My4yLjIgKGluc3RhbGxlZCBvbiBmMTggd2l0aApvdmlydC1yZXBvKSB0byBhIENlbnRPUyA2IHNh bWJhNCBzZXJ2ZXIuCgpCYXNpY2FsbHkgSSBmb2xsb3dlZCB0aGlzIG5pY2UgcGFnZSBmb3IgQ2Vu dE9TIDYgd2l0aCB0aGUgZGlmZmVyZW5jZQp0aGF0IEkgZG93bmxvYWRlZCBhbmQgY29tcGlsZWQg NC4wLjYgdmVyc2lvbiBvZiBTYW1iYSBpbnN0ZWFkIG9mCjQuMC4wOgoKPGEgaHJlZj0iaHR0cDov L29wZW50b2RvLm5ldC8yMDEzLzAxL3NhbWJhNC1hcy1hZC1kb21haW4tY29udHJvbGxlci1vbi1j ZW50b3MtNi8iPmh0dHA6Ly9vcGVudG9kby5uZXQvMjAxMy8wMS9zYW1iYTQtYXMtYWQtZG9tYWlu LWNvbnRyb2xsZXItb24tY2VudG9zLTYvPC9hPgoKT25lIGltcG9ydGFudCB0aGluZyBpcyB0aGF0 IEkgaGFkIHRvIHB1dCBzYW1iYTQgc2VydmVyIGlwIGluCnJlc29sdi5jb25mIGFzIHRoZSBmaXJz dCBmb3IgbXkgZW5naW5lLgpCdXQgaW4gbXkgY2FzZSB0aGlzIHdhcyBub3QgYSBwcm9ibGVtIGJl Y2F1c2Ugc2FtYmE0IGlzIHRoZW4KY29uZmlndXJlZCB3aXRoIHRoZSBvcmlnaW5hbCBjb3Jwb3Jh dGUgZG5zIGFzIGZvcndhcmRlciwgc28gYWxsIGlzIG9rCmZvciBtZQoKU29tZSBjb21tYW5kcycg b3V0cHV0Cgpbcm9vdEBjNmRjIHNhbWJhLTQuMC42XSMgL3Vzci9sb2NhbC9zYW1iYS9iaW4vc2Ft YmEtdG9vbCBkb21haW4KcHJvdmlzaW9uIC0tcmVhbG09b3Z0ZXN0LmxvY2FsIC0tZG9tYWluPU9W VEVTVCAtLWFkbWlucGFzcyAnWFhYWFhYWFhYJwotLXNlcnZlci1yb2xlPWRjIC0tZG5zLWJhY2tl bmQ9QklORDlfRExaCkxvb2tpbmcgdXAgSVB2NCBhZGRyZXNzZXMKTG9va2luZyB1cCBJUHY2IGFk ZHJlc3NlcwpObyBJUHY2IGFkZHJlc3Mgd2lsbCBiZSBhc3NpZ25lZApTZXR0aW5nIHVwIHNlY3Jl dHMubGRiClNldHRpbmcgdXAgdGhlIHJlZ2lzdHJ5ClNldHRpbmcgdXAgdGhlIHByaXZpbGVnZXMg ZGF0YWJhc2UKU2V0dGluZyB1cCBpZG1hcCBkYgpTZXR0aW5nIHVwIFNBTSBkYgpTZXR0aW5nIHVw IHNhbS5sZGIgcGFydGl0aW9ucyBhbmQgc2V0dGluZ3MKU2V0dGluZyB1cCBzYW0ubGRiIHJvb3RE U0UKUHJlLWxvYWRpbmcgdGhlIFNhbWJhIDQgYW5kIEFEIHNjaGVtYQpBZGRpbmcgRG9tYWluRE46 IERDPW92dGVzdCxEQz1sb2NhbApBZGRpbmcgY29uZmlndXJhdGlvbiBjb250YWluZXIKU2V0dGlu ZyB1cCBzYW0ubGRiIHNjaGVtYQpTZXR0aW5nIHVwIHNhbS5sZGIgY29uZmlndXJhdGlvbiBkYXRh ClNldHRpbmcgdXAgZGlzcGxheSBzcGVjaWZpZXJzCk1vZGlmeWluZyBkaXNwbGF5IHNwZWNpZmll cnMKQWRkaW5nIHVzZXJzIGNvbnRhaW5lcgpNb2RpZnlpbmcgdXNlcnMgY29udGFpbmVyCkFkZGlu ZyBjb21wdXRlcnMgY29udGFpbmVyCk1vZGlmeWluZyBjb21wdXRlcnMgY29udGFpbmVyClNldHRp bmcgdXAgc2FtLmxkYiBkYXRhClNldHRpbmcgdXAgd2VsbCBrbm93biBzZWN1cml0eSBwcmluY2lw YWxzClNldHRpbmcgdXAgc2FtLmxkYiB1c2VycyBhbmQgZ3JvdXBzClNldHRpbmcgdXAgc2VsZiBq b2luCkFkZGluZyBETlMgYWNjb3VudHMKQ3JlYXRpbmcgQ049TWljcm9zb2Z0RE5TLENOPVN5c3Rl bSxEQz1vdnRlc3QsREM9bG9jYWwKQ3JlYXRpbmcgRG9tYWluRG5zWm9uZXMgYW5kIEZvcmVzdERu c1pvbmVzIHBhcnRpdGlvbnMKUG9wdWxhdGluZyBEb21haW5EbnNab25lcyBhbmQgRm9yZXN0RG5z Wm9uZXMgcGFydGl0aW9ucwpTZWUgL3Vzci9sb2NhbC9zYW1iYS9wcml2YXRlL25hbWVkLmNvbmYg Zm9yIGFuIGV4YW1wbGUgY29uZmlndXJhdGlvbgppbmNsdWRlIGZpbGUgZm9yIEJJTkQKYW5kIC91 c3IvbG9jYWwvc2FtYmEvcHJpdmF0ZS9uYW1lZC50eHQgZm9yIGZ1cnRoZXIgZG9jdW1lbnRhdGlv bgpyZXF1aXJlZCBmb3Igc2VjdXJlIEROUyB1cGRhdGVzClNldHRpbmcgdXAgc2FtLmxkYiByb290 RFNFIG1hcmtpbmcgYXMgc3luY2hyb25pemVkCkZpeGluZyBwcm92aXNpb24gR1VJRHMKQSBLZXJi ZXJvcyBjb25maWd1cmF0aW9uIHN1aXRhYmxlIGZvciBTYW1iYSA0IGhhcyBiZWVuIGdlbmVyYXRl ZCBhdAovdXNyL2xvY2FsL3NhbWJhL3ByaXZhdGUva3JiNS5jb25mCk9uY2UgdGhlIGFib3ZlIGZp bGVzIGFyZSBpbnN0YWxsZWQsIHlvdXIgU2FtYmE0IHNlcnZlciB3aWxsIGJlIHJlYWR5IHRvIHVz ZQpTZXJ2ZXIgUm9sZTogICAgICAgICAgIGFjdGl2ZSBkaXJlY3RvcnkgZG9tYWluIGNvbnRyb2xs ZXIKSG9zdG5hbWU6ICAgICAgICAgICAgICBjNmRjCk5ldEJJT1MgRG9tYWluOiAgICAgICAgT1ZU RVNUCkROUyBEb21haW46ICAgICAgICAgICAgb3Z0ZXN0LmxvY2FsCkRPTUFJTiBTSUQ6ICAgICAg ICAgICAgUy0xLTUtMjEtNDE4NjM0NDA3My05NTUyMzI4OTYtMTc2NDM2MjM3OAoKCltyb290QGM2 ZGMgc2FtYmEtNC4wLjZdIyBybmRjLWNvbmZnZW4gLWEgLXIgL2Rldi91cmFuZG9tCndyb3RlIGtl eSBmaWxlICZxdW90Oy9ldGMvcm5kYy5rZXkmcXVvdDsKCgotIHRlc3RzCihzZWUgYWxzbyA8YSBo cmVmPSJodHRwOi8vd3d3LmFsZXh3eW4uY29tL2NvbXB1dGVyLXRpcHMvY2VudG9zLXNhbWJhNC1h Y3RpdmUtZGlyZWN0b3J5LWRvbWFpbi1jb250cm9sbGVyIj5odHRwOi8vd3d3LmFsZXh3eW4uY29t L2NvbXB1dGVyLXRpcHMvY2VudG9zLXNhbWJhNC1hY3RpdmUtZGlyZWN0b3J5LWRvbWFpbi1jb250 cm9sbGVyPC9hPikKCltyb290QGM2ZGMgXSMgL3Vzci9sb2NhbC9zYW1iYS9iaW4vc21iY2xpZW50 IC1MIGxvY2FsaG9zdCAtVSUKRG9tYWluPVtPVlRFU1RdIE9TPVtVbml4XSBTZXJ2ZXI9W1NhbWJh IDQuMC42XQoKU2hhcmVuYW1lICAgICAgIFR5cGUgICAgICBDb21tZW50Ci0tLS0tLS0tLSAgICAg ICAtLS0tICAgICAgLS0tLS0tLQpuZXRsb2dvbiAgICAgICAgRGlzawpzeXN2b2wgICAgICAgICAg RGlzawpJUEMkICAgICAgICAgICAgSVBDICAgICAgIElQQyBTZXJ2aWNlIChTYW1iYSA0LjAuNikK RG9tYWluPVtPVlRFU1RdIE9TPVtVbml4XSBTZXJ2ZXI9W1NhbWJhIDQuMC42XQoKU2VydmVyICAg ICAgICAgICAgICAgQ29tbWVudAotLS0tLS0tLS0gICAgICAgICAgICAtLS0tLS0tCgpXb3JrZ3Jv dXAgICAgICAgICAgICBNYXN0ZXIKLS0tLS0tLS0tICAgICAgICAgICAgLS0tLS0tLQoKW3Jvb3RA YzZkYyBudHAtNC4yLjZwNV0jIGhvc3QgLXQgU1JWIF9sZGFwLl90Y3Aub3Z0ZXN0LmxvY2FsLgpf bGRhcC5fdGNwLm92dGVzdC5sb2NhbCBoYXMgU1JWIHJlY29yZCAwIDEwMCAzODkgYzZkYy5vdnRl c3QubG9jYWwuCgpbcm9vdEBjNmRjIG50cC00LjIuNnA1XSMgaG9zdCAtdCBTUlYgX2tlcmJlcm9z Ll91ZHAub3Z0ZXN0LmxvY2FsLgpfa2VyYmVyb3MuX3VkcC5vdnRlc3QubG9jYWwgaGFzIFNSViBy ZWNvcmQgMCAxMDAgODggYzZkYy5vdnRlc3QubG9jYWwuCgoKW3Jvb3RAYzZkYyBudHAtNC4yLjZw NV0jIGtpbml0IDxhIGhyZWY9Im1haWx0bzphZG1pbmlzdHJhdG9yQE9WVEVTVC5MT0NBTCI+YWRt aW5pc3RyYXRvckBPVlRFU1QuTE9DQUw8L2E+ClBhc3N3b3JkIGZvciA8YSBocmVmPSJtYWlsdG86 YWRtaW5pc3RyYXRvckBPVlRFU1QuTE9DQUwiPmFkbWluaXN0cmF0b3JAT1ZURVNULkxPQ0FMPC9h PjoKV2FybmluZzogWW91ciBwYXNzd29yZCB3aWxsIGV4cGlyZSBpbiA0MSBkYXlzIG9uIEZyaSBB dWcgIDkgMTM6MzA6NTkgMjAxMwoKW3Jvb3RAYzZkYyBudHAtNC4yLjZwNV0jIGtsaXN0ClRpY2tl dCBjYWNoZTogRklMRTovdG1wL2tyYjVjY18wCkRlZmF1bHQgcHJpbmNpcGFsOiA8YSBocmVmPSJt YWlsdG86YWRtaW5pc3RyYXRvckBPVlRFU1QuTE9DQUwiPmFkbWluaXN0cmF0b3JAT1ZURVNULkxP Q0FMPC9hPgoKVmFsaWQgc3RhcnRpbmcgICAgIEV4cGlyZXMgICAgICAgICAgICBTZXJ2aWNlIHBy aW5jaXBhbAowNi8yOC8xMyAxNDo1NToxMSAgMDYvMjkvMTMgMDA6NTU6MTEgIGtyYnRndC88YSBo cmVmPSJtYWlsdG86T1ZURVNULkxPQ0FMQE9WVEVTVC5MT0NBTCI+T1ZURVNULkxPQ0FMQE9WVEVT VC5MT0NBTDwvYT4KcmVuZXcgdW50aWwgMDcvMDUvMTMgMTQ6NTU6MDgKClVzZXJzJyBtZ210IGNh biBiZSBkb25lIGZyb20gd2luZG93cyB3aXRoIFNhbWJhIEFEIG1hbmFnZW1lbnQgdG9vbHMKc2Vl OiA8YSBocmVmPSJodHRwOi8vd2lraS5zYW1iYS5vcmcvaW5kZXgucGhwL1NhbWJhX0FEX21hbmFn ZW1lbnRfZnJvbV93aW5kb3dzIj5odHRwOi8vd2lraS5zYW1iYS5vcmcvaW5kZXgucGhwL1NhbWJh X0FEX21hbmFnZW1lbnRfZnJvbV93aW5kb3dzPC9hPgoKSSBtYW5hZ2VkIGZyb20gbGludXgKc2Vl OiA8YSBocmVmPSJodHRwOi8vd2lraS5zYW1iYS5vcmcvaW5kZXgucGhwL0FkZGluZ191c2Vyc193 aXRoX3NhbWJhX3Rvb2wiPmh0dHA6Ly93aWtpLnNhbWJhLm9yZy9pbmRleC5waHAvQWRkaW5nX3Vz ZXJzX3dpdGhfc2FtYmFfdG9vbDwvYT4KCltyb290QGM2ZGMgbnRwLTQuMi42cDVdIyAvdXNyL2xv Y2FsL3NhbWJhL2Jpbi9zYW1iYS10b29sIHVzZXIgYWRkIE9WSVJUQURNCk5ldyBQYXNzd29yZDoK UmV0eXBlIFBhc3N3b3JkOgpVc2VyICdPVklSVEFETScgY3JlYXRlZCBzdWNjZXNzZnVsbHkKClty b290QGM2ZGMgbnRwLTQuMi42cDVdIyAvdXNyL2xvY2FsL3NhbWJhL2Jpbi93YmluZm8gLS1uYW1l LXRvLXNpZCBPVklSVEFETQpTLTEtNS0yMS00MTg2MzQ0MDczLTk1NTIzMjg5Ni0xNzY0MzYyMzc4 LTExMDQgU0lEX1VTRVIgKDEpCgpbcm9vdEBjNmRjIG50cC00LjIuNnA1XSMgL3Vzci9sb2NhbC9z YW1iYS9iaW4vd2JpbmZvIC0tc2lkLXRvLXVpZApTLTEtNS0yMS00MTg2MzQ0MDczLTk1NTIzMjg5 Ni0xNzY0MzYyMzc4LTExMDQKMzAwMDAxNgoKSSBtaXNzZWQgZ2l2ZW5OYW1lIGFuZCBzbiBpbiB1 c2VyIGNyZWF0aW9uLi4uLgpVbmZvcnR1bmF0ZWx5IHRoZXJlIGlzIGEgb25seSBwcm9wb3NlZCBw YXRjaCBmb3IgYW4gJnF1b3Q7ZWRpdCZxdW90OyBzdWJjb21tYW5kCmJ1dCBpcyBub3QgaW5zaWRl IHlldC4KPGEgaHJlZj0iaHR0cDovL3NhbWJhLjIyODMzMjUubjQubmFiYmxlLmNvbS9QYXRjaC1m b3Itc2FtYmEtdG9vbC11c2VyLW1vZGlmeS1zdWJjb21tYW5kLXRkNDYzNDg4NC5odG1sIj5odHRw Oi8vc2FtYmEuMjI4MzMyNS5uNC5uYWJibGUuY29tL1BhdGNoLWZvci1zYW1iYS10b29sLXVzZXIt bW9kaWZ5LXN1YmNvbW1hbmQtdGQ0NjM0ODg0Lmh0bWw8L2E+CgpTZWUgYWxzbzoKPGEgaHJlZj0i aHR0cHM6Ly93aWtpLnNhbWJhLm9yZy9pbmRleC5waHAvU2FtYmE0L0xEQkludHJvIj5odHRwczov L3dpa2kuc2FtYmEub3JnL2luZGV4LnBocC9TYW1iYTQvTERCSW50cm88L2E+CgpUbyBtb2RpZnkg dXNlcnMnIGF0dHJpYnV0ZXMgSSB1c2VkIHRoaXM6Cltyb290QGM2ZGMgbnRwLTQuMi42cDVdIyAv dXNyL2xvY2FsL3NhbWJhL2Jpbi9sZGJlZGl0IC1lIHZpIC1ICi91c3IvbG9jYWwvc2FtYmEvcHJp dmF0ZS9pZG1hcC5sZGIKb2JqZWN0c2lkPVMtMS01LTIxLTQxODYzNDQwNzMtOTU1MjMyODk2LTE3 NjQzNjIzNzgtMTEwNAoKaGVyZSB5b3UgZW50ZXIgaW50byBhIHZpIHNlc3Npb24uLi4uCgojIGVk aXRpbmcgMSByZWNvcmRzCiMgcmVjb3JkIDEKZG46IENOPVMtMS01LTIxLTQxODYzNDQwNzMtOTU1 MjMyODk2LTE3NjQzNjIzNzgtMTEwNApjbjogUy0xLTUtMjEtNDE4NjM0NDA3My05NTUyMzI4OTYt MTc2NDM2MjM3OC0xMTA0Cm9iamVjdENsYXNzOiBzaWRNYXAKb2JqZWN0U2lkOiBTLTEtNS0yMS00 MTg2MzQ0MDczLTk1NTIzMjg5Ni0xNzY0MzYyMzc4LTExMDQKdHlwZTogSURfVFlQRV9CT1RICnhp ZE51bWJlcjogMzAwMDAxNgpnaXZlbk5hbWU6IG9WaXJ0ICZsdDstLS0tIGFkZGVkCnNuOiBBZG1p biAmbHQ7LS0tLSBhZGRlZApkaXN0aW5ndWlzaGVkTmFtZTogQ049Uy0xLTUtMjEtNDE4NjM0NDA3 My05NTUyMzI4OTYtMTc2NDM2MjM3OC0xMTA0CgoKW3Jvb3RAYzZkYyBudHAtNC4yLjZwNV0jIGtp bml0IDxhIGhyZWY9Im1haWx0bzpvdmlydGFkbUBPVlRFU1QuTE9DQUwiPm92aXJ0YWRtQE9WVEVT VC5MT0NBTDwvYT4KUGFzc3dvcmQgZm9yIDxhIGhyZWY9Im1haWx0bzpvdmlydGFkbUBPVlRFU1Qu TE9DQUwiPm92aXJ0YWRtQE9WVEVTVC5MT0NBTDwvYT46Cldhcm5pbmc6IFlvdXIgcGFzc3dvcmQg d2lsbCBleHBpcmUgaW4gNDEgZGF5cyBvbiBGcmkgQXVnICA5IDE1OjA1OjQ1IDIwMTMKCltyb290 QGM2ZGMgbnRwLTQuMi42cDVdIyBrbGlzdApUaWNrZXQgY2FjaGU6IEZJTEU6L3RtcC9rcmI1Y2Nf MApEZWZhdWx0IHByaW5jaXBhbDogPGEgaHJlZj0ibWFpbHRvOm92aXJ0YWRtQE9WVEVTVC5MT0NB TCI+b3ZpcnRhZG1AT1ZURVNULkxPQ0FMPC9hPgoKVmFsaWQgc3RhcnRpbmcgICAgIEV4cGlyZXMg ICAgICAgICAgICBTZXJ2aWNlIHByaW5jaXBhbAowNi8yOC8xMyAxNToxMjozMCAgMDYvMjkvMTMg MDE6MTI6MzAgIGtyYnRndC88YSBocmVmPSJtYWlsdG86T1ZURVNULkxPQ0FMQE9WVEVTVC5MT0NB TCI+T1ZURVNULkxPQ0FMQE9WVEVTVC5MT0NBTDwvYT4KcmVuZXcgdW50aWwgMDcvMDUvMTMgMTU6 MTI6MjcKCgpXaXRob3V0IHB1dHRpbmcgc2FtYmE0IGlwIGluIHJlc29sdi5jb25mIG9mIGVuZ2lu ZSBJIGdvdCB0aGlzIGVycm9yCgpbcm9vdEBmMThlbmdpbmUgfl0jIGVuZ2luZS1tYW5hZ2UtZG9t YWlucyAtYWN0aW9uPWFkZAotZG9tYWluPSdPVlRFU1QuTE9DQUwnIC1wcm92aWRlcj1BY3RpdmVE aXJlY3RvcnkgLXVzZXI9J292aXJ0YWRtJwotaW50ZXJhY3RpdmUKTm8gTERBUCBzZXJ2ZXJzIGNh biBiZSBvYnRhaW5lZCBmb3IgZG9tYWluIG92dGVzdC5sb2NhbAoKTm93Cltyb290QGYxOGVuZ2lu ZSB+XSMgZW5naW5lLW1hbmFnZS1kb21haW5zIC1hY3Rpb249YWRkCi1kb21haW49J09WVEVTVC5M T0NBTCcgLXByb3ZpZGVyPUFjdGl2ZURpcmVjdG9yeSAtdXNlcj0nb3ZpcnRhZG0nCi1pbnRlcmFj dGl2ZQpFbnRlciBwYXNzd29yZDoKClRoZSBkb21haW4gb3Z0ZXN0LmxvY2FsIGhhcyBiZWVuIGFk ZGVkIHRvIHRoZSBlbmdpbmUgYXMgYW4KYXV0aGVudGljYXRpb24gc291cmNlIGJ1dCBubyB1c2Vy cyBmcm9tIHRoYXQgZG9tYWluIGhhdmUgYmVlbiBncmFudGVkCnBlcm1pc3Npb25zIHdpdGhpbiB0 aGUgb1ZpcnQgTWFuYWdlci4KVXNlcnMgZnJvbSB0aGlzIGRvbWFpbiBjYW4gYmUgZ3JhbnRlZCBw ZXJtaXNzaW9ucyBmcm9tIHRoZSBXZWIKYWRtaW5pc3RyYXRpb24gaW50ZXJmYWNlLgpvVmlydCBF bmdpbmUgcmVzdGFydCBpcyByZXF1aXJlZCBpbiBvcmRlciBmb3IgdGhlIGNoYW5nZXMgdG8gdGFr ZQpwbGFjZSAoc2VydmljZSBvdmlydC1lbmdpbmUgcmVzdGFydCkuCk1hbmFnZSBEb21haW5zIGNv bXBsZXRlZCBzdWNjZXNzZnVsbHkKCnJlc3RhcnQgZW5naW5lIHdpdGgKCnN5c3RlbWN0bCByZXN0 YXJ0IG92aXJ0LWVuZ2luZQoKVGhlbiBJIGFkZGVkIHRoZSB1c2VyIHRvIG92aXJ0IGluIHdlYmFk bWluIGd1aToKCkNvbmZpZ3VyZSAtLSZndDsgU3lzdGVtIFBlcm1pc3Npb25zIC0tJmd0OyBBZGQK U2VsZWN0ZWQgb3ZpcnRhZG0gYW5kIGl0cyBkb21haW4gb3Z0ZXN0LmxvY2FsIGFuZCBnaXZlIGhp bSBTdXBlclVzZXIgcm9sZQoKVHJpZWQgdG8gc3VjY2Vzc2Z1bGx5IGNvbm5lY3QgdG8gV2ViYWRt aW4gR3VpIGFuZCBjcmVhdGUgb25lIFZNIGFzIGEgdGVzdAoKSElIIG90aGVycy4KCkknbSBnb2lu ZyB0byBzZWUgaWYgdGhpcyB3b3JrcyB3aXRoIFZNd2FyZSB0b28uLi4uCgpHaWFubHVjYQpfX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwpVc2VycyBtYWlsaW5n IGxpc3QKPGEgaHJlZj0ibWFpbHRvOlVzZXJzQG92aXJ0Lm9yZyI+VXNlcnNAb3ZpcnQub3JnPC9h Pgo8YSBocmVmPSJodHRwOi8vbGlzdHMub3ZpcnQub3JnL21haWxtYW4vbGlzdGluZm8vdXNlcnMi Pmh0dHA6Ly9saXN0cy5vdmlydC5vcmcvbWFpbG1hbi9saXN0aW5mby91c2VyczwvYT4KPC9wcmU+ DQo8L2Jsb2NrcXVvdGU+DQo8YnI+DQo8dGFibGUgY2VsbHNwYWNpbmc9IjAiIGNlbGxwYWRkaW5n PSIwIiB3aWR0aD0iMTAwJSI+DQo8dGJvZHk+DQo8dHI+DQo8dGQ+LS0gPGJyPg0KPGJyPg0KTWVk IFbDpG5saWdhIEjDpGxzbmluZ2FyPGJyPg0KLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLTxicj4NCkth cmxpIFNqw7ZiZXJnPGJyPg0KU3dlZGlzaCBVbml2ZXJzaXR5IG9mIEFncmljdWx0dXJhbCBTY2ll bmNlczxicj4NCkJveCA3MDc5IChWaXNpdGluZyBBZGRyZXNzIEtyb27DpXN2w6RnZW4gOCk8YnI+ DQpTLTc1MCAwNyBVcHBzYWxhLCBTd2VkZW48YnI+DQpQaG9uZTogJm5ic3A7JiM0Mzs0Ni0oMCkx OC02NyAxNSA2Njxicj4NCjxhIGhyZWY9Im1haWx0bzprYXJsaS5zam9iZXJnQGFkbS5zbHUuc2Ui PmthcmxpLnNqb2JlcmdAc2x1LnNlPC9hPiA8L3RkPg0KPC90cj4NCjwvdGJvZHk+DQo8L3RhYmxl Pg0KPC9ib2R5Pg0KPC9odG1sPg0K --_000_5F9E965F5A80BC468BE5F40576769F092E6EE955exchange21_--
participants (4)
-
Charlie
-
Gianluca Cecchi
-
Juan Jose
-
Karli Sjöberg