Tomikat, are you using Mac OS X 10.5?
In this case this will be done differently:
Open Directory Utility and click Services.
If the lock icon is locked, unlock it by clicking it and entering the name and password of an administrator.
In the list of services, select Active Directory and click the Edit (/) button.
Enter the DNS name of the Active Directory domain you want to bind to the computer you’re configuring.
The administrator of the Active Directory domain can tell you the DNS name to enter.
If necessary, edit the Computer ID.
The Computer ID is the name by which the computer is known in the Active Directory domain, and it’s preset to the name of the computer. You might change this to conform to your organization’s established scheme for naming computers in the Active Directory domain. If you’re not sure, ask the Active Directory domain administrator.
(Optional) Set advanced options.
If the advanced options are hidden, click Show Advanced Options and set options in the User Experience, Mappings, and Administrative panes. You can also change the advanced option settings later.
Click Bind, authenticate as a user who has rights to bind a computer to the Active Directory domain, select the search policies you want Active Directory added to (see below), and click OK:
- Username and Password: You may be able to authenticate by entering the name and password of your Active Directory user account, or the Active Directory domain administrator might need to provide a name and password.
- Computer OU: Enter the organizational unit (OU) for the computer you’re configuring.
- Use for authentication: Use to determine whether Active Directory is added to the computer’s authentication search policy.
- Use for contacts: Use to determine whether Active Directory is added to the computer’s contacts search policy.
When you click OK, Directory Utility sets up trusted binding between the computer you’re configuring and the Active Directory server. The computer’s search policies are set according to the options you selected when you authenticated, and Active Directory is enabled in Directory Utility’s Services pane.
With the default settings for Active Directory advanced options, the Active Directory forest is added to the computer’s authentication search policy and contacts search policy if you selected “Use for authentication” or “Use for contacts.”
However, if you deselect “Allow authentication from any domain in the forest” in the Administrative advanced options pane before clicking Bind, the nearest Active Directory domain is added instead of the forest.
You can change search policies later by adding or removing the Active Directory forest or individual domains.
(Optional) Join the server to the Active Directory Kerberos realm.
On the server or an administrator computer that can connect to the server, open Server Admin and select Open Directory for the server. Click Settings, then click General. Click Join Kerberos, then choose the Active Directory Kerberos realm from the pop-up menu and enter credentials for a local administrator on this server.
WARNING: Advanced options of the Active Directory plug-in can map you to the Mac OS X unique user ID (UID), primary group ID (GID), and group GID attribute to the correct attributes that have been added to the Active Directory schema. If you change the setting of these mapping options later, users might lose access to previously created files.
IMPORTANT: If your computer name contains a hyphen you may not be able to join or bind to a Directory Domain such as LDAP or Active Directory. To establish binding, use a computer name that does not contain a hyphen.