1 | '\" t
|
---|
2 | .\" Title: pam_winbind
|
---|
3 | .\" Author: [see the "AUTHOR" section]
|
---|
4 | .\" Generator: DocBook XSL Stylesheets v1.75.2 <http://docbook.sf.net/>
|
---|
5 | .\" Date: 12/14/2012
|
---|
6 | .\" Manual: 8
|
---|
7 | .\" Source: Samba 3.5
|
---|
8 | .\" Language: English
|
---|
9 | .\"
|
---|
10 | .TH "PAM_WINBIND" "8" "12/14/2012" "Samba 3\&.5" "8"
|
---|
11 | .\" -----------------------------------------------------------------
|
---|
12 | .\" * set default formatting
|
---|
13 | .\" -----------------------------------------------------------------
|
---|
14 | .\" disable hyphenation
|
---|
15 | .nh
|
---|
16 | .\" disable justification (adjust text to left margin only)
|
---|
17 | .ad l
|
---|
18 | .\" -----------------------------------------------------------------
|
---|
19 | .\" * MAIN CONTENT STARTS HERE *
|
---|
20 | .\" -----------------------------------------------------------------
|
---|
21 | .SH "NAME"
|
---|
22 | pam_winbind \- PAM module for Winbind
|
---|
23 | .SH "DESCRIPTION"
|
---|
24 | .PP
|
---|
25 | This tool is part of the
|
---|
26 | \fBsamba\fR(7)
|
---|
27 | suite\&.
|
---|
28 | .PP
|
---|
29 | pam_winbind is a PAM module that can authenticate users against the local domain by talking to the Winbind daemon\&.
|
---|
30 | .SH "SYNOPSIS"
|
---|
31 | .PP
|
---|
32 | Edit the PAM system config /etc/pam\&.d/service and modify it as the following example shows:
|
---|
33 | .sp
|
---|
34 | .if n \{\
|
---|
35 | .RS 4
|
---|
36 | .\}
|
---|
37 | .nf
|
---|
38 | \&.\&.\&.
|
---|
39 | auth required pam_env\&.so
|
---|
40 | auth sufficient pam_unix2\&.so
|
---|
41 | +++ auth required pam_winbind\&.so use_first_pass
|
---|
42 | account requisite pam_unix2\&.so
|
---|
43 | +++ account required pam_winbind\&.so use_first_pass
|
---|
44 | +++ password sufficient pam_winbind\&.so
|
---|
45 | password requisite pam_pwcheck\&.so cracklib
|
---|
46 | password required pam_unix2\&.so use_authtok
|
---|
47 | session required pam_unix2\&.so
|
---|
48 | +++ session required pam_winbind\&.so
|
---|
49 | \&.\&.\&.
|
---|
50 |
|
---|
51 | .fi
|
---|
52 | .if n \{\
|
---|
53 | .RE
|
---|
54 | .\}
|
---|
55 | .sp
|
---|
56 | Make sure that pam_winbind is one of the first modules in the session part\&. It may retrieve kerberos tickets which are needed by other modules\&.
|
---|
57 | .SH "OPTIONS"
|
---|
58 | .PP
|
---|
59 | pam_winbind supports several options which can either be set in the PAM configuration files or in the pam_winbind configuration file situated at
|
---|
60 | /etc/security/pam_winbind\&.conf\&. Options from the PAM configuration file take precedence to those from the configuration file\&. See
|
---|
61 | \fBpam_winbind.conf\fR(5)
|
---|
62 | for further details\&.
|
---|
63 | .PP
|
---|
64 | debug
|
---|
65 | .RS 4
|
---|
66 | Gives debugging output to syslog\&.
|
---|
67 | .RE
|
---|
68 | .PP
|
---|
69 | debug_state
|
---|
70 | .RS 4
|
---|
71 | Gives detailed PAM state debugging output to syslog\&.
|
---|
72 | .RE
|
---|
73 | .PP
|
---|
74 | require_membership_of=[SID or NAME]
|
---|
75 | .RS 4
|
---|
76 | If this option is set, pam_winbind will only succeed if the user is a member of the given SID or NAME\&. A SID can be either a group\-SID, an alias\-SID or even an user\-SID\&. It is also possible to give a NAME instead of the SID\&. That name must have the form:
|
---|
77 | \fIMYDOMAIN\e\emygroup\fR
|
---|
78 | or
|
---|
79 | \fIMYDOMAIN\e\emyuser\fR\&. pam_winbind will, in that case, lookup the SID internally\&. Note that NAME may not contain any spaces\&. It is thus recommended to only use SIDs\&. You can verify the list of SIDs a user is a member of with
|
---|
80 | wbinfo \-\-user\-sids=SID\&.
|
---|
81 | .RE
|
---|
82 | .PP
|
---|
83 | use_first_pass
|
---|
84 | .RS 4
|
---|
85 | By default, pam_winbind tries to get the authentication token from a previous module\&. If no token is available it asks the user for the old password\&. With this option, pam_winbind aborts with an error if no authentication token from a previous module is available\&.
|
---|
86 | .RE
|
---|
87 | .PP
|
---|
88 | try_first_pass
|
---|
89 | .RS 4
|
---|
90 | Same as the use_first_pass option (previous item), except that if the primary password is not valid, PAM will prompt for a password\&.
|
---|
91 | .RE
|
---|
92 | .PP
|
---|
93 | use_authtok
|
---|
94 | .RS 4
|
---|
95 | Set the new password to the one provided by the previously stacked password module\&. If this option is not set pam_winbind will ask the user for the new password\&.
|
---|
96 | .RE
|
---|
97 | .PP
|
---|
98 | krb5_auth
|
---|
99 | .RS 4
|
---|
100 | pam_winbind can authenticate using Kerberos when winbindd is talking to an Active Directory domain controller\&. Kerberos authentication must be enabled with this parameter\&. When Kerberos authentication can not succeed (e\&.g\&. due to clock skew), winbindd will fallback to samlogon authentication over MSRPC\&. When this parameter is used in conjunction with
|
---|
101 | \fIwinbind refresh tickets\fR, winbind will keep your Ticket Granting Ticket (TGT) uptodate by refreshing it whenever necessary\&.
|
---|
102 | .RE
|
---|
103 | .PP
|
---|
104 | krb5_ccache_type=[type]
|
---|
105 | .RS 4
|
---|
106 | When pam_winbind is configured to try kerberos authentication by enabling the
|
---|
107 | \fIkrb5_auth\fR
|
---|
108 | option, it can store the retrieved Ticket Granting Ticket (TGT) in a credential cache\&. The type of credential cache can be set with this option\&. Currently the only supported value is:
|
---|
109 | \fIFILE\fR\&. In that case a credential cache in the form of /tmp/krb5cc_UID will be created, where UID is replaced with the numeric user id\&. Leave empty to just do kerberos authentication without having a ticket cache after the logon has succeeded\&.
|
---|
110 | .RE
|
---|
111 | .PP
|
---|
112 | cached_login
|
---|
113 | .RS 4
|
---|
114 | Winbind allows to logon using cached credentials when
|
---|
115 | \fIwinbind offline logon\fR
|
---|
116 | is enabled\&. To use this feature from the PAM module this option must be set\&.
|
---|
117 | .RE
|
---|
118 | .PP
|
---|
119 | silent
|
---|
120 | .RS 4
|
---|
121 | Do not emit any messages\&.
|
---|
122 | .RE
|
---|
123 | .PP
|
---|
124 | mkhomedir
|
---|
125 | .RS 4
|
---|
126 | Create homedirectory for a user on\-the\-fly, option is valid in PAM session block\&.
|
---|
127 | .RE
|
---|
128 | .PP
|
---|
129 | warn_pwd_expire
|
---|
130 | .RS 4
|
---|
131 | Defines number of days before pam_winbind starts to warn about passwords that are going to expire\&. Defaults to 14 days\&.
|
---|
132 | .RE
|
---|
133 | .SH "PAM DATA EXPORTS"
|
---|
134 | .PP
|
---|
135 | This section describes the data exported in the PAM stack which could be used in other PAM modules\&.
|
---|
136 | .PP
|
---|
137 | PAM_WINBIND_HOMEDIR
|
---|
138 | .RS 4
|
---|
139 | This is the Windows Home Directory set in the profile tab in the user settings on the Active Directory Server\&. This could be a local path or a directory on a share mapped to a drive\&.
|
---|
140 | .RE
|
---|
141 | .PP
|
---|
142 | PAM_WINBIND_LOGONSCRIPT
|
---|
143 | .RS 4
|
---|
144 | The path to the logon script which should be executed if a user logs in\&. This is normally a relative path to the script stored on the server\&.
|
---|
145 | .RE
|
---|
146 | .PP
|
---|
147 | PAM_WINBIND_LOGONSERVER
|
---|
148 | .RS 4
|
---|
149 | This exports the Active Directory server we are authenticating against\&. This can be used as a variable later\&.
|
---|
150 | .RE
|
---|
151 | .PP
|
---|
152 | PAM_WINBIND_PROFILEPATH
|
---|
153 | .RS 4
|
---|
154 | This is the profile path set in the profile tab in the user settings\&. Normally the home directory is synced with this directory on a share\&.
|
---|
155 | .RE
|
---|
156 | .SH "SEE ALSO"
|
---|
157 | .PP
|
---|
158 | \fBpam_winbind.conf\fR(5),
|
---|
159 | \fBwbinfo\fR(1),
|
---|
160 | \fBwinbindd\fR(8),
|
---|
161 | \fBsmb.conf\fR(5)
|
---|
162 | .SH "VERSION"
|
---|
163 | .PP
|
---|
164 | This man page is correct for version 3 of Samba\&.
|
---|
165 | .SH "AUTHOR"
|
---|
166 | .PP
|
---|
167 | The original Samba software and related utilities were created by Andrew Tridgell\&. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed\&.
|
---|
168 | .PP
|
---|
169 | This manpage was written by Jelmer Vernooij and Guenther Deschner\&.
|
---|