source: branches/samba-3.5.x/docs/manpages/pam_winbind.8

Last change on this file was 773, checked in by Herwig Bauernfeind, 12 years ago

Samba Server 3.5: Update branch to 3.5.20

File size: 6.6 KB
Line 
1'\" t
2.\" Title: pam_winbind
3.\" Author: [see the "AUTHOR" section]
4.\" Generator: DocBook XSL Stylesheets v1.75.2 <http://docbook.sf.net/>
5.\" Date: 12/14/2012
6.\" Manual: 8
7.\" Source: Samba 3.5
8.\" Language: English
9.\"
10.TH "PAM_WINBIND" "8" "12/14/2012" "Samba 3\&.5" "8"
11.\" -----------------------------------------------------------------
12.\" * set default formatting
13.\" -----------------------------------------------------------------
14.\" disable hyphenation
15.nh
16.\" disable justification (adjust text to left margin only)
17.ad l
18.\" -----------------------------------------------------------------
19.\" * MAIN CONTENT STARTS HERE *
20.\" -----------------------------------------------------------------
21.SH "NAME"
22pam_winbind \- PAM module for Winbind
23.SH "DESCRIPTION"
24.PP
25This tool is part of the
26\fBsamba\fR(7)
27suite\&.
28.PP
29pam_winbind is a PAM module that can authenticate users against the local domain by talking to the Winbind daemon\&.
30.SH "SYNOPSIS"
31.PP
32Edit the PAM system config /etc/pam\&.d/service and modify it as the following example shows:
33.sp
34.if n \{\
35.RS 4
36.\}
37.nf
38 \&.\&.\&.
39 auth required pam_env\&.so
40 auth sufficient pam_unix2\&.so
41 +++ auth required pam_winbind\&.so use_first_pass
42 account requisite pam_unix2\&.so
43 +++ account required pam_winbind\&.so use_first_pass
44 +++ password sufficient pam_winbind\&.so
45 password requisite pam_pwcheck\&.so cracklib
46 password required pam_unix2\&.so use_authtok
47 session required pam_unix2\&.so
48 +++ session required pam_winbind\&.so
49 \&.\&.\&.
50
51.fi
52.if n \{\
53.RE
54.\}
55.sp
56Make sure that pam_winbind is one of the first modules in the session part\&. It may retrieve kerberos tickets which are needed by other modules\&.
57.SH "OPTIONS"
58.PP
59pam_winbind supports several options which can either be set in the PAM configuration files or in the pam_winbind configuration file situated at
60/etc/security/pam_winbind\&.conf\&. Options from the PAM configuration file take precedence to those from the configuration file\&. See
61\fBpam_winbind.conf\fR(5)
62for further details\&.
63.PP
64debug
65.RS 4
66Gives debugging output to syslog\&.
67.RE
68.PP
69debug_state
70.RS 4
71Gives detailed PAM state debugging output to syslog\&.
72.RE
73.PP
74require_membership_of=[SID or NAME]
75.RS 4
76If this option is set, pam_winbind will only succeed if the user is a member of the given SID or NAME\&. A SID can be either a group\-SID, an alias\-SID or even an user\-SID\&. It is also possible to give a NAME instead of the SID\&. That name must have the form:
77\fIMYDOMAIN\e\emygroup\fR
78or
79\fIMYDOMAIN\e\emyuser\fR\&. pam_winbind will, in that case, lookup the SID internally\&. Note that NAME may not contain any spaces\&. It is thus recommended to only use SIDs\&. You can verify the list of SIDs a user is a member of with
80wbinfo \-\-user\-sids=SID\&.
81.RE
82.PP
83use_first_pass
84.RS 4
85By default, pam_winbind tries to get the authentication token from a previous module\&. If no token is available it asks the user for the old password\&. With this option, pam_winbind aborts with an error if no authentication token from a previous module is available\&.
86.RE
87.PP
88try_first_pass
89.RS 4
90Same as the use_first_pass option (previous item), except that if the primary password is not valid, PAM will prompt for a password\&.
91.RE
92.PP
93use_authtok
94.RS 4
95Set the new password to the one provided by the previously stacked password module\&. If this option is not set pam_winbind will ask the user for the new password\&.
96.RE
97.PP
98krb5_auth
99.RS 4
100pam_winbind can authenticate using Kerberos when winbindd is talking to an Active Directory domain controller\&. Kerberos authentication must be enabled with this parameter\&. When Kerberos authentication can not succeed (e\&.g\&. due to clock skew), winbindd will fallback to samlogon authentication over MSRPC\&. When this parameter is used in conjunction with
101\fIwinbind refresh tickets\fR, winbind will keep your Ticket Granting Ticket (TGT) uptodate by refreshing it whenever necessary\&.
102.RE
103.PP
104krb5_ccache_type=[type]
105.RS 4
106When pam_winbind is configured to try kerberos authentication by enabling the
107\fIkrb5_auth\fR
108option, it can store the retrieved Ticket Granting Ticket (TGT) in a credential cache\&. The type of credential cache can be set with this option\&. Currently the only supported value is:
109\fIFILE\fR\&. In that case a credential cache in the form of /tmp/krb5cc_UID will be created, where UID is replaced with the numeric user id\&. Leave empty to just do kerberos authentication without having a ticket cache after the logon has succeeded\&.
110.RE
111.PP
112cached_login
113.RS 4
114Winbind allows to logon using cached credentials when
115\fIwinbind offline logon\fR
116is enabled\&. To use this feature from the PAM module this option must be set\&.
117.RE
118.PP
119silent
120.RS 4
121Do not emit any messages\&.
122.RE
123.PP
124mkhomedir
125.RS 4
126Create homedirectory for a user on\-the\-fly, option is valid in PAM session block\&.
127.RE
128.PP
129warn_pwd_expire
130.RS 4
131Defines number of days before pam_winbind starts to warn about passwords that are going to expire\&. Defaults to 14 days\&.
132.RE
133.SH "PAM DATA EXPORTS"
134.PP
135This section describes the data exported in the PAM stack which could be used in other PAM modules\&.
136.PP
137PAM_WINBIND_HOMEDIR
138.RS 4
139This is the Windows Home Directory set in the profile tab in the user settings on the Active Directory Server\&. This could be a local path or a directory on a share mapped to a drive\&.
140.RE
141.PP
142PAM_WINBIND_LOGONSCRIPT
143.RS 4
144The path to the logon script which should be executed if a user logs in\&. This is normally a relative path to the script stored on the server\&.
145.RE
146.PP
147PAM_WINBIND_LOGONSERVER
148.RS 4
149This exports the Active Directory server we are authenticating against\&. This can be used as a variable later\&.
150.RE
151.PP
152PAM_WINBIND_PROFILEPATH
153.RS 4
154This is the profile path set in the profile tab in the user settings\&. Normally the home directory is synced with this directory on a share\&.
155.RE
156.SH "SEE ALSO"
157.PP
158\fBpam_winbind.conf\fR(5),
159\fBwbinfo\fR(1),
160\fBwinbindd\fR(8),
161\fBsmb.conf\fR(5)
162.SH "VERSION"
163.PP
164This man page is correct for version 3 of Samba\&.
165.SH "AUTHOR"
166.PP
167The original Samba software and related utilities were created by Andrew Tridgell\&. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed\&.
168.PP
169This manpage was written by Jelmer Vernooij and Guenther Deschner\&.
Note: See TracBrowser for help on using the repository browser.