1 | <?xml version="1.0" encoding="iso-8859-1"?>
|
---|
2 | <!DOCTYPE refentry PUBLIC "-//Samba-Team//DTD DocBook V4.2-Based Variant V1.0//EN" "http://www.samba.org/samba/DTD/samba-doc">
|
---|
3 | <refentry id="pam_winbind.8">
|
---|
4 |
|
---|
5 | <refmeta>
|
---|
6 | <refentrytitle>pam_winbind</refentrytitle>
|
---|
7 | <manvolnum>8</manvolnum>
|
---|
8 | <refmiscinfo class="source">Samba</refmiscinfo>
|
---|
9 | <refmiscinfo class="manual">8</refmiscinfo>
|
---|
10 | <refmiscinfo class="version">3.6</refmiscinfo>
|
---|
11 | </refmeta>
|
---|
12 |
|
---|
13 |
|
---|
14 | <refnamediv>
|
---|
15 | <refname>pam_winbind</refname>
|
---|
16 | <refpurpose>PAM module for Winbind</refpurpose>
|
---|
17 | </refnamediv>
|
---|
18 |
|
---|
19 | <refsect1>
|
---|
20 | <title>DESCRIPTION</title>
|
---|
21 |
|
---|
22 | <para>This tool is part of the <citerefentry><refentrytitle>samba</refentrytitle>
|
---|
23 | <manvolnum>7</manvolnum></citerefentry> suite.</para>
|
---|
24 |
|
---|
25 | <para>
|
---|
26 | pam_winbind is a PAM module that can authenticate users against the local domain by talking to the Winbind daemon.
|
---|
27 | </para>
|
---|
28 |
|
---|
29 | </refsect1>
|
---|
30 |
|
---|
31 | <refsect1>
|
---|
32 | <title>SYNOPSIS</title>
|
---|
33 |
|
---|
34 | <para>
|
---|
35 | Edit the PAM system config /etc/pam.d/service and modify it as the following example shows:
|
---|
36 | <programlisting>
|
---|
37 | ...
|
---|
38 | auth required pam_env.so
|
---|
39 | auth sufficient pam_unix2.so
|
---|
40 | +++ auth required pam_winbind.so use_first_pass
|
---|
41 | account requisite pam_unix2.so
|
---|
42 | +++ account required pam_winbind.so use_first_pass
|
---|
43 | +++ password sufficient pam_winbind.so
|
---|
44 | password requisite pam_pwcheck.so cracklib
|
---|
45 | password required pam_unix2.so use_authtok
|
---|
46 | session required pam_unix2.so
|
---|
47 | +++ session required pam_winbind.so
|
---|
48 | ...
|
---|
49 | </programlisting>
|
---|
50 |
|
---|
51 | Make sure that pam_winbind is one of the first modules in the session part. It may retrieve
|
---|
52 | kerberos tickets which are needed by other modules.
|
---|
53 | </para>
|
---|
54 | </refsect1>
|
---|
55 |
|
---|
56 | <refsect1>
|
---|
57 | <title>OPTIONS</title>
|
---|
58 | <para>
|
---|
59 |
|
---|
60 | pam_winbind supports several options which can either be set in
|
---|
61 | the PAM configuration files or in the pam_winbind configuration
|
---|
62 | file situated at
|
---|
63 | <filename>/etc/security/pam_winbind.conf</filename>. Options
|
---|
64 | from the PAM configuration file take precedence to those from
|
---|
65 | the configuration file. See
|
---|
66 | <citerefentry><refentrytitle>pam_winbind.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>
|
---|
67 | for further details.
|
---|
68 |
|
---|
69 | <variablelist>
|
---|
70 |
|
---|
71 | <varlistentry>
|
---|
72 | <term>debug</term>
|
---|
73 | <listitem><para>Gives debugging output to syslog.</para></listitem>
|
---|
74 | </varlistentry>
|
---|
75 |
|
---|
76 | <varlistentry>
|
---|
77 | <term>debug_state</term>
|
---|
78 | <listitem><para>Gives detailed PAM state debugging output to syslog.</para></listitem>
|
---|
79 | </varlistentry>
|
---|
80 |
|
---|
81 | <varlistentry>
|
---|
82 | <term>require_membership_of=[SID or NAME]</term>
|
---|
83 | <listitem><para>
|
---|
84 | If this option is set, pam_winbind will only succeed if the user is a member of the given SID or NAME. A SID
|
---|
85 | can be either a group-SID, an alias-SID or even an user-SID. It is also possible to give a NAME instead of the
|
---|
86 | SID. That name must have the form: <parameter>MYDOMAIN\\mygroup</parameter> or
|
---|
87 | <parameter>MYDOMAIN\\myuser</parameter>. pam_winbind will, in that case, lookup the SID internally. Note that
|
---|
88 | NAME may not contain any spaces. It is thus recommended to only use SIDs. You can verify the list of SIDs a
|
---|
89 | user is a member of with <command>wbinfo --user-sids=SID</command>.
|
---|
90 | </para></listitem>
|
---|
91 | </varlistentry>
|
---|
92 |
|
---|
93 | <varlistentry>
|
---|
94 | <term>use_first_pass</term>
|
---|
95 | <listitem><para>
|
---|
96 | By default, pam_winbind tries to get the authentication token from a previous module. If no token is available
|
---|
97 | it asks the user for the old password. With this option, pam_winbind aborts with an error if no authentication
|
---|
98 | token from a previous module is available.
|
---|
99 | </para></listitem>
|
---|
100 | </varlistentry>
|
---|
101 |
|
---|
102 | <varlistentry>
|
---|
103 | <term>try_first_pass</term>
|
---|
104 | <listitem><para>
|
---|
105 | Same as the use_first_pass option (previous item), except that if the primary password is not
|
---|
106 | valid, PAM will prompt for a password.
|
---|
107 | </para></listitem>
|
---|
108 | </varlistentry>
|
---|
109 |
|
---|
110 | <varlistentry>
|
---|
111 | <term>use_authtok</term>
|
---|
112 | <listitem><para>
|
---|
113 | Set the new password to the one provided by the previously stacked password module. If this option is not set
|
---|
114 | pam_winbind will ask the user for the new password.
|
---|
115 | </para></listitem>
|
---|
116 | </varlistentry>
|
---|
117 |
|
---|
118 | <varlistentry>
|
---|
119 | <term>krb5_auth</term>
|
---|
120 | <listitem><para>
|
---|
121 |
|
---|
122 | pam_winbind can authenticate using Kerberos when winbindd is
|
---|
123 | talking to an Active Directory domain controller. Kerberos
|
---|
124 | authentication must be enabled with this parameter. When
|
---|
125 | Kerberos authentication can not succeed (e.g. due to clock
|
---|
126 | skew), winbindd will fallback to samlogon authentication over
|
---|
127 | MSRPC. When this parameter is used in conjunction with
|
---|
128 | <parameter>winbind refresh tickets</parameter>, winbind will
|
---|
129 | keep your Ticket Granting Ticket (TGT) uptodate by refreshing
|
---|
130 | it whenever necessary.
|
---|
131 |
|
---|
132 | </para></listitem>
|
---|
133 | </varlistentry>
|
---|
134 |
|
---|
135 | <varlistentry>
|
---|
136 | <term>krb5_ccache_type=[type]</term>
|
---|
137 | <listitem><para>
|
---|
138 |
|
---|
139 | When pam_winbind is configured to try kerberos authentication
|
---|
140 | by enabling the <parameter>krb5_auth</parameter> option, it can
|
---|
141 | store the retrieved Ticket Granting Ticket (TGT) in a
|
---|
142 | credential cache. The type of credential cache can be set with
|
---|
143 | this option. Currently the only supported value is:
|
---|
144 | <parameter>FILE</parameter>. In that case a credential cache in
|
---|
145 | the form of /tmp/krb5cc_UID will be created, where UID is
|
---|
146 | replaced with the numeric user id. Leave empty to just do
|
---|
147 | kerberos authentication without having a ticket cache after the
|
---|
148 | logon has succeeded.
|
---|
149 |
|
---|
150 | </para></listitem>
|
---|
151 | </varlistentry>
|
---|
152 |
|
---|
153 | <varlistentry>
|
---|
154 | <term>cached_login</term>
|
---|
155 | <listitem><para>
|
---|
156 | Winbind allows to logon using cached credentials when <parameter>winbind offline logon</parameter> is enabled. To use this feature from the PAM module this option must be set.
|
---|
157 | </para></listitem>
|
---|
158 | </varlistentry>
|
---|
159 |
|
---|
160 | <varlistentry>
|
---|
161 | <term>silent</term>
|
---|
162 | <listitem><para>
|
---|
163 | Do not emit any messages.
|
---|
164 | </para></listitem>
|
---|
165 | </varlistentry>
|
---|
166 |
|
---|
167 | <varlistentry>
|
---|
168 | <term>mkhomedir</term>
|
---|
169 | <listitem><para>
|
---|
170 | Create homedirectory for a user on-the-fly, option is valid in
|
---|
171 | PAM session block.
|
---|
172 | </para></listitem>
|
---|
173 | </varlistentry>
|
---|
174 |
|
---|
175 | <varlistentry>
|
---|
176 | <term>warn_pwd_expire</term>
|
---|
177 | <listitem><para>
|
---|
178 | Defines number of days before pam_winbind starts to warn about passwords that are
|
---|
179 | going to expire. Defaults to 14 days.
|
---|
180 | </para></listitem>
|
---|
181 | </varlistentry>
|
---|
182 |
|
---|
183 | </variablelist>
|
---|
184 |
|
---|
185 | </para>
|
---|
186 |
|
---|
187 | </refsect1>
|
---|
188 |
|
---|
189 | <refsect1>
|
---|
190 | <title>PAM DATA EXPORTS</title>
|
---|
191 |
|
---|
192 | <para>This section describes the data exported in the PAM stack which could be used in other PAM modules.</para>
|
---|
193 |
|
---|
194 | <varlistentry>
|
---|
195 | <term>PAM_WINBIND_HOMEDIR</term>
|
---|
196 | <listitem>
|
---|
197 | <para>
|
---|
198 | This is the Windows Home Directory set in the profile tab in the user settings
|
---|
199 | on the Active Directory Server. This could be a local path or a directory on a
|
---|
200 | share mapped to a drive.
|
---|
201 | </para>
|
---|
202 | </listitem>
|
---|
203 | </varlistentry>
|
---|
204 | <varlistentry>
|
---|
205 | <term>PAM_WINBIND_LOGONSCRIPT</term>
|
---|
206 | <listitem>
|
---|
207 | <para>
|
---|
208 | The path to the logon script which should be executed if a user logs in. This is
|
---|
209 | normally a relative path to the script stored on the server.
|
---|
210 | </para>
|
---|
211 | </listitem>
|
---|
212 | </varlistentry>
|
---|
213 | <varlistentry>
|
---|
214 | <term>PAM_WINBIND_LOGONSERVER</term>
|
---|
215 | <listitem>
|
---|
216 | <para>
|
---|
217 | This exports the Active Directory server we are authenticating against. This can be
|
---|
218 | used as a variable later.
|
---|
219 | </para>
|
---|
220 | </listitem>
|
---|
221 | </varlistentry>
|
---|
222 | <varlistentry>
|
---|
223 | <term>PAM_WINBIND_PROFILEPATH</term>
|
---|
224 | <listitem>
|
---|
225 | <para>
|
---|
226 | This is the profile path set in the profile tab in the user settings. Normally
|
---|
227 | the home directory is synced with this directory on a share.
|
---|
228 | </para>
|
---|
229 | </listitem>
|
---|
230 | </varlistentry>
|
---|
231 | </refsect1>
|
---|
232 |
|
---|
233 | <refsect1>
|
---|
234 | <title>SEE ALSO</title>
|
---|
235 | <para><citerefentry>
|
---|
236 | <refentrytitle>pam_winbind.conf</refentrytitle>
|
---|
237 | <manvolnum>5</manvolnum></citerefentry>, <citerefentry>
|
---|
238 | <refentrytitle>wbinfo</refentrytitle>
|
---|
239 | <manvolnum>1</manvolnum></citerefentry>, <citerefentry>
|
---|
240 | <refentrytitle>winbindd</refentrytitle>
|
---|
241 | <manvolnum>8</manvolnum></citerefentry>, <citerefentry>
|
---|
242 | <refentrytitle>smb.conf</refentrytitle>
|
---|
243 | <manvolnum>5</manvolnum></citerefentry></para>
|
---|
244 | </refsect1>
|
---|
245 |
|
---|
246 | <refsect1>
|
---|
247 | <title>VERSION</title>
|
---|
248 |
|
---|
249 | <para>This man page is correct for version 3 of Samba.</para>
|
---|
250 | </refsect1>
|
---|
251 |
|
---|
252 | <refsect1>
|
---|
253 | <title>AUTHOR</title>
|
---|
254 |
|
---|
255 | <para>
|
---|
256 | The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by
|
---|
257 | the Samba Team as an Open Source project similar to the way the Linux kernel is developed.
|
---|
258 | </para>
|
---|
259 |
|
---|
260 | <para>This manpage was written by Jelmer Vernooij and Guenther Deschner.</para>
|
---|
261 |
|
---|
262 | </refsect1>
|
---|
263 |
|
---|
264 | </refentry>
|
---|