source: vendor/3.6.23/docs/manpages/pam_winbind.8

Last change on this file was 860, checked in by Silvan Scherrer, 11 years ago

Samba 3.6: updated vendor to latest version

File size: 6.8 KB
Line 
1'\" t
2.\" Title: pam_winbind
3.\" Author: [see the "AUTHOR" section]
4.\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
5.\" Date: 09/18/2013
6.\" Manual: 8
7.\" Source: Samba 3.6
8.\" Language: English
9.\"
10.TH "PAM_WINBIND" "8" "09/18/2013" "Samba 3\&.6" "8"
11.\" -----------------------------------------------------------------
12.\" * Define some portability stuff
13.\" -----------------------------------------------------------------
14.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
15.\" http://bugs.debian.org/507673
16.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html
17.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
18.ie \n(.g .ds Aq \(aq
19.el .ds Aq '
20.\" -----------------------------------------------------------------
21.\" * set default formatting
22.\" -----------------------------------------------------------------
23.\" disable hyphenation
24.nh
25.\" disable justification (adjust text to left margin only)
26.ad l
27.\" -----------------------------------------------------------------
28.\" * MAIN CONTENT STARTS HERE *
29.\" -----------------------------------------------------------------
30.SH "NAME"
31pam_winbind \- PAM module for Winbind
32.SH "DESCRIPTION"
33.PP
34This tool is part of the
35\fBsamba\fR(7)
36suite\&.
37.PP
38pam_winbind is a PAM module that can authenticate users against the local domain by talking to the Winbind daemon\&.
39.SH "SYNOPSIS"
40.PP
41Edit the PAM system config /etc/pam\&.d/service and modify it as the following example shows:
42.sp
43.if n \{\
44.RS 4
45.\}
46.nf
47 \&.\&.\&.
48 auth required pam_env\&.so
49 auth sufficient pam_unix2\&.so
50 +++ auth required pam_winbind\&.so use_first_pass
51 account requisite pam_unix2\&.so
52 +++ account required pam_winbind\&.so use_first_pass
53 +++ password sufficient pam_winbind\&.so
54 password requisite pam_pwcheck\&.so cracklib
55 password required pam_unix2\&.so use_authtok
56 session required pam_unix2\&.so
57 +++ session required pam_winbind\&.so
58 \&.\&.\&.
59
60.fi
61.if n \{\
62.RE
63.\}
64.sp
65Make sure that pam_winbind is one of the first modules in the session part\&. It may retrieve kerberos tickets which are needed by other modules\&.
66.SH "OPTIONS"
67.PP
68pam_winbind supports several options which can either be set in the PAM configuration files or in the pam_winbind configuration file situated at
69/etc/security/pam_winbind\&.conf\&. Options from the PAM configuration file take precedence to those from the configuration file\&. See
70\fBpam_winbind.conf\fR(5)
71for further details\&.
72.PP
73debug
74.RS 4
75Gives debugging output to syslog\&.
76.RE
77.PP
78debug_state
79.RS 4
80Gives detailed PAM state debugging output to syslog\&.
81.RE
82.PP
83require_membership_of=[SID or NAME]
84.RS 4
85If this option is set, pam_winbind will only succeed if the user is a member of the given SID or NAME\&. A SID can be either a group\-SID, an alias\-SID or even an user\-SID\&. It is also possible to give a NAME instead of the SID\&. That name must have the form:
86\fIMYDOMAIN\e\emygroup\fR
87or
88\fIMYDOMAIN\e\emyuser\fR\&. pam_winbind will, in that case, lookup the SID internally\&. Note that NAME may not contain any spaces\&. It is thus recommended to only use SIDs\&. You can verify the list of SIDs a user is a member of with
89wbinfo \-\-user\-sids=SID\&.
90.RE
91.PP
92use_first_pass
93.RS 4
94By default, pam_winbind tries to get the authentication token from a previous module\&. If no token is available it asks the user for the old password\&. With this option, pam_winbind aborts with an error if no authentication token from a previous module is available\&.
95.RE
96.PP
97try_first_pass
98.RS 4
99Same as the use_first_pass option (previous item), except that if the primary password is not valid, PAM will prompt for a password\&.
100.RE
101.PP
102use_authtok
103.RS 4
104Set the new password to the one provided by the previously stacked password module\&. If this option is not set pam_winbind will ask the user for the new password\&.
105.RE
106.PP
107krb5_auth
108.RS 4
109pam_winbind can authenticate using Kerberos when winbindd is talking to an Active Directory domain controller\&. Kerberos authentication must be enabled with this parameter\&. When Kerberos authentication can not succeed (e\&.g\&. due to clock skew), winbindd will fallback to samlogon authentication over MSRPC\&. When this parameter is used in conjunction with
110\fIwinbind refresh tickets\fR, winbind will keep your Ticket Granting Ticket (TGT) uptodate by refreshing it whenever necessary\&.
111.RE
112.PP
113krb5_ccache_type=[type]
114.RS 4
115When pam_winbind is configured to try kerberos authentication by enabling the
116\fIkrb5_auth\fR
117option, it can store the retrieved Ticket Granting Ticket (TGT) in a credential cache\&. The type of credential cache can be set with this option\&. Currently the only supported value is:
118\fIFILE\fR\&. In that case a credential cache in the form of /tmp/krb5cc_UID will be created, where UID is replaced with the numeric user id\&. Leave empty to just do kerberos authentication without having a ticket cache after the logon has succeeded\&.
119.RE
120.PP
121cached_login
122.RS 4
123Winbind allows to logon using cached credentials when
124\fIwinbind offline logon\fR
125is enabled\&. To use this feature from the PAM module this option must be set\&.
126.RE
127.PP
128silent
129.RS 4
130Do not emit any messages\&.
131.RE
132.PP
133mkhomedir
134.RS 4
135Create homedirectory for a user on\-the\-fly, option is valid in PAM session block\&.
136.RE
137.PP
138warn_pwd_expire
139.RS 4
140Defines number of days before pam_winbind starts to warn about passwords that are going to expire\&. Defaults to 14 days\&.
141.RE
142.SH "PAM DATA EXPORTS"
143.PP
144This section describes the data exported in the PAM stack which could be used in other PAM modules\&.
145.PP
146PAM_WINBIND_HOMEDIR
147.RS 4
148This is the Windows Home Directory set in the profile tab in the user settings on the Active Directory Server\&. This could be a local path or a directory on a share mapped to a drive\&.
149.RE
150.PP
151PAM_WINBIND_LOGONSCRIPT
152.RS 4
153The path to the logon script which should be executed if a user logs in\&. This is normally a relative path to the script stored on the server\&.
154.RE
155.PP
156PAM_WINBIND_LOGONSERVER
157.RS 4
158This exports the Active Directory server we are authenticating against\&. This can be used as a variable later\&.
159.RE
160.PP
161PAM_WINBIND_PROFILEPATH
162.RS 4
163This is the profile path set in the profile tab in the user settings\&. Normally the home directory is synced with this directory on a share\&.
164.RE
165.SH "SEE ALSO"
166.PP
167\fBpam_winbind.conf\fR(5),
168\fBwbinfo\fR(1),
169\fBwinbindd\fR(8),
170\fBsmb.conf\fR(5)
171.SH "VERSION"
172.PP
173This man page is correct for version 3 of Samba\&.
174.SH "AUTHOR"
175.PP
176The original Samba software and related utilities were created by Andrew Tridgell\&. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed\&.
177.PP
178This manpage was written by Jelmer Vernooij and Guenther Deschner\&.
Note: See TracBrowser for help on using the repository browser.