source: vendor/current/docs/manpages/pam_winbind.8

Last change on this file was 989, checked in by Silvan Scherrer, 9 years ago

Samba Server: update vendor to version 4.4.7

File size: 7.0 KB
Line 
1'\" t
2.\" Title: pam_winbind
3.\" Author: [see the "AUTHOR" section]
4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
5.\" Date: 10/25/2016
6.\" Manual: 8
7.\" Source: Samba 4.4
8.\" Language: English
9.\"
10.TH "PAM_WINBIND" "8" "10/25/2016" "Samba 4\&.4" "8"
11.\" -----------------------------------------------------------------
12.\" * Define some portability stuff
13.\" -----------------------------------------------------------------
14.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
15.\" http://bugs.debian.org/507673
16.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html
17.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
18.ie \n(.g .ds Aq \(aq
19.el .ds Aq '
20.\" -----------------------------------------------------------------
21.\" * set default formatting
22.\" -----------------------------------------------------------------
23.\" disable hyphenation
24.nh
25.\" disable justification (adjust text to left margin only)
26.ad l
27.\" -----------------------------------------------------------------
28.\" * MAIN CONTENT STARTS HERE *
29.\" -----------------------------------------------------------------
30.SH "NAME"
31pam_winbind \- PAM module for Winbind
32.SH "DESCRIPTION"
33.PP
34This tool is part of the
35\fBsamba\fR(7)
36suite\&.
37.PP
38pam_winbind is a PAM module that can authenticate users against the local domain by talking to the Winbind daemon\&.
39.SH "SYNOPSIS"
40.PP
41Edit the PAM system config /etc/pam\&.d/service and modify it as the following example shows:
42.sp
43.if n \{\
44.RS 4
45.\}
46.nf
47 \&.\&.\&.
48 auth required pam_env\&.so
49 auth sufficient pam_unix2\&.so
50 +++ auth required pam_winbind\&.so use_first_pass
51 account requisite pam_unix2\&.so
52 +++ account required pam_winbind\&.so use_first_pass
53 +++ password sufficient pam_winbind\&.so
54 password requisite pam_pwcheck\&.so cracklib
55 password required pam_unix2\&.so use_authtok
56 session required pam_unix2\&.so
57 +++ session required pam_winbind\&.so
58 \&.\&.\&.
59
60.fi
61.if n \{\
62.RE
63.\}
64.sp
65Make sure that pam_winbind is one of the first modules in the session part\&. It may retrieve kerberos tickets which are needed by other modules\&.
66.SH "OPTIONS"
67.PP
68pam_winbind supports several options which can either be set in the PAM configuration files or in the pam_winbind configuration file situated at
69/etc/security/pam_winbind\&.conf\&. Options from the PAM configuration file take precedence to those from the configuration file\&. See
70\fBpam_winbind.conf\fR(5)
71for further details\&.
72.PP
73debug
74.RS 4
75Gives debugging output to syslog\&.
76.RE
77.PP
78debug_state
79.RS 4
80Gives detailed PAM state debugging output to syslog\&.
81.RE
82.PP
83require_membership_of=[SID or NAME]
84.RS 4
85If this option is set, pam_winbind will only succeed if the user is a member of the given SID or NAME\&. A SID can be either a group\-SID, an alias\-SID or even an user\-SID\&. It is also possible to give a NAME instead of the SID\&. That name must have the form:
86\fIMYDOMAIN\e\emygroup\fR
87or
88\fIMYDOMAIN\e\emyuser\fR\&. pam_winbind will, in that case, lookup the SID internally\&. Note that NAME may not contain any spaces\&. It is thus recommended to only use SIDs\&. You can verify the list of SIDs a user is a member of with
89wbinfo \-\-user\-sids=SID\&.
90.sp
91This option must only be specified on a auth module declaration, as it only operates in conjunction with password authentication\&.
92.RE
93.PP
94use_first_pass
95.RS 4
96By default, pam_winbind tries to get the authentication token from a previous module\&. If no token is available it asks the user for the old password\&. With this option, pam_winbind aborts with an error if no authentication token from a previous module is available\&.
97.RE
98.PP
99try_first_pass
100.RS 4
101Same as the use_first_pass option (previous item), except that if the primary password is not valid, PAM will prompt for a password\&.
102.RE
103.PP
104use_authtok
105.RS 4
106Set the new password to the one provided by the previously stacked password module\&. If this option is not set pam_winbind will ask the user for the new password\&.
107.RE
108.PP
109krb5_auth
110.RS 4
111pam_winbind can authenticate using Kerberos when winbindd is talking to an Active Directory domain controller\&. Kerberos authentication must be enabled with this parameter\&. When Kerberos authentication can not succeed (e\&.g\&. due to clock skew), winbindd will fallback to samlogon authentication over MSRPC\&. When this parameter is used in conjunction with
112\fIwinbind refresh tickets\fR, winbind will keep your Ticket Granting Ticket (TGT) uptodate by refreshing it whenever necessary\&.
113.RE
114.PP
115krb5_ccache_type=[type]
116.RS 4
117When pam_winbind is configured to try kerberos authentication by enabling the
118\fIkrb5_auth\fR
119option, it can store the retrieved Ticket Granting Ticket (TGT) in a credential cache\&. The type of credential cache can be set with this option\&. Currently the only supported value is:
120\fIFILE\fR\&. In that case a credential cache in the form of /tmp/krb5cc_UID will be created, where UID is replaced with the numeric user id\&. Leave empty to just do kerberos authentication without having a ticket cache after the logon has succeeded\&.
121.RE
122.PP
123cached_login
124.RS 4
125Winbind allows one to logon using cached credentials when
126\fIwinbind offline logon\fR
127is enabled\&. To use this feature from the PAM module this option must be set\&.
128.RE
129.PP
130silent
131.RS 4
132Do not emit any messages\&.
133.RE
134.PP
135mkhomedir
136.RS 4
137Create homedirectory for a user on\-the\-fly, option is valid in PAM session block\&.
138.RE
139.PP
140warn_pwd_expire
141.RS 4
142Defines number of days before pam_winbind starts to warn about passwords that are going to expire\&. Defaults to 14 days\&.
143.RE
144.SH "PAM DATA EXPORTS"
145.PP
146This section describes the data exported in the PAM stack which could be used in other PAM modules\&.
147.PP
148PAM_WINBIND_HOMEDIR
149.RS 4
150This is the Windows Home Directory set in the profile tab in the user settings on the Active Directory Server\&. This could be a local path or a directory on a share mapped to a drive\&.
151.RE
152.PP
153PAM_WINBIND_LOGONSCRIPT
154.RS 4
155The path to the logon script which should be executed if a user logs in\&. This is normally a relative path to the script stored on the server\&.
156.RE
157.PP
158PAM_WINBIND_LOGONSERVER
159.RS 4
160This exports the Active Directory server we are authenticating against\&. This can be used as a variable later\&.
161.RE
162.PP
163PAM_WINBIND_PROFILEPATH
164.RS 4
165This is the profile path set in the profile tab in the user settings\&. Normally the home directory is synced with this directory on a share\&.
166.RE
167.SH "SEE ALSO"
168.PP
169\fBpam_winbind.conf\fR(5),
170\fBwbinfo\fR(1),
171\fBwinbindd\fR(8),
172\fBsmb.conf\fR(5)
173.SH "VERSION"
174.PP
175This man page is correct for version 3 of Samba\&.
176.SH "AUTHOR"
177.PP
178The original Samba software and related utilities were created by Andrew Tridgell\&. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed\&.
179.PP
180This manpage was written by Jelmer Vernooij and Guenther Deschner\&.
Note: See TracBrowser for help on using the repository browser.