1WBINFO(1)                        User Commands                       WBINFO(1)
2
3
4

NAME

6       wbinfo - Query information from winbind daemon
7

SYNOPSIS

9       wbinfo [-a user%password] [--all-domains] [--allocate-gid]
10        [--allocate-uid] [-c] [--ccache-save] [--change-user-password]
11        [-D domain] [--dc-info domain] [--domain domain]
12        [--dsgetdcname domain] [-g] [--getdcname domain] [--get-auth-user]
13        [-G gid] [--gid-info gid] [--group-info group] [--help|-?] [-i user]
14        [-I ip] [-K user%password] [--krb5ccname cctype] [--lanman] [--logoff]
15        [--logoff-uid uid] [--logoff-user username] [--lookup-sids] [-m]
16        [-n name] [-N netbios-name] [--ntlmv1] [--ntlmv2] [--online-status]
17        [--own-domain] [-p] [-P|--ping-dc] [--pam-logon user%password]
18        [-r user] [-R|--lookup-rids] [--remove-gid-mapping gid,sid]
19        [--remove-uid-mapping uid,sid] [-s sid] [--separator] [--sequence]
20        [--set-auth-user user%password] [--set-gid-mapping gid,sid]
21        [--set-uid-mapping uid,sid] [-S sid] [--sid-aliases sid]
22        [--sid-to-fullname sid] [--sids-to-unix-ids sidlist] [-t] [-u]
23        [--uid-info uid] [--usage] [--user-domgroups sid] [--user-sidinfo sid]
24        [--user-sids sid] [-U uid] [-V] [--verbose] [-Y sid]
25

DESCRIPTION

27       This tool is part of the samba(7) suite.
28
29       The wbinfo program queries and returns information created and used by
30       the winbindd(8) daemon.
31
32       The winbindd(8) daemon must be configured and running for the wbinfo
33       program to be able to return information.
34

OPTIONS

36       -a|--authenticate username%password
37           Attempt to authenticate a user via winbindd(8). This checks both
38           authentication methods and reports its results.
39
40               Note
41               Do not be tempted to use this functionality for authentication
42               in third-party applications. Instead use ntlm_auth(1).
43
44       --allocate-gid
45           Get a new GID out of idmap
46
47       --allocate-uid
48           Get a new UID out of idmap
49
50       --all-domains
51           List all domains (trusted and own domain).
52
53       -c|--change-secret
54           Change the trust account password. May be used in conjunction with
55           domain in order to change interdomain trust account passwords.
56
57       --ccache-save username%password
58           Store user and password for ccache.
59
60       --change-user-password username
61           Change the password of a user. The old and new password will be
62           prompted.
63
64       --dc-info domain
65           Displays information about the current domain controller for a
66           domain.
67
68       --domain name
69           This parameter sets the domain on which any specified operations
70           will performed. If special domain name '.' is used to represent the
71           current domain to which winbindd(8) belongs. A '*' as the domain
72           name means to enumerate over all domains (NOTE: This can take a
73           long time and use a lot of memory).
74
75       -D|--domain-info domain
76           Show most of the info we have about the specified domain.
77
78       --dsgetdcname domain
79           Find a DC for a domain.
80
81       --gid-info gid
82           Get group info from gid.
83
84       --group-info group
85           Get group info from group name.
86
87       -g|--domain-groups
88           This option will list all groups available in the Windows NT domain
89           for which the samba(7) daemon is operating in. Groups in all
90           trusted domains can be listed with the --domain='*' option. Note
91           that this operation does not assign group ids to any groups that
92           have not already been seen by winbindd(8).
93
94       --get-auth-user
95           Print username and password used by winbindd(8) during session
96           setup to a domain controller. Username and password can be set
97           using --set-auth-user. Only available for root.
98
99       --getdcname domain
100           Get the DC name for the specified domain.
101
102       -G|--gid-to-sid gid
103           Try to convert a UNIX group id to a Windows NT SID. If the gid
104           specified does not refer to one within the idmap gid range then the
105           operation will fail.
106
107       -?
108           Print brief help overview.
109
110       -i|--user-info user
111           Get user info.
112
113       -I|--WINS-by-ip ip
114           The -I option queries winbindd(8) to send a node status request to
115           get the NetBIOS name associated with the IP address specified by
116           the ip parameter.
117
118       -K|--krb5auth username%password
119           Attempt to authenticate a user via Kerberos.
120
121       --krb5ccname KRB5CCNAME
122           Allows one to request a specific kerberos credential cache type
123           used for authentication.
124
125       --lanman
126           Use lanman cryptography for user authentication.
127
128       --logoff
129           Logoff a user.
130
131       --logoff-uid UID
132           Define user uid used during logoff request.
133
134       --logoff-user USERNAME
135           Define username used during logoff request.
136
137       --lookup-sids SID1,SID2...
138           Looks up SIDs. SIDs must be specified as ASCII strings in the
139           traditional Microsoft format. For example,
140           S-1-5-21-1455342024-3071081365-2475485837-500.
141
142       -m|--trusted-domains
143           Produce a list of domains trusted by the Windows NT server
144           winbindd(8) contacts when resolving names. This list does not
145           include the Windows NT domain the server is a Primary Domain
146           Controller for.
147
148       -n|--name-to-sid name
149           The -n option queries winbindd(8) for the SID associated with the
150           name specified. Domain names can be specified before the user name
151           by using the winbind separator character. For example
152           CWDOM1/Administrator refers to the Administrator user in the domain
153           CWDOM1. If no domain is specified then the domain used is the one
154           specified in the smb.conf(5) workgroup parameter.
155
156       -N|--WINS-by-name name
157           The -N option queries winbindd(8) to query the WINS server for the
158           IP address associated with the NetBIOS name specified by the name
159           parameter.
160
161       --ntlmv1
162           Use NTLMv1 cryptography for user authentication.
163
164       --ntlmv2
165           Use NTLMv2 cryptography for user authentication. NTLMv2 is the
166           default method, this option is only maintained for compatibility.
167
168       --online-status domain
169           Display whether winbind currently maintains an active connection or
170           not. An optional domain argument limits the output to the online
171           status of a given domain.
172
173       --own-domain
174           List own domain.
175
176       --pam-logon username%password
177           Attempt to authenticate a user in the same way pam_winbind would
178           do.
179
180       -p|--ping
181           Check whether winbindd(8) is still alive. Prints out either
182           'succeeded' or 'failed'.
183
184       -P|--ping-dc
185           Issue a no-effect command to our DC. This checks if our secure
186           channel connection to our domain controller is still alive. It has
187           much less impact than wbinfo -t.
188
189       -r|--user-groups username
190           Try to obtain the list of UNIX group ids to which the user belongs.
191           This only works for users defined on a Domain Controller.
192
193           There are two scenaries:
194
195                   1. User authenticated: When the user has been
196                      authenticated, the access token for the user is cached.
197                      The correct group memberships are then returned from the
198                      cached user token (which can be outdated).
199
200                   2. User *NOT* authenticated: The information is queries
201                      from the domain controller using the machine account
202                      credentials which have limited permissions. The result
203                      is normally incomplete and can be also incorrect.
204
205
206       -R|--lookup-rids rid1, rid2, rid3...
207           Converts RIDs to names. Uses a comma separated list of rids.
208
209       --remove-gid-mapping GID,SID
210           Removes an existing GID to SID mapping from the database.
211
212       --remove-uid-mapping UID,SID
213           Removes an existing UID to SID mapping from the database.
214
215       -s|--sid-to-name sid
216           Use -s to resolve a SID to a name. This is the inverse of the -n
217           option above. SIDs must be specified as ASCII strings in the
218           traditional Microsoft format. For example,
219           S-1-5-21-1455342024-3071081365-2475485837-500.
220
221       --separator
222           Get the active winbind separator.
223
224       --sequence
225           This command has been deprecated. Please use the --online-status
226           option instead.
227
228       --set-auth-user username%password
229           Store username and password used by winbindd(8) during session
230           setup to a domain controller. This enables winbindd to operate in a
231           Windows 2000 domain with Restrict Anonymous turned on (a.k.a.
232           Permissions compatible with Windows 2000 servers only).
233
234       --set-gid-mapping GID,SID
235           Create a GID to SID mapping in the database.
236
237       --set-uid-mapping UID,SID
238           Create a UID to SID mapping in the database.
239
240       -S|--sid-to-uid sid
241           Convert a SID to a UNIX user id. If the SID does not correspond to
242           a UNIX user mapped by winbindd(8) then the operation will fail.
243
244       --sid-aliases sid
245           Get SID aliases for a given SID.
246
247       --sid-to-fullname sid
248           Converts a SID to a full username (DOMAIN\username).
249
250       --sids-to-unix-ids sid1,sid2,sid3...
251           Resolve SIDs to Unix IDs. SIDs must be specified as ASCII strings
252           in the traditional Microsoft format. For example,
253           S-1-5-21-1455342024-3071081365-2475485837-500.
254
255       -t|--check-secret
256           Verify that the workstation trust account created when the Samba
257           server is added to the Windows NT domain is working. May be used in
258           conjunction with domain in order to verify interdomain trust
259           accounts.
260
261       -u|--domain-users
262           This option will list all users available in the Windows NT domain
263           for which the winbindd(8) daemon is operating in. Users in all
264           trusted domains can be listed with the --domain='*' option. Note
265           that this operation does not assign user ids to any users that have
266           not already been seen by winbindd(8) .
267
268       --uid-info uid
269           Get user info for the user connected to user id UID.
270
271       --usage
272           Print brief help overview.
273
274       --user-domgroups sid
275           Get user domain groups.
276
277       --user-sidinfo sid
278           Get user info by sid.
279
280       --user-sids sid
281           Get user group SIDs for user.
282
283       -U|--uid-to-sid uid
284           Try to convert a UNIX user id to a Windows NT SID. If the uid
285           specified does not refer to one within the idmap range then the
286           operation will fail.
287
288       --verbose
289           Print additional information about the query results.
290
291       -Y|--sid-to-gid sid
292           Convert a SID to a UNIX group id. If the SID does not correspond to
293           a UNIX group mapped by winbindd(8) then the operation will fail.
294
295       -V|--version
296           Prints the program version number.
297
298       -?|--help
299           Print a summary of command line options.
300

EXIT STATUS

302       The wbinfo program returns 0 if the operation succeeded, or 1 if the
303       operation failed. If the winbindd(8) daemon is not working wbinfo will
304       always return failure.
305

VERSION

307       This man page is part of version 4.12.2 of the Samba suite.
308

SEE ALSO

310       winbindd(8) and ntlm_auth(1)
311

AUTHOR

313       The original Samba software and related utilities were created by
314       Andrew Tridgell. Samba is now developed by the Samba Team as an Open
315       Source project similar to the way the Linux kernel is developed.
316
317       wbinfo and winbindd were written by Tim Potter.
318
319       The conversion to DocBook for Samba 2.2 was done by Gerald Carter. The
320       conversion to DocBook XML 4.2 for Samba 3.0 was done by Alexander
321       Bokovoy.
322
323
324
325Samba 4.12.2                      04/28/2020                         WBINFO(1)
Impressum