1WBINFO(1) User Commands WBINFO(1)
2
3
4
6 wbinfo - Query information from winbind daemon
7
9 wbinfo [-a user%password] [--all-domains] [--allocate-gid]
10 [--allocate-uid] [-c] [--ccache-save] [--change-user-password]
11 [-D domain] [--dc-info domain] [--domain domain]
12 [--dsgetdcname domain] [-g] [--getdcname domain] [--get-auth-user]
13 [-G gid] [--gid-info gid] [--group-info group] [--help|-?] [-i user]
14 [-I ip] [-K user%password] [--krb5ccname cctype] [--lanman] [--logoff]
15 [--logoff-uid uid] [--logoff-user username] [--lookup-sids] [-m]
16 [-n name] [-N netbios-name] [--ntlmv1] [--ntlmv2] [--online-status]
17 [--own-domain] [-p] [-P|--ping-dc] [--pam-logon user%password]
18 [-r user] [-R|--lookup-rids] [--remove-gid-mapping gid,sid]
19 [--remove-uid-mapping uid,sid] [-s sid] [--separator] [--sequence]
20 [--set-auth-user user%password] [--set-gid-mapping gid,sid]
21 [--set-uid-mapping uid,sid] [-S sid] [--sid-aliases sid]
22 [--sid-to-fullname sid] [--sids-to-unix-ids sidlist] [-t] [-u]
23 [--uid-info uid] [--usage] [--user-domgroups sid] [--user-sidinfo sid]
24 [--user-sids sid] [-U uid] [-V] [--verbose] [-Y sid]
25
27 This tool is part of the samba(7) suite.
28
29 The wbinfo program queries and returns information created and used by
30 the winbindd(8) daemon.
31
32 The winbindd(8) daemon must be configured and running for the wbinfo
33 program to be able to return information.
34
36 -a|--authenticate username%password
37 Attempt to authenticate a user via winbindd(8). This checks both
38 authentication methods and reports its results.
39
40 Note
41 Do not be tempted to use this functionality for authentication
42 in third-party applications. Instead use ntlm_auth(1).
43
44 --allocate-gid
45 Get a new GID out of idmap
46
47 --allocate-uid
48 Get a new UID out of idmap
49
50 --all-domains
51 List all domains (trusted and own domain).
52
53 -c|--change-secret
54 Change the trust account password. May be used in conjunction with
55 domain in order to change interdomain trust account passwords.
56
57 --ccache-save username%password
58 Store user and password for ccache.
59
60 --change-user-password username
61 Change the password of a user. The old and new password will be
62 prompted.
63
64 --dc-info domain
65 Displays information about the current domain controller for a
66 domain.
67
68 --domain name
69 This parameter sets the domain on which any specified operations
70 will performed. If special domain name '.' is used to represent the
71 current domain to which winbindd(8) belongs. A '*' as the domain
72 name means to enumerate over all domains (NOTE: This can take a
73 long time and use a lot of memory).
74
75 -D|--domain-info domain
76 Show most of the info we have about the specified domain.
77
78 --dsgetdcname domain
79 Find a DC for a domain.
80
81 --gid-info gid
82 Get group info from gid.
83
84 --group-info group
85 Get group info from group name.
86
87 -g|--domain-groups
88 This option will list all groups available in the Windows NT domain
89 for which the samba(7) daemon is operating in. Groups in all
90 trusted domains can be listed with the --domain='*' option. Note
91 that this operation does not assign group ids to any groups that
92 have not already been seen by winbindd(8).
93
94 --get-auth-user
95 Print username and password used by winbindd(8) during session
96 setup to a domain controller. Username and password can be set
97 using --set-auth-user. Only available for root.
98
99 --getdcname domain
100 Get the DC name for the specified domain.
101
102 -G|--gid-to-sid gid
103 Try to convert a UNIX group id to a Windows NT SID. If the gid
104 specified does not refer to one within the idmap gid range then the
105 operation will fail.
106
107 -?
108 Print brief help overview.
109
110 -i|--user-info user
111 Get user info.
112
113 -I|--WINS-by-ip ip
114 The -I option queries winbindd(8) to send a node status request to
115 get the NetBIOS name associated with the IP address specified by
116 the ip parameter.
117
118 -K|--krb5auth username%password
119 Attempt to authenticate a user via Kerberos.
120
121 --krb5ccname KRB5CCNAME
122 Allows one to request a sepcific kerberos credential cache type
123 used for authentication.
124
125 --lanman
126 Use lanman cryptography for user authentication.
127
128 --logoff
129 Logoff a user.
130
131 --logoff-uid UID
132 Define user uid used during logoff request.
133
134 --logoff-user USERNAME
135 Define username used during logoff request.
136
137 --lookup-sids SID1,SID2...
138 Looks up SIDs. SIDs must be specified as ASCII strings in the
139 traditional Microsoft format. For example,
140 S-1-5-21-1455342024-3071081365-2475485837-500.
141
142 -m|--trusted-domains
143 Produce a list of domains trusted by the Windows NT server
144 winbindd(8) contacts when resolving names. This list does not
145 include the Windows NT domain the server is a Primary Domain
146 Controller for.
147
148 -n|--name-to-sid name
149 The -n option queries winbindd(8) for the SID associated with the
150 name specified. Domain names can be specified before the user name
151 by using the winbind separator character. For example
152 CWDOM1/Administrator refers to the Administrator user in the domain
153 CWDOM1. If no domain is specified then the domain used is the one
154 specified in the smb.conf(5) workgroup parameter.
155
156 -N|--WINS-by-name name
157 The -N option queries winbindd(8) to query the WINS server for the
158 IP address associated with the NetBIOS name specified by the name
159 parameter.
160
161 --ntlmv1
162 Use NTLMv1 cryptography for user authentication.
163
164 --ntlmv2
165 Use NTLMv2 cryptography for user authentication. NTLMv2 is the
166 default method, this option is only maintained for compatibility.
167
168 --online-status domain
169 Display whether winbind currently maintains an active connection or
170 not. An optional domain argument limits the output to the online
171 status of a given domain.
172
173 --own-domain
174 List own domain.
175
176 --pam-logon username%password
177 Attempt to authenticate a user in the same way pam_winbind would
178 do.
179
180 -p|--ping
181 Check whether winbindd(8) is still alive. Prints out either
182 'succeeded' or 'failed'.
183
184 -P|--ping-dc
185 Issue a no-effect command to our DC. This checks if our secure
186 channel connection to our domain controller is still alive. It has
187 much less impact than wbinfo -t.
188
189 -r|--user-groups username
190 Try to obtain the list of UNIX group ids to which the user belongs.
191 This only works for users defined on a Domain Controller.
192
193 There are two scenaries:
194
195 1. User authenticated: When the user has been
196 authenticated, the access token for the user is cached.
197 The correct group memberships are then returned from the
198 cached user token (which can be outdated).
199
200 2. User *NOT* authenticated: The information is queries
201 from the domain controller using the machine account
202 credentials which have limited permissions. The result
203 is normally incomplete and can be also incorrect.
204
205
206 -R|--lookup-rids rid1, rid2, rid3...
207 Converts RIDs to names. Uses a comma separated list of rids.
208
209 --remove-gid-mapping GID,SID
210 Removes an existing GID to SID mapping from the database.
211
212 --remove-uid-mapping UID,SID
213 Removes an existing UID to SID mapping from the database.
214
215 -s|--sid-to-name sid
216 Use -s to resolve a SID to a name. This is the inverse of the -n
217 option above. SIDs must be specified as ASCII strings in the
218 traditional Microsoft format. For example,
219 S-1-5-21-1455342024-3071081365-2475485837-500.
220
221 --separator
222 Get the active winbind separator.
223
224 --sequence
225 This command has been deprecated. Please use the --online-status
226 option instead.
227
228 --set-auth-user username%password
229 Store username and password used by winbindd(8) during session
230 setup to a domain controller. This enables winbindd to operate in a
231 Windows 2000 domain with Restrict Anonymous turned on (a.k.a.
232 Permissions compatible with Windows 2000 servers only).
233
234 --set-gid-mapping GID,SID
235 Create a GID to SID mapping in the database.
236
237 --set-uid-mapping UID,SID
238 Create a UID to SID mapping in the database.
239
240 -S|--sid-to-uid sid
241 Convert a SID to a UNIX user id. If the SID does not correspond to
242 a UNIX user mapped by winbindd(8) then the operation will fail.
243
244 --sid-aliases sid
245 Get SID aliases for a given SID.
246
247 --sid-to-fullname sid
248 Converts a SID to a full username (DOMAIN\username).
249
250 --sids-to-unix-ids sid1,sid2,sid3...
251 Resolve SIDs to Unix IDs. SIDs must be specified as ASCII strings
252 in the traditional Microsoft format. For example,
253 S-1-5-21-1455342024-3071081365-2475485837-500.
254
255 -t|--check-secret
256 Verify that the workstation trust account created when the Samba
257 server is added to the Windows NT domain is working. May be used in
258 conjunction with domain in order to verify interdomain trust
259 accounts.
260
261 -u|--domain-users
262 This option will list all users available in the Windows NT domain
263 for which the winbindd(8) daemon is operating in. Users in all
264 trusted domains can be listed with the --domain='*' option. Note
265 that this operation does not assign user ids to any users that have
266 not already been seen by winbindd(8) .
267
268 --uid-info uid
269 Get user info for the user connected to user id UID.
270
271 --usage
272 Print brief help overview.
273
274 --user-domgroups sid
275 Get user domain groups.
276
277 --user-sidinfo sid
278 Get user info by sid.
279
280 --user-sids sid
281 Get user group SIDs for user.
282
283 -U|--uid-to-sid uid
284 Try to convert a UNIX user id to a Windows NT SID. If the uid
285 specified does not refer to one within the idmap range then the
286 operation will fail.
287
288 --verbose
289 Print additional information about the query results.
290
291 -Y|--sid-to-gid sid
292 Convert a SID to a UNIX group id. If the SID does not correspond to
293 a UNIX group mapped by winbindd(8) then the operation will fail.
294
295 -V|--version
296 Prints the program version number.
297
298 -?|--help
299 Print a summary of command line options.
300
302 The wbinfo program returns 0 if the operation succeeded, or 1 if the
303 operation failed. If the winbindd(8) daemon is not working wbinfo will
304 always return failure.
305
307 This man page is part of version 4.11.4 of the Samba suite.
308
310 winbindd(8) and ntlm_auth(1)
311
313 The original Samba software and related utilities were created by
314 Andrew Tridgell. Samba is now developed by the Samba Team as an Open
315 Source project similar to the way the Linux kernel is developed.
316
317 wbinfo and winbindd were written by Tim Potter.
318
319 The conversion to DocBook for Samba 2.2 was done by Gerald Carter. The
320 conversion to DocBook XML 4.2 for Samba 3.0 was done by Alexander
321 Bokovoy.
322
323
324
325Samba 4.11.4 12/16/2019 WBINFO(1)