Centrify Express Unix Agent Guide
Centrify Express Unix Agent Guide
Centrify Corporation
• • • • • •
Legal Notice
This document and the software described in this document are furnished under and are subject to the
terms of a license agreement or a non-disclosure agreement. Except as expressly set forth in such license
agreement or non-disclosure agreement, Centrify Corporation provides this document and the software
described in this document “as is” without warranty of any kind, either express or implied, including, but
not limited to, the implied warranties of merchantability or fitness for a particular purpose. Some states do
not allow disclaimers of express or implied warranties in certain transactions; therefore, this statement
may not apply to you.
This document and the software described in this document may not be lent, sold, or given away without
the prior written permission of Centrify Corporation, except as otherwise permitted by law. Except as
expressly set forth in such license agreement or non-disclosure agreement, no part of this document or
the software described in this document may be reproduced, stored in a retrieval system, or transmitted
in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of
Centrify Corporation. Some companies, names, and data in this document are used for illustration
purposes and may not represent real companies, individuals, or data.
This document could include technical inaccuracies or typographical errors. Changes are periodically
made to the information herein. These changes may be incorporated in new editions of this document.
Centrify Corporation may make improvements in or changes to the software described in this document at
any time.
© 2004-2019 Centrify Corporation. All rights reserved. Portions of Centrify software are derived from
third party or open source software. Copyright and legal notices for these sources are listed separately in
the Acknowledgements.txt file included with the software.
U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf
of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in
accordance with 48 C.F.R. 227.7202-4 (for Department of Defense (DOD) acquisitions) and 48 C.F.R. 2.101
and 12.212 (for non-DOD acquisitions), the government’s rights in the software and documentation,
including its rights to use, modify, reproduce, release, perform, display or disclose the software or
documentation, will be subject in all respects to the commercial license rights and restrictions provided in
the license agreement.
Centrify software is protected by U.S. Patents 7,591,005; 8,024,360; 8,321,523; 9,015,103; 9,112,846;
9,197,670; 9,442,962 and 9,378,391.
The names of any other companies and products mentioned in this document may be the trademarks or
registered trademarks of their respective owners. Unless otherwise noted, all of the names used as
examples of companies, organizations, domain names, people and events herein are fictitious. No
association with any real company, organization, domain name, person, or event is intended or should be
inferred.
Contents
About this guide 5
Intended audience 5
Documentation conventions 6
Product names 7
Contacting Centrify 10
Introduction 11
Key components 11
Provisioning is automatic 14
Using Samba 37
Configuring logging 40
Contents 4
• • • • • •
The Express Administrator’s Guide for Linux and UNIX describes how to install,
configure, and use the components in Centrify Express for UNIX and Linux.
Centrify Express products are available for free to provide identity and access
control for cross-platform data centers using Active Directory. With support
for a wide range of operating systems, hypervisors, and applications, Centrify
agents can help your organization strengthen security and regulatory
compliance while reducing IT expenses and costly interruptions to user
productivity.
Intended audience
This guide is intended for system and network administrators who are
responsible for managing user access to servers, workstations, and network
resources.
Documentation conventions
Contents 6
• • • • • •
For access to documentation for all Centrify products and services, visit the
Centrify documentation portal at docs.centrify.com. From the Centrify
documentation portal, you can always view or download the most up-to-date
version of this guide and all other product documentation.
For details about supported platforms, please consult the release notes.
For the most up to date list of known issues, please login to the Customer
Support Portal at http://www.centrify.com/support and refer to Knowledge
Base articles for any known issues with the release.
Product names
Over the years we've made some changes to some of our product offerings
and features and some of these previous product names still exist in some
areas. Our current product offerings include the following services:
Whether you're a long-time or new customer, here are some quick summaries
of which features belong to which current product offerings:
Contents 8
• • • • • •
Depending on when you purchased a Centrify product offering, you may have
purchased one of the following product bundles:
Contacting Centrify
If you have a Centrify account, click Support on the Centrify website to log on
and access the Centrify Technical Support Portal. From the support portal,
you can search knowledge base articles, open and view support cases,
download software, and access other resources.
To connect with other Centrify users, ask questions, or share information, visit
the Centrify Community website to check in on customer forums, read the
latest blog posts, view how-to videos, or exchange ideas with members of the
community.
Contents 10
• • • • • •
Introduction
This chapter provides an introduction to Centrify Express for Linux and UNIX,
including a brief overview of how Centrify can help you take advantage of your
investment in Active Directory.
Key components
The following table describes features that are limited or not enabled in
Centrify Express.
Introduction 12
• • • • • •
The agent makes a computer look and behave like a Windows client computer
to Active Directory. The agent performs the following key tasks:
Other services handle specific types of operations. For example, the pam_
centrifydc module enables any PAM-enabled program, such as ftpd,
telnetd, login, and sshd, to authenticate using Active Directory. A custom
NSS module modifies the nsswitch.conf configuration file so that system
look-up requests use the information in Active Directory. A configurable local
cache stores user credentials and other information for offline access and
network efficiency.
Provisioning is automatic
When you deploy an agent on a computer, the agent adds the computer
account to Active Directory and automatically creates consistent UIDs across
the joined domain for Active Directory users with access to the computer. The
agent authenticates all valid Active Directory users without any configuration
or account management. Because there is only one zone for the forest, you
can deploy without creating any zones of your own. Because profiles are
generated automatically, you do not need to configure any zone properties or
manage who has access to which subsets of UNIX and Linux computers.
The primary reason to use Centrify Express is that it enables Active Directory
authentication without any planning, manual configuration, or account
management. A primary limitation to using Centrify Express is that all
computers are placed in a single, automatically defined zone.
Zones provide a powerful and flexible structure for managing user identities,
role-based access controls, and delegated administrative authority. However,
deciding on the best strategy for using zones requires some planning and
preparation. If your organization does not require more than one zone, you
can begin deploying agents immediately.
Introduction 14
• • • • • •
If a single zone suits the needs of your organization, Centrify Express provides
a no-cost, cross-platform solution for authentication services. If your
organization grows in size and complexity or if you want more granular access
controls, you can upgrade to a licensed version of Centrify software at a later
time. For more information about centrify service offerings and
authentication, privilege elevation, and audit and monitoring services, see
Comparing Centrify Express to other services.
After you install an agent and join an Active Directory domain, all of the users
and groups in the Active Directory forest automatically become valid users
and groups for the joined computer. In addition, all Active Directory users
defined in any forest with a two-way trust relationship with the forest of the
joined domain are valid users for the joined computer.
When an Active Directory user logs on to a UNIX or Linux computer for the
first time, the agent automatically creates a 31-bit UID for the user and a 31-
bit GID for any groups to which the user belongs. To create unique GIDs and
UIDs, the agent creates a prefix from the last 9 bits of the user or group
Security Identifier and combines it with the lower 22 bits of the user or group
relative identifier (RID).
Although the agent caches these UID and GID values, they are not stored in
Active Directory. You cannot edit or change them in any way with Active
Directory Users and Computers (ADUC). If the cache expires, the agent uses
the same algorithm to create the same UID and GID the next time the user
logs on so you are guaranteed consistent ownership for files and resources.
In addition, users who log on to more than one computer will have the same
generated UID on each managed computer.
In addition to the UID and GID, the agent automatically creates a home
directory for the user with all the associated profile and configuration files.
The location for the home directory is:
Deploying an agent does not affect local users. User accounts that are defined
in the local /etc/passwd directory can still log on. If you want to control
access through Active Directory, however, you should create Active Directory
accounts for each user. After you verify user access for the Active Directory
Introduction 16
• • • • • •
user, you can then either delete the local account, or map the local users on
each computer to an Active Directory account to preserve access to current
home directories and files. For more information about mapping accounts,
see Mapping local accounts to Active Directory.
With Centrify Express, you can discover and analyze computers on your
network or in the cloud, then download and install or update the correct
agent for each discovered computer. You can also use Centrify Express to
manage account information for remote UNIX users and groups, and run
programs on the computers discovered.
Like other Centrify products, you can download Express agents from the
Centrify website.
Application services With application services, you can provide single sign-on
capability and enforce multi-factor authentication when and
where it is needed. You can also define policies to control access
to applications and the use of mobile devices.
Commercial offering that enables you to manage and secure
Mac, Windows, and Linux endpoints.
Endpoint services
With endpoint services, you can establish common cross-
platform policies for remote access, the use of smart cards and
Introduction 18
• • • • • •
This section provides step-by-step instructions for installing the Centrify agent
on a computer and joining the computer to the Active Directory domain.
The agent must be installed on each computer you want to manage. You must
also specify an Active Directory domain for the agent to join either during the
installation process or after the agent files are installed.
You can install Express on a single Windows computer with a 64-bit operating
system.
2 GB RAM
1 GB free disc space
2 GHz processor
If you have a computer that meets the requirements and the appropriate
account information, you can download Express.
You can download individual Centrify agent packages for the platforms you
support and install the software in one of the following ways:
Use the install or update operations in the native package installer for
your operating environment.
If you want to use one of these installation options and need more
information, see the appropriate section.
The installation script automatically checks the operating system, disk space,
DNS resolution, network connectivity, and other requirements on a target
computer before installing. You can run this script interactively on any
supported UNIX, Linux, or Mac computer and respond to the prompts
displayed.
4. Follow the prompts displayed to check the computer for potential issues,
install the agent, and join a domain automatically at the conclusion of
the installation.
If the adcheck program finds potential issues, you might see warning or
error messages. Depending on the issue reported, you might have to
make changes to the computer before continuing or after installation.
For most prompts, you can accept the default by pressing Enter. When
prompted for the Active Directory domain, type the fully qualified name
of the Active Directory domain to join.
You must also type the user name and password for an Active Directory
user with permission to add computers to the domain.
5. After you have responded to all of the prompts displayed, review your
selections, and then enter Y to continue with the installation and reboot
the computer.
3. Run the appropriate command for installing the package based on the
local computer’s operating system or package manager you want to use.
For example, on Red Hat Linux:
rpm -Uvh centrifydc-*-rhel5-x86_64.rpm
When a computer is joined to Active Directory, all Active Directory users and
groups defined for the forest, as well as any users defined in a two-way
trusted forest, are valid users or groups for the joined computer. Therefore,
after running the agent and joining the computer to a domain, you can log on
as any Active Directory user.
You can run adcheck before, during, or after installation to verify that your
computer is configured properly. This utility performs three sets of checks
that are controlled by the following options:
-t os checks the operating system, disk size, and Perl and Samba
installations.
-t net checks DNS to verify that the local computer is configured
correctly and that the DNS server is available and healthy.
-t ad includes the -t net checks and verifies that the domain has a
valid domain controller.
The -t net option performs a series of checks that verify that DNS is correctly
configured on your local computer and that the DNS server is running
properly. There is also a check to verify that you are running a supported
version of OpenSSH.
Because the agent uses DNS to locate the domain controllers for the Active
Directory forest, the appropriate DNS nameservers need to be specified in the
local /etc/resolv.conf file on each computer before the computer can join
the domain. If you receive errors or warnings from these checks, you need to
correct them before joining a domain. Each warning or error message
provides some help to resolve the problem.
The -t ad option locates each domain controller in DNS and then does a port
scan and DNS lookup of each. The checks for this option also verify the global
catalog and verify clock and domain synchronization.
If you receive errors or warnings from these checks, you need to correct them
before joining a domain. Each warning or error message provides some help
to resolve the problem.
When you install the agent using install-express.sh, you can automatically
join that computer to an Active Directory domain. If you do not join the
domain when you run the installation script, or if you leave a domain and
want to rejoin, you can manually join a domain by using the adjoin command.
For example, to join the sales.acme.com domain with the user account
dylan:
adjoin --user dylan --workstation sales.acme.com
The user account you specify must have permission to add computers to
the specified domain. In some organizations, this account must be a
member of the Domain Admins group. In other organizations, the
account simply needs to be a valid domain user account. If you don’t
specify a user with the --user option, the Administrator account is used
by default.
3. Type the password for the specified user account.
If the agent can connect to Active Directory and join the domain, a
confirmation message is displayed. All Active Directory users and groups
defined for the forest, as well as any users defined in a two-way trusted forest
are valid users or groups for the joined computer.
Restarting services
You may need to restart some services on computers where you have
installed the agent so that those services will reread the name switch
configuration file. For example, if you typically log on to the computer through
a graphical desktop manager such as gdm, you need to either restart the gdm
service or reboot the workstation to force the service to read the updated
configuration before Active Directory users can log on.
The most common services that need to be restarted are sshd and gdm. If you
are using these services, you should restart them. For example, to restart
sshd:
/etc/init.d/sshd restart
You can also download an evaluation copy directly from the Centrify
website, but you must have a license key to use the software for more
than a limited period of time.
2. On a Windows computer that is joined to the Active Directory domain,
connect to the distribution media.
If you received the software on a CD, the Getting Started page is
displayed automatically or when you double-click the autorun.exe
program.
3. Click Authentication & Privilegeto start the setup program for
authentication and privilege elevation components.
4. Follow the prompts displayed to accept the license agreement, select the
components to install, and a location for files.
5. When setup is complete for the selected packages, click Finish to close
the setup program.
3. Run the following command to verify that licensing has been enabled:
adinfo
Local host name: qa1
Joined to domain: acme.com
Joined as: qa1.acme.com
Pre-win2K name: qa1
Current DC: acme-dc1.acme.com
Preferred site: Default-First-Site
Zone: Auto Zone
Last password set: 2014-04-01 12:01:31 PST
CentrifyDC mode: connected
Licensed Features: Enabled
For information about creating and managing zones, using group policies, and
other features, see the Planning and Deployment Guide and the Administrator’s
Guide for Windows.
Depending on the services you choose to deploy, there are several optional
packages that might be available for you to use. To add these packages, you
must rerun the installation script and select which packages to install.
On most managed computers, you can remove the agent and related files by
running the uninstall.sh script. The uninstall.sh script is installed by
default in the /usr/share/centrifydc/bin directory on each managed
computer.
If you cannot locate or are unable to run the uninstall.sh script, you can use
the appropriate command for the local package manager or operating
environment to remove the agent and related files.
You log on to a joined computer in the same way you log on locally. For
example, you type a user name and password to start a console session,
remote shell session, or a desktop manager. In most cases, you do not have
to specify the domain name when you log on. However, you do need to type
the Active Directory password for your account and the password must
conform to the password policies defined for the domain.
You can use any of the following formats for the user name when you log on:
You can also use any of these formats to locate users in Active Directory.
After you log on to a computer, you can use the adinfo command to see
information about the Active Directory configuration for the local computer.
For example, type adinfo to display a summary similar to the following:
Local host name: QA1
Joined to domain: sales.acme.com
Joined as: QA1.sales.acme.com
Pre-win2K name: QA1
Current DC: acme-dc1.sales.acme.com
Preferred site: Default-First-Site
Zone: Auto Zone
Last password set: 2014-04-01 12:01:31 PST
CentrifyDC mode: connected
Licensed Features: Disabled
For Centrify Express, licensed features are disabled and the only zone
supported is Auto Zone. If you upgrade at a later time, the licensed features
will be enabled, and you will be able to use zones to provide secure, granular
access control and delegated administration for computers joined to a
domain.
The agent enforces all of the password policies you have defined in Active
Directory for all valid user accounts in the forest. For example, if your policy
requires that new users must change their password the next time they log
on, they are prompted to change the password at the next log-on whether
they use a Windows or UNIX computer.
The agent also checks passwords to make sure that they conform to Active
Directory policies for length and complexity. If a new or changed password
meets all of the criteria, the account is updated with the new information in
Active Directory and the user logs on successfully.
Changing passwords
As an administrator, you can set, reset, or change the password for other
users using Active Directory or from the UNIX command line. Individual users
can also change their own password at any time using the adpasswd
command.
If you attempt to log on but your password has expired, you are prompted to
provide your old password, a new password, and to confirm your new
password. You can also change your own password at any time using
adpasswd.
2. Type your old password. When changing your own password, you must
always provide your old password.
For more information about using adpasswd, see the adpasswd man page.
You can use the adpasswd command to change the password of another
Active Directory user if you provide the user name and password of an
administrative account with the authority to change another user’s password.
1. At the UNIX command line, run the adpasswd command and specify an
Active Directory administrative account name with the authority to
change the password for users in the domain. For example, to use the
admin user account to change the password for the user jane in the
sales.acme.com domain:
adpasswd --adminuser [email protected] [email protected]
3. Type the new password for the user specified. Because you are changing
another user’s password, you are not prompted for an old password.
For example:
New password:
For more information about using adpasswd, see the adpasswd man page.
You can configure many aspects of how credentials are handled, including
how frequently they are updated or discarded, through parameter settings in
the centrifydc.conf configuration file. To configure how credentials are
handled using group policies, you must upgrade to a licensed version of
Centrify software.
By default, local user accounts are valid on the computers that join the Active
Directory domain. In some cases, you may want to manually map a local user
account to an Active Directory account instead of using a generated profile.
Mapping a local user account to an Active Directory account gives you Active
Directory-based control over password policies, such as password length,
complexity, and expiration period.
Mac OS X users can always log on using their local account password.
Therefore, you cannot enforce Active Directory password policies for
local Mac OS X user accounts.
To map a local account to an Active Directory account, you can set the
pam.mapuser.username configuration parameter on any individual local
To map a local user account to an Active Directory user by modifying the local
centrifydc.confconfiguration file:
5. Save the changes to the configuration file, then run the adreload
command to reload the configuration file and have the changes take
effect.
In most cases, every computer should have at least one account that can be
authenticated locally to ensure that you can access the system when the
network or Active Directory is not available or adclient is not running. By
default, the local override account is set to the root user so that even if you
map the root account to an Active Directory account, you can always log on
locally using root@localhost and the local root account password.
You can change the default root override account or add additional local
users by modifying the computer’s centrifydc.conf configuration file. To
configure a local override account using group policies, you must upgrade to
a licensed version of Centrify software.
By default, authorized users can use standard programs and services such as
telnet, ssh, and ftp. For telnet and ftp, you can use the packages installed
with the operating system. For ssh operations, however, Centrify
recommends that you install the Centrify-compiled version of OpenSSH
instead of using the package provided with the operating system. You can
download a free copy of OpenSSH from the Centrify website.
Using Samba
Because Auto Zone is a single zone for an entire forest, you can encounter
problems such as UID and GID conflicts and slow searches. If you encounter
these problems, you may need to modify the default configuration. For
information about how to set specific parameters to resolve UID and GID
conflicts or improve search performance, see Customizing operations using
configuration parameters
This chapter describes how to use diagnostic tools and log files to retrieve
information about the operation of Centrify agents and provides tips to help
you identify and correct problems on managed computers.
If users report that they cannot access computer resources they think they
should have access to, take the following steps to troubleshoot the problem:
1. Verify that the user has an Active Directory user account in the forest or
in a forest with a two-way trust relationship.
2. Check that the account is not disabled or locked out because of repeated
log-on failures.
3. Verify that there is an Active Directory domain controller available and
6. Check the clock synchronization between the local computer and the
Active Directory domain controller.
If the clocks are not synchronized, reset the system clock on the
managed computer using the date command.
7. Check the contents of the system log files or the centrifydc.log file
after the user attempts to log on. You can use information in this file to
help determine whether the issue is with the configuration of the
software or with the user’s account.
8. Check for conflicts between local user accounts and the user profile
generated by the agent.
If these steps do not reveal the problem, you can enable detailed logging of
adclient activity using the addebug command. You can use the information in
The agent includes some basic diagnostic tools and a comprehensive logging
mechanism to help you trace the source of problems if they occur. These
diagnostic tools and log files allow you to periodically check your environment
and view information about agent operation, Active Directory connections,
and the configuration settings for individual computers you manage.
In most cases, you should only enable logging when you need to troubleshoot
unexpected behavior, authentication failures, or problems with connecting to
Active Directory or when requested to do so by Centrify Support. Other
troubleshooting tools, such as command line programs, can be used at any
time to collect or display information about your environment.
Configuring logging
By default, the agent logs errors, warnings and informational messages in the
syslog and /var/log/messages files along with other kernel and program
messages. Although these files contain valuable information for tracking
system operations and troubleshooting issues, occasionally you may find it
useful to activate Centrify-specific logging and record that information in a log
file.
For performance and security reasons, you should only enable logging when
necessary. For example, if you open a case with CentrifySupport, the Support
representative may request that you enable logging and submit log files to
investigate your case. You should also limit logging to short periods of time
while you or Centrify Support attempt to diagnose a problem. You should
keep in mind that sensitive information may be written to this file and you
should evaluate the contents of the file before giving others access to it.
When you are ready to stop logging activity, run the addebug off command.
You can define the level of detail written to the log by setting the log
configuration parameter in the centrifydc.conf configuration file:
log: level
With this parameter, the log level works as a filter to define the type of
information you are interested in and ensure that only the messages that
meet the criteria are written to the log. For example, if you want to see
warning and error messages but not informational messages, you can change
the log level from INFO to WARN. By changing the log level, you can reduce the
number of messages included in the log and record only messages that
indicate a problem. Conversely, if you want to see more detail about system
activity, you can change the log level to INFO or DEBUG to log information
about operations that do not generate any warnings or errors.
You can use the following keywords to specify the type of information you
want to record in the log file:
FATAL In addition to being recorded in the system log, this type of message is typically written
to the user’s console. With this setting, only the most severe problems generate log file
messages.
System error messages for problems that may require operator intervention or from
ERROR which system recovery is not likely.
With this setting, both fatal and less-severe error events generate log file messages.
Warning messages that indicate an undesirable condition or describe a problem from
WARN which system recovery is likely.
With this setting, warnings, errors, and fatal events generate log file messages.
INFO Informational messages that describe operational status or provide event notification.
By default, when you specify a logging level, it applies to all of the agent
components that log activity. The logging system, however, provides a
hierarchical organization of logical log names for the components within the
agent and each of these logical logs can be configured to provide more
targeted analysis of it specific operations. For example, if you set your base
logging level to only report serious errors but you want to see informational,
warning, and error messages for adclient, you can add a separate logging
level parameter for the log messages generated by adclient:
# Use the following setting to set the base level of detail
# for logging to record Error messages:
log: ERROR
# Add the name of the adclient logical log and specify the
# logging level to use for it and its children:
log.com.centrify.adclient: INFO
You can use the adinfo command to display or collect detailed diagnostic and
configuration information for a local computer. Options control the type of
information and level of detail displayed or collected. The options you are
most likely to use to collect diagnostic information are the --config, --diag,
or --support options, which require you to be logged in as root. You can
redirect the output from any adinfo command to a file for further analysis or
to forward information to CentrifySupport.
For more information about the options available and the information
returned with each option, see the adinfo man page.
To display the basic configuration information for the local computer, you can
type:
adinfo
The DNS servers for the enterprise run on UNIX servers that are not
configured to locate Active Directory domain controllers. In many cases,
DNS servers for an enterprise are configured with a different domain
namespace than Active Directory or Active Directory domain controllers
are considered internal servers and not registered in the enterprise
DNS.
server.
Forward and reverse lookup zones should be configured to allow
enterprise DNS servers to locate Active Directory domain controllers.
If the Active Directory domain namespace is different from the
namespace registered in enterprise DNS servers, you should use the --
name and --alias join option to resolve the namespace differences.
If the enterprise DNS servers do not include records for Active Directory
domain controllers, you can manually set the location of the Active
Directory domain controller using parameters in the centrifydc.conf
configuration file.
Using command-line
programs
Command-line programs are installed by default when you install the agent
on a computer. Depending on the operating system, the commands are
typically installed in one of the following directories:
/usr/sbin
/usr/bin
/usr/share/centrifydc/bin
In general, you should only use command-line programs when you must take
action directly on a local computer. For example, if you want to join or leave a
domain or set a new password while logged on to a shell, you may want to run
a command interactively from that shell. You can also use command-line
programs in scripts to perform administrative tasks programmatically.
Program Description
The adcache program enables you to manually clear the local cache on a
adcache
computer or check a cache file for a specific key value.
The adcheck program verifies whether a local computer meets the system
requirements for joining an Active Directory domain. This command checks
adcheck whether the computer has sufficient disk and memory, a supported
operating system and patch level, required libraries, and network
connectivity to an Active Directory domain.
The adclient program manages most agent operations, and is normally
started automatically when a computer starts up. In most cases, you should
adclient
only run adclient directly from the command line if Centrify Support
recommends you do so.
addebug The addebug program starts or stops logging activity for agent operations.
The addns program enables you to dynamically update DNS records on an
addns Active Directory-based DNS server in environments where the DHCP server
cannot update DNS records automatically.
The adedit program enables you to manage Active Directory and the
adedit
agent through command-line commands and scripts.
The adfinddomain program displays the domain controller associated
adfinddomain
with the Active Directory domain you specify.
The adfixid program resolves UID and GID conflicts and enables you to
change the ownership of a local user’s files to match the user and group IDs
adfixid defined for the user in Active
Directory.
adflush The adflush program clears the cache on a local computer.
The adid program displays the real and effective UIDs and GIDs for the
adid
current user or a specified user.
The adinfo program displays summary or detailed diagnostic and
adinfo
configuration information for a computer and its Active Directory domain.
The adjoin program adds a computer to an Active Directory domain. This
command configures a local computer to use Active Directory. No changes
adjoin are made to authentication services or configuration files on a computer
until you run the adjoin command. This command requires you to be logged
on as root.
The adkeytab program enables you to create and manage Kerberos key
adkeytab tables (*.keytab files) and coordinate changes with the Kerberos key
distribution center (KDC) provided by Active Directory.
The adleave program enables you to remove a computer from its current
adleave
Active Directory domain or from the Active Directory forest entirely.
Program Description
The adlicense program enables or disables licensed features on a local
adlicense
computer. This command requires you to be logged on as root.
The adpasswd program changes the Active Directory account password for
adpasswd
a user from within a UNIX shell.
The adquery program enables you to query Active Directory for
adquery information about users and groups from the command line on an agent-
managed computer.
The adreload program forces the adclient process to reload
adreload configuration properties in the /etc/centrifydc.conf file and in
other files in the /etc/centrifydc directory.
The adrmlocal program reports and removes local user names that
adrmlocal
duplicate Active Directory user names.
Other commands that support Centrify operations are also installed in the
directory with the commands shown in the preceding list, but they are not
applicable to Centrify Express agents.
The usage information includes a list of options and arguments, and a brief
description of each option.
For more complete information about any command, you can review the
information in the command’s manual (man) page. For example, to see the
manual page for the adleave command, type:
man adleave
The following configuration parameters affect how user and group profiles
are generated and the operation of a local host computer when the computer
joins the Active Directory domain using Auto Zone.
Mac OS X: /Users/%{user}.
Linux, HP-UX, and AIX: /home/%
{user}
auto.schema.homedir
Solaris: /export/home/%{user}
The variable %{user} is substituted at runtime and
replaced with the logon name of the user who is
logging on. For example, if the user jsmith logs on
to a Centrify Express for Linux and UNIX computer,
the default home directory is set to:
auto.schema.homedir:/allusers/hom
e/%{user}
This parameter is not used if the parameter
auto.schema.use.adhomedir is set to true
and a home directory is defined in Active Directory for
the user.
If auto.schema.use.adhomedir is false or
no home directory is defined for the user in Active
Directory, the home directory is set to the value
defined for this parameter.
Specifies whether or not to use the Active Directory
value for the home directory on Centrify Express for
Linux and UNIX computers.
SMB
AFP
a For example:
uto.schema.remote.file.serv auto.schema.remote.file.service:
ice SMB
On Mac OS X computers, mounting a network
directory requires that you specify the remote file
service type. By identifying the remote file-service
type using this parameter, you can type the network
path in the format required by Active Directory:
/server/share/path
For example:
auto.schema.domain.prefix.acme.com:
3
auto.schema.domain.prefix.
finance.com: 4
auto.schema.domain.prefix.corp.com:
5
For example:
adclient.ntlm.separators: +/\\
The default allows the following formats for the user
joe in the acme.com domain:
adclient.ntlm.separators
acme.com+joe
acme.com/joe
acme.com\joe
Note The backslash character (\) can be problematic
on some UNIX shells, in which case you may need to
specify domain\\user.
If computers cannot find the Active Directory domain controller, you can use
parameters in the centrifydc.conf configuration file to manually identify the
domain controllers and the Global Catalog server. You can also use
configuration parameters to control how the DNS client processes DNS
requests.
You must specify the name of the domain controller, not its
IP address. In addition, the domain controller name must be
resolvable using either DNS or in the local /etc/hosts file.
Therefore, you must add entries to the local /etc/hosts for
each domain controller if you are not using DNS or if the DNS
server cannot locate your domain controllers.
dns.dc.mylab.test: dc1.mylab.test
To specify multiple servers for a domain, use a space to
separate the domain controller server names. For example:
dns.dc.mylab.test: dc1.mylab.test
dc2.mylab.test
The agent will attempt to connect to the domain controllers
in the order specified.
Specifies the domain controller that hosts the Global Catalog
for a domain.
dns.gc.mylab.test: dc3.mylab.test
Controls how frequently the DNS client checks whether there
dns.alive.resweep.inte
is a faster DNS server available. The default interval for this
rval
check is one hour.
Specifies the protocol and response time to use when the
DNS client scans the network for available DNS servers.