wbinfo1SambaUser Commands3.6wbinfoQuery information from winbind daemonwbinfo-a user%password--all-domains--allocate-gid--allocate-uid-c-D domain--domain domain-g--getdcname domain--get-auth-user-G gid-h-i user-I ip-K user%password-m-n name-N netbios-name--own-domain-p-P-r user-s sid--separator--set-auth-user user%password-S sid-t-u--uid-info uid--user-domgroups sid--user-sids sid-U uid-V-Y sid--verboseDESCRIPTIONThis tool is part of the samba7 suite.The wbinfo program queries and returns information
created and used by the winbindd8 daemon. The winbindd8 daemon must be configured
and running for the wbinfo program to be able
to return information.OPTIONS-a|--authenticate username%passwordAttempt to authenticate a user via winbindd8.
This checks both authentication methods and reports its results.
Do not be tempted to use this
functionality for authentication in third-party
applications. Instead use ntlm_auth1.--allocate-gidGet a new GID out of idmap
--allocate-uidGet a new UID out of idmap
--all-domainsList all domains (trusted and
own domain).
-c|--change-secretChange the trust account password. May be used
in conjunction with in order to change
interdomain trust account passwords.
--domain nameThis parameter sets the domain on which any specified
operations will performed. If special domain name '.' is used to represent
the current domain to which winbindd8 belongs. Currently only the
, and options honor this parameter.
-D|--domain-info domainShow most of the info we have about the
specified domain.
-g|--domain-groupsThis option will list all groups available
in the Windows NT domain for which the samba7 daemon is operating in. Groups in all trusted domains
will also be listed. Note that this operation does not assign
group ids to any groups that have not already been
seen by winbindd8. --get-auth-userPrint username and password used by winbindd8
during session setup to a domain controller. Username
and password can be set using .
Only available for root.--getdcname domainGet the DC name for the specified domain.
-G|--gid-to-sid gidTry to convert a UNIX group id to a Windows
NT SID. If the gid specified does not refer to one within
the idmap gid range then the operation will fail. -i|--user-info userGet user info.
-I|--WINS-by-ip ipThe -I option
queries winbindd8 to send a node status
request to get the NetBIOS name associated with the IP address
specified by the ip parameter.
-K|--krb5auth username%passwordAttempt to authenticate a user via Kerberos.
-m|--trusted-domainsProduce a list of domains trusted by the
Windows NT server winbindd8 contacts
when resolving names. This list does not include the Windows
NT domain the server is a Primary Domain Controller for.
-n|--name-to-sid nameThe -n option
queries winbindd8 for the SID
associated with the name specified. Domain names can be specified
before the user name by using the winbind separator character.
For example CWDOM1/Administrator refers to the Administrator
user in the domain CWDOM1. If no domain is specified then the
domain used is the one specified in the smb.conf5workgroup
parameter. -N|--WINS-by-name nameThe -N option
queries winbindd8 to query the WINS
server for the IP address associated with the NetBIOS name
specified by the name parameter.
--own-domainList own domain.
-p|--pingCheck whether winbindd8 is still alive.
Prints out either 'succeeded' or 'failed'.
-P|--ping-dcIssue a no-effect command to our DC. This
checks if our secure channel connection to our domain
controller is still alive. It has much less impact than
wbinfo -t.
-r|--user-groups usernameTry to obtain the list of UNIX group ids
to which the user belongs. This only works for users
defined on a Domain Controller.
-s|--sid-to-name sidUse -s to resolve
a SID to a name. This is the inverse of the -n
option above. SIDs must be specified as ASCII strings
in the traditional Microsoft format. For example,
S-1-5-21-1455342024-3071081365-2475485837-500. --separatorGet the active winbind separator.
--set-auth-user username%passwordStore username and password used by winbindd8 during session setup to a domain controller. This enables
winbindd to operate in a Windows 2000 domain with Restrict
Anonymous turned on (a.k.a. Permissions compatible with
Windows 2000 servers only).
-S|--sid-to-uid sidConvert a SID to a UNIX user id. If the SID
does not correspond to a UNIX user mapped by winbindd8 then the operation will fail. -t|--check-secretVerify that the workstation trust account
created when the Samba server is added to the Windows NT
domain is working. May be used in conjunction with
in order to verify interdomain
trust accounts.-u|--domain-usersThis option will list all users available
in the Windows NT domain for which the winbindd8 daemon is operating in. Users in all trusted domains
will also be listed. Note that this operation does not assign
user ids to any users that have not already been seen by winbindd8
.--uid-info uidGet user info for the user connected to
user id UID.--user-domgroups sidGet user domain groups.
--user-sids sidGet user group SIDs for user.
-U|--uid-to-sid uidTry to convert a UNIX user id to a Windows NT
SID. If the uid specified does not refer to one within
the idmap uid range then the operation will fail. --verbose
Print additional information about the query results.
-Y|--sid-to-gid sidConvert a SID to a UNIX group id. If the SID
does not correspond to a UNIX group mapped by winbindd8 then
the operation will fail.
&stdarg.version;
&stdarg.help;
EXIT STATUSThe wbinfo program returns 0 if the operation
succeeded, or 1 if the operation failed. If the winbindd8 daemon is not working wbinfo will always return
failure. VERSIONThis man page is correct for version 3 of
the Samba suite.SEE ALSOwinbindd8 and ntlm_auth1AUTHORThe original Samba software and related utilities
were created by Andrew Tridgell. Samba is now developed
by the Samba Team as an Open Source project similar
to the way the Linux kernel is developed.wbinfo and winbindd
were written by Tim Potter.The conversion to DocBook for Samba 2.2 was done
by Gerald Carter. The conversion to DocBook XML 4.2 for Samba
3.0 was done by Alexander Bokovoy.