1 <?xml version="1.0" encoding="iso-8859-1"?>
2 <!DOCTYPE refentry PUBLIC "-//Samba-Team//DTD DocBook V4.2-Based Variant V1.0//EN" "http://www.samba.org/samba/DTD/samba-doc">
3 <refentry id="samba-tool.8">
6 <refentrytitle>samba-tool</refentrytitle>
7 <manvolnum>8</manvolnum>
8 <refmiscinfo class="source">Samba</refmiscinfo>
9 <refmiscinfo class="manual">System Administration tools</refmiscinfo>
10 <refmiscinfo class="version">&doc.version;</refmiscinfo>
15 <refname>samba-tool</refname>
16 <refpurpose>Main Samba administration tool.
22 <command>samba-tool</command>
23 <arg choice="opt">-h</arg>
24 <arg choice="opt">-W myworkgroup</arg>
25 <arg choice="opt">-U user</arg>
26 <arg choice="opt">-d debuglevel</arg>
27 <arg choice="opt">--v</arg>
32 <title>DESCRIPTION</title>
33 <para>This tool is part of the <citerefentry><refentrytitle>samba</refentrytitle>
34 <manvolnum>7</manvolnum></citerefentry> suite.</para>
38 <title>OPTIONS</title>
43 <term>-h|--help</term>
45 Show this help message and exit
49 &cmdline.common.connection.realm;
51 &cmdline.common.credentials.simplebinddn;
53 &cmdline.common.credentials.password;
55 &cmdline.common.credentials.user;
57 &cmdline.common.connection.workgroup;
59 &cmdline.common.credentials.nopass;
61 &cmdline.common.credentials.usekerberos;
63 &cmdline.common.credentials.usekrb5ccache;
65 &cmdline.common.credentials.authenticationfile;
68 <term>--ipaddress=IPADDRESS</term>
70 IP address of the server
75 <term>--color=always|never|auto</term>
78 Indicate whether samba-tool should use ANSI colour codes
79 in its output. If 'auto' (the default), samba-tool will
80 use colour when its output is directed toward a terminal,
81 unless the NO_COLOR environment variable is set and
85 The values 'yes' and 'force' are accepted as synonyms for
86 'always'; 'no' and 'none' for 'never'; and 'tty' and
90 Note that asking for colour doesn't mean samba-tool will
91 necessarily be very colourful. Many commands are very
92 monochrome, particularly when successful.
97 &cmdline.common.debug.client;
103 <title>COMMANDS</title>
106 <title>computer</title>
107 <para>Manage computer accounts.</para>
111 <title>computer add <replaceable>computername</replaceable> [options]</title>
112 <para>Add a new computer to the Active Directory Domain.</para>
113 <para>The new computer name specified on the command is the
114 sAMAccountName, with or without the trailing dollar sign.</para>
118 <term>--computerou=COMPUTEROU</term>
120 DN of alternative location (with or without domainDN counterpart) to
121 default CN=Computers in which new computer object will be created.
127 <term>--description=DESCRIPTION</term>
129 The new computer's description.
134 <term>--ip-address=IP_ADDRESS_LIST</term>
136 IPv4 address for the computer's A record, or IPv6 address for AAAA record,
137 can be provided multiple times.
142 <term>--service-principal-name=SERVICE_PRINCIPAL_NAME_LIST</term>
144 Computer's Service Principal Name, can be provided multiple times.
149 <term>--prepare-oldjoin</term>
151 Prepare enabled machine account for oldjoin mechanism.
158 <title>computer create <replaceable>computername</replaceable> [options]</title>
159 <para>Add a new computer. This is a synonym for the
160 <command>samba-tool computer add</command> command and is available
161 for compatibility reasons only. Please use
162 <command>samba-tool computer add</command> instead.</para>
166 <title>computer delete <replaceable>computername</replaceable> [options]</title>
167 <para>Delete an existing computer account.</para>
168 <para>The computer name specified on the command is the
169 sAMAccountName, with or without the trailing dollar sign.</para>
173 <title>computer edit <replaceable>computername</replaceable></title>
174 <para>Edit a computer AD object.</para>
175 <para>The computer name specified on the command is the
176 sAMAccountName, with or without the trailing dollar sign.</para>
180 <term>--editor=EDITOR</term>
182 Specifies the editor to use instead of the system default, or 'vi' if no
183 system default is set.
190 <title>computer list</title>
191 <para>List all computers.</para>
195 <title>computer move <replaceable>computername</replaceable> <replaceable>new_parent_dn</replaceable> [options]</title>
196 <para>This command moves a computer account into the specified
197 organizational unit or container.</para>
198 <para>The computername specified on the command is the
199 sAMAccountName, with or without the trailing dollar sign.</para>
200 <para>The name of the organizational unit or container can be
201 specified as a full DN or without the domainDN component.</para>
205 <title>computer show <replaceable>computername</replaceable> [options]</title>
206 <para>Display a computer AD object.</para>
207 <para>The computer name specified on the command is the
208 sAMAccountName, with or without the trailing dollar sign.</para>
212 <term>--attributes=USER_ATTRS</term>
214 Comma separated list of attributes, which will be printed.
221 <title>contact</title>
222 <para>Manage contacts.</para>
226 <title>contact add [<replaceable>contactname</replaceable>] [options]</title>
227 <para>Add a new contact to the Active Directory Domain.</para>
228 <para>The name of the new contact can be specified by the first
229 argument 'contactname' or the --given-name, --initial and --surname
230 arguments. If no 'contactname' is given, contact's name will be made
231 up of the given arguments by combining the given-name, initials and
232 surname. Each argument is optional. A dot ('.') will be appended to
233 the initials automatically.</para>
239 DN of alternative location (with or without domainDN counterpart) in
240 which the new contact will be created.
242 Default is the domain base.
247 <term>--description=DESCRIPTION</term>
249 The new contact's description.
254 <term>--surname=SURNAME</term>
261 <term>--given-name=GIVEN_NAME</term>
263 Contact's given name.
268 <term>--initials=INITIALS</term>
275 <term>--display-name=DISPLAY_NAME</term>
277 Contact's display name.
282 <term>--job-title=JOB_TITLE</term>
289 <term>--department=DEPARTMENT</term>
291 Contact's department.
296 <term>--company=COMPANY</term>
303 <term>--mail-address=MAIL_ADDRESS</term>
305 Contact's email address.
310 <term>--internet-address=INTERNET_ADDRESS</term>
317 <term>--telephone-number=TELEPHONE_NUMBER</term>
319 Contact's phone number.
324 <term>--mobile-number=MOBILE_NUMBER</term>
326 Contact's mobile phone number.
331 <term>--physical-delivery-office=PHYSICAL_DELIVERY_OFFICE</term>
333 Contact's office location.
341 <title>contact create [<replaceable>contactname</replaceable>] [options]</title>
342 <para>Add a new contact. This is a synonym for the
343 <command>samba-tool contact add</command> command and is available
344 for compatibility reasons only. Please use
345 <command>samba-tool contact add</command> instead.</para>
349 <title>contact delete <replaceable>contactname</replaceable> [options]</title>
350 <para>Delete an existing contact.</para>
351 <para>The contactname specified on the command is the common name or the
352 distinguished name of the contact object. The distinguished name of the
353 contact can be specified with or without the domainDN component.</para>
357 <title>contact edit <replaceable>contactname</replaceable></title>
358 <para>Modify a contact AD object.</para>
359 <para>The contactname specified on the command is the common name or the
360 distinguished name of the contact object. The distinguished name of the
361 contact can be specified with or without the domainDN component.</para>
365 <term>--editor=EDITOR</term>
367 Specifies the editor to use instead of the system default, or 'vi' if no
368 system default is set.
375 <title>contact list [options]</title>
376 <para>List all contacts.</para>
380 <term>--full-dn</term>
382 Display contact's full DN instead of the name.
389 <title>contact move <replaceable>contactname</replaceable> <replaceable>new_parent_dn</replaceable> [options]</title>
390 <para>This command moves a contact into the specified organizational
391 unit or container.</para>
392 <para>The contactname specified on the command is the common name or the
393 distinguished name of the contact object. The distinguished name of the
394 contact can be specified with or without the domainDN component.</para>
398 <title>contact show <replaceable>contactname</replaceable> [options]</title>
399 <para>Display a contact AD object.</para>
400 <para>The contactname specified on the command is the common name or the
401 distinguished name of the contact object. The distinguished name of the
402 contact can be specified with or without the domainDN component.</para>
406 <term>--attributes=CONTACT_ATTRS</term>
408 Comma separated list of attributes, which will be printed.
415 <title>contact rename <replaceable>contactname</replaceable> [options]</title>
416 <para>Rename a contact and related attributes.</para>
417 <para>This command allows to set the contact's name related attributes. The contact's
418 CN will be renamed automatically.
419 The contact's new CN will be made up by combining the given-name, initials
420 and surname. A dot ('.') will be appended to the initials automatically,
422 Use the --force-new-cn option to specify the new CN manually and --reset-cn
423 to reset this change.</para>
424 <para>Use an empty attribute value to remove the specified attribute.</para>
425 <para>The contact name specified on the command is the CN.</para>
429 <term>--surname=SURNAME</term>
436 <term>--given-name=GIVEN_NAME</term>
443 <term>--initials=INITIALS</term>
450 <term>--force-new-cn=NEW_CN</term>
452 Specify a new CN (RDN) instead of using a combination
453 of the given name, initials and surname.
458 <term>--reset-cn</term>
460 Set the CN to the default combination of given name,
461 initials and surname.
466 <term>--display-name=DISPLAY_NAME</term>
473 <term>--mail-address=MAIL_ADDRESS</term>
482 <title>dbcheck</title>
483 <para>Check the local AD database for errors.</para>
487 <title>delegation</title>
488 <para>Manage Delegations.</para>
492 <title>delegation add-service <replaceable>accountname</replaceable> <replaceable>principal</replaceable> [options]</title>
493 <para>Add a service principal as msDS-AllowedToDelegateTo.</para>
497 <title>delegation del-service <replaceable>accountname</replaceable> <replaceable>principal</replaceable> [options]</title>
498 <para>Delete a service principal as msDS-AllowedToDelegateTo.</para>
502 <title>delegation for-any-protocol <replaceable>accountname</replaceable> [(on|off)] [options]</title>
503 <para>Set/unset UF_TRUSTED_TO_AUTHENTICATE_FOR_DELEGATION (S4U2Proxy)
504 for an account.</para>
508 <title>delegation for-any-service <replaceable>accountname</replaceable> [(on|off)] [options]</title>
509 <para>Set/unset UF_TRUSTED_FOR_DELEGATION for an account.</para>
513 <title>delegation show <replaceable>accountname</replaceable> [options] </title>
514 <para>Show the delegation setting of an account.</para>
519 <para>Manage Domain Name Service (DNS).</para>
523 <title>dns add <replaceable>server</replaceable> <replaceable>zone</replaceable> <replaceable>name</replaceable> <replaceable>A|AAAA|PTR|CNAME|NS|MX|SRV|TXT</replaceable> <replaceable>data</replaceable></title>
524 <para>Add a DNS record.</para>
528 <title>dns delete <replaceable>server</replaceable> <replaceable>zone</replaceable> <replaceable>name</replaceable> <replaceable>A|AAAA|PTR|CNAME|NS|MX|SRV|TXT</replaceable> <replaceable>data</replaceable></title>
529 <para>Delete a DNS record.</para>
533 <title>dns query <replaceable>server</replaceable> <replaceable>zone</replaceable> <replaceable>name</replaceable> <replaceable>A|AAAA|PTR|CNAME|NS|MX|SRV|TXT|ALL</replaceable> [options] <replaceable>data</replaceable></title>
534 <para>Query a name.</para>
538 <title>dns roothints <replaceable>server</replaceable> [<replaceable>name</replaceable>] [options]</title>
539 <para>Query root hints.</para>
543 <title>dns serverinfo <replaceable>server</replaceable> [options]</title>
544 <para>Query server information.</para>
548 <title>dns update <replaceable>server</replaceable> <replaceable>zone</replaceable> <replaceable>name</replaceable> <replaceable>A|AAAA|PTR|CNAME|NS|MX|SRV|TXT</replaceable> <replaceable>olddata</replaceable> <replaceable>newdata</replaceable></title>
549 <para>Update a DNS record.</para>
553 <title>dns zonecreate <replaceable>server</replaceable> <replaceable>zone</replaceable> [options]</title>
554 <para>Create a zone.</para>
558 <title>dns zonedelete <replaceable>server</replaceable> <replaceable>zone</replaceable> [options]</title>
559 <para>Delete a zone.</para>
563 <title>dns zoneinfo <replaceable>server</replaceable> <replaceable>zone</replaceable> [options]</title>
564 <para>Query zone information.</para>
568 <title>dns zonelist <replaceable>server</replaceable> [options]</title>
569 <para>List zones.</para>
573 <title>domain</title>
574 <para>Manage Domain.</para>
578 <title>domain backup</title>
579 <para>Create or restore a backup of the domain.</para>
583 <title>domain backup offline</title>
584 <para>Backup (with proper locking) local domain directories into a tar file.</para>
588 <title>domain backup online</title>
589 <para>Copy a running DC's current DB into a backup tar file.</para>
593 <title>domain backup rename</title>
594 <para>Copy a running DC's DB to backup file, renaming the domain in the process.</para>
598 <title>domain backup restore</title>
599 <para>Restore the domain's DB from a backup-file.</para>
603 <title>domain auth policy</title>
604 <para>Manage authentication policies.</para>
608 <title>domain auth policy list</title>
609 <para>List authentication policies on the domain.</para>
612 <term>-H, --URL</term>
614 LDB URL for database or target server.
620 View authentication policies as JSON instead of a list.
627 <title>domain auth policy view</title>
628 <para>View an authentication policy on the domain.</para>
631 <term>-H, --URL</term>
633 LDB URL for database or target server.
639 Name of the authentication policy to view (required).
646 <title>domain auth policy create</title>
647 <para>Create authentication policies on the domain.</para>
650 <term>-H, --URL</term>
652 LDB URL for database or target server.
658 Name of the authentication policy (required).
662 <term>--description</term>
664 Optional description for the authentication policy.
668 <term>--protect</term>
671 Protect authentication policy from accidental deletion.
674 Cannot be used together with --unprotect.
679 <term>--unprotect</term>
682 Unprotect authentication policy from accidental deletion.
685 Cannot be used together with --protect.
693 Only audit authentication policy.
696 Cannot be used together with --enforce.
701 <term>--enforce</term>
704 Enforce authentication policy.
707 Cannot be used together with --audit.
712 <term>--strong-ntlm-policy</term>
715 Strong NTLM Policy (Disabled, Optional, Required).
720 <term>--user-tgt-lifetime-mins</term>
723 Ticket-Granting-Ticket lifetime for user accounts.
728 <term>--user-allow-ntlm-auth</term>
731 Allow <constant>NTLM</constant> and <constant>
732 Interactive NETLOGON SamLogon</constant>
733 authentication despite the
735 <constant>allowed-to-authenticate-from</constant>
736 is in use, which would
737 otherwise restrict the user to selected devices.
742 <term>--user-allowed-to-authenticate-from</term>
745 Conditions a device must meet
746 for users covered by this
747 policy to be allowed to
748 authenticate. While this is a
749 restriction on the device,
750 any conditional ACE rules are
751 expressed as if the device was
755 Must be a valid SDDL string
756 without reference to Device
760 Example: O:SYG:SYD:(XA;OICI;CR;;;WD;(Member_of {SID(AU)}))
765 <term>--user-allowed-to-authenticate-to=SDDL</term>
768 This policy, applying to a
769 user account that is offering
770 a service, eg a web server
771 with a user account, restricts
772 which accounts may access it.
775 Must be a valid SDDL string.
776 The SDDL can reference both
777 bare (user) and Device conditions.
780 SDDL Example: <constant>O:SYG:SYD:(XA;OICI;CR;;;WD;(Member_of {SID(AO)}))</constant>
785 <term>--service-tgt-lifetime-mins</term>
788 Ticket-Granting-Ticket lifetime for service accounts.
793 <term>--service-allow-ntlm-auth</term>
796 Allow NTLM network authentication when service
797 is restricted to selected devices.
802 <term>--service-allowed-to-authenticate-from</term>
805 Conditions a device must meet
806 for service accounts covered
807 by this policy to be allowed
808 to authenticate. While this
809 is a restriction on the
810 device, any conditional ACE
811 rules are expressed as if the
815 Must be a valid SDDL string
816 without reference to Device
820 SDDL Example: <constant>O:SYG:SYD:(XA;OICI;CR;;;WD;(Member_of {SID(AU)}))</constant>
825 <term>--service-allowed-to-authenticate-to=SDDL</term>
828 This policy, applying to a
829 service account (eg a Managed
830 Service Account, Group Managed
831 Service Account), restricts
832 which accounts may access it.
835 Must be a valid SDDL string.
836 The SDDL can reference both
837 bare (user) and Device conditions.
840 SDDL Example: <constant>O:SYG:SYD:(XA;OICI;CR;;;WD;(Member_of {SID(AO)}))</constant>
845 <term>--computer-tgt-lifetime-mins</term>
848 Ticket-Granting-Ticket lifetime for computer accounts.
853 <term>--computer-allowed-to-authenticate-to=SDDL</term>
856 This policy, applying to a
857 computer account (eg a server
858 or workstation), restricts
859 which accounts may access it.
862 Must be a valid SDDL string.
863 The SDDL can reference both
864 bare (user) and Device conditions.
867 SDDL Example: O:SYG:SYD:(XA;OICI;CR;;;WD;(Member_of {SID(AO)}))
875 <title>domain auth policy modify</title>
876 <para>Modify authentication policies on the domain. The same
877 options apply as for <constant>domain auth policy create</constant>.</para>
881 <title>domain auth policy delete</title>
882 <para>Delete authentication policies on the domain.</para>
885 <term>-H, --URL</term>
887 LDB URL for database or target server.
893 Name of authentication policy to delete (required).
899 Force authentication policy delete even if it is protected.
906 <title>domain auth policy user-allowed-to-authenticate-from set</title>
907 <para>Set the user-allowed-to-authenticate-from property by scenario.</para>
910 <term>-H, --URL</term>
912 LDB URL for database or target server.
918 Name of authentication policy.
922 <term>--by-group=GROUP</term>
925 authenticate, if the device they
926 authenticate from is assigned
927 and granted membership of a
928 given <constant>GROUP</constant>.
932 <term>--silo=SILO</term>
935 authenticate, if the device they
936 authenticate from is assigned
937 and granted membership of a
938 given <constant>SILO</constant>.
945 <title>domain auth policy user-allowed-to-authenticate-to set</title>
946 <para>Set the user-allowed-to-authenticate-to property by scenario.</para>
949 <term>-H, --URL</term>
951 LDB URL for database or target server.
957 Name of authentication policy.
961 <term>--group=GROUP</term>
963 The user account, offering a
964 network service, covered by
965 this policy, will only be allowed
966 access from other accounts
967 that are members of the given
968 <constant>GROUP</constant>.
972 <term>--silo=SILO</term>
974 The user account, offering a
975 network service, covered by
976 this policy, will only be
977 allowed access from other accounts
978 that are assigned to,
979 granted membership of (and
980 meet any authentication
981 conditions of) the given <constant>SILO</constant>.
988 <title>domain auth policy service-allowed-to-authenticate-from set</title>
989 <para>Set the service-allowed-to-authenticate-from property by scenario.</para>
992 <term>-H, --URL</term>
994 LDB URL for database or target server.
1000 Name of authentication policy.
1004 <term>--group=GROUP</term>
1006 The service account (eg a Managed
1007 Service Account, Group Managed
1008 Service Account) is allowed to
1009 authenticate, if the device it
1010 authenticates from is a member
1011 of the given <constant>GROUP</constant>.
1015 <term>--silo=SILO</term>
1017 The service account (eg a Managed
1018 Service Account, Group Managed
1019 Service Account) is allowed to
1020 authenticate, if the device it
1021 authenticates from is assigned
1022 and granted membership of a
1023 given <constant>SILO</constant>.
1030 <title>domain auth policy service-allowed-to-authenticate-to set</title>
1031 <para>Set the service-allowed-to-authenticate-to property by scenario.</para>
1034 <term>-H, --URL</term>
1036 LDB URL for database or target server.
1042 Name of authentication policy.
1046 <term>--group=GROUP</term>
1048 The service account (eg a Managed
1049 Service Account, Group Managed
1050 Service Account), will only be
1051 allowed access by other accounts
1052 that are members of the given
1053 <constant>GROUP</constant>.
1057 <term>--silo=SILO</term>
1059 The service account (eg a
1060 Managed Service Account, Group
1061 Managed Service Account), will
1062 only be allowed access by other
1063 accounts that are assigned
1064 to, granted membership of (and
1065 meet any authentication
1066 conditions of) the given <constant>SILO</constant>.
1073 <title>domain auth policy computer-allowed-to-authenticate-to set</title>
1074 <para>Set the computer-allowed-to-authenticate-to property by scenario.</para>
1077 <term>-H, --URL</term>
1079 LDB URL for database or target server.
1085 Name of authentication policy.
1089 <term>--group=GROUP</term>
1091 The computer account (eg a server
1092 or workstation), will only be
1093 allowed access by other accounts
1094 that are members of the given
1095 <constant>GROUP</constant>.
1099 <term>--silo=SILO</term>
1101 The computer account (eg a
1102 server or workstation), will
1103 only be allowed access by
1104 other accounts that are
1105 assigned to, granted
1106 membership of (and meet any
1107 authentication conditions of)
1108 the given <constant>SILO</constant>.
1115 <title>domain auth silo</title>
1116 <para>Manage authentication silos.</para>
1120 <title>domain auth silo list</title>
1121 <para>List authentication silos on the domain.</para>
1124 <term>-H, --URL</term>
1126 LDB URL for database or target server.
1132 View authentication silos as JSON instead of a list.
1139 <title>domain auth silo view</title>
1140 <para>View an authentication silo on the domain.</para>
1143 <term>-H, --URL</term>
1145 LDB URL for database or target server.
1151 Name of the authentication silo to view (required).
1158 <title>domain auth silo create</title>
1159 <para>Create authentication silos on the domain.</para>
1162 <term>-H, --URL</term>
1164 LDB URL for database or target server.
1170 Name of the authentication silo (required).
1174 <term>--description</term>
1176 Optional description for the authentication silo.
1180 <term>--user-authentication-policy</term>
1182 User account authentication policy.
1186 <term>--service-authentication-policy</term>
1188 Managed service account authentication policy.
1192 <term>--computer-authentication-policy</term>
1194 Computer authentication policy.
1198 <term>--protect</term>
1201 Protect authentication silo from accidental deletion.
1204 Cannot be used together with --unprotect.
1209 <term>--unprotect</term>
1212 Unprotect authentication silo from accidental deletion.
1215 Cannot be used together with --protect.
1220 <term>--audit</term>
1223 Only audit silo policies.
1226 Cannot be used together with --enforce.
1231 <term>--enforce</term>
1234 Enforce silo policies.
1237 Cannot be used together with --audit.
1245 <title>domain auth silo modify</title>
1246 <para>Modify authentication silos on the domain.</para>
1249 <term>-H, --URL</term>
1251 LDB URL for database or target server.
1257 Name of the authentication silo (required).
1261 <term>--description</term>
1263 Optional description for the authentication silo.
1267 <term>--user-authentication-policy</term>
1269 User account authentication policy.
1273 <term>--service-authentication-policy</term>
1275 Managed service account authentication policy.
1279 <term>--computer-authentication-policy</term>
1281 Computer authentication policy.
1285 <term>--protect</term>
1288 Protect authentication silo from accidental deletion.
1291 Cannot be used together with --unprotect.
1296 <term>--unprotect</term>
1299 Unprotect authentication silo from accidental deletion.
1302 Cannot be used together with --protect.
1307 <term>--audit</term>
1310 Only audit silo policies.
1313 Cannot be used together with --enforce.
1318 <term>--enforce</term>
1321 Enforce silo policies.
1324 Cannot be used together with --audit.
1332 <title>domain auth silo delete</title>
1333 <para>Delete authentication silos on the domain.</para>
1336 <term>-H, --URL</term>
1338 LDB URL for database or target server.
1344 Name of authentication silo to delete (required).
1348 <term>--force</term>
1350 Force authentication silo delete even if it is protected.
1357 <title>domain auth silo member grant</title>
1358 <para>Grant a member access to an authentication silo.</para>
1361 <term>-H, --URL</term>
1363 LDB URL for database or target server.
1369 Name of authentication silo (required).
1373 <term>--member</term>
1375 Member to grant access to the silo (DN or account name).
1382 <title>domain auth silo member list</title>
1383 <para>List members in an authentication silo.</para>
1386 <term>-H, --URL</term>
1388 LDB URL for database or target server.
1394 Name of authentication silo (required).
1400 View members as JSON instead of a list.
1407 <title>domain auth silo member revoke</title>
1408 <para>Revoke a member from an authentication silo.</para>
1411 <term>-H, --URL</term>
1413 LDB URL for database or target server.
1419 Name of authentication silo (required).
1423 <term>--member</term>
1425 Member to revoke from the silo (DN or account name).
1432 <title>domain claim claim-type list</title>
1433 <para>List claim types on the domain.</para>
1436 <term>-H, --URL</term>
1438 LDB URL for database or target server.
1444 View claim types as JSON instead of a list.
1451 <title>domain claim claim-type view</title>
1452 <para>View a single claim type on the domain.</para>
1455 <term>-H, --URL</term>
1457 LDB URL for database or target server.
1463 Display name of claim type to view (required).
1470 <title>domain claim claim-type create</title>
1471 <para>Create claim types on the domain.</para>
1474 <term>-H, --URL</term>
1476 LDB URL for database or target server.
1480 <term>--attribute</term>
1482 Attribute of claim type to create (required).
1486 <term>--class</term>
1489 Object classes to set claim type to.
1492 Example: --class=user --class=computer
1499 Optional display name or use attribute name.
1503 <term>--description</term>
1505 Optional description or use from attribute.
1509 <term>--enable</term>
1515 Cannot be used together with --disable.
1520 <term>--disable</term>
1526 Cannot be used together with --enable.
1531 <term>--protect</term>
1534 Protect claim type from accidental deletion.
1537 Cannot be used together with --unprotect.
1542 <term>--unprotect</term>
1545 Unprotect claim type from accidental deletion.
1548 Cannot be used together with --protect.
1556 <title>domain claim claim-type modify</title>
1557 <para>Modify claim types on the domain.</para>
1560 <term>-H, --URL</term>
1562 LDB URL for database or target server.
1568 Display name of claim type to modify (required).
1572 <term>--class</term>
1575 Object classes to set claim type to.
1578 Example: --class=user --class=computer
1583 <term>--description</term>
1585 Set the claim type description.
1589 <term>--enable</term>
1595 Cannot be used together with --disable.
1600 <term>--disable</term>
1606 Cannot be used together with --enable.
1611 <term>--protect</term>
1614 Protect claim type from accidental deletion.
1617 Cannot be used together with --unprotect.
1622 <term>--unprotect</term>
1625 Unprotect claim type from accidental deletion.
1628 Cannot be used together with --protect.
1636 <title>domain claim claim-type delete</title>
1637 <para>Delete claim types on the domain.</para>
1640 <term>-H, --URL</term>
1642 LDB URL for database or target server.
1648 Display name of claim type to delete (required).
1652 <term>--force</term>
1654 Force claim type delete even if it is protected.
1661 <title>domain claim value-type list</title>
1662 <para>List claim value types on the domain.</para>
1665 <term>-H, --URL</term>
1667 LDB URL for database or target server.
1673 View claim value types as JSON instead of a list.
1680 <title>domain claim value-type view</title>
1681 <para>View a single claim value type on the domain.</para>
1684 <term>-H, --URL</term>
1686 LDB URL for database or target server.
1692 Display name of claim value type to view (required).
1699 <title>service-account</title>
1700 <para>Service account management.</para>
1704 <title>service-account list</title>
1705 <para>List service accounts on the domain.</para>
1708 <term>-H, --URL</term>
1710 LDB URL for database or target server.
1716 View service accounts as JSON instead of a list.
1723 <title>service-account view</title>
1724 <para>View a single service account on the domain.</para>
1727 <term>-H, --URL</term>
1729 LDB URL for database or target server.
1735 Account name of service account to view (required).
1742 <title>service-account create</title>
1743 <para>Create a new service account on the domain.</para>
1746 <term>-H, --URL</term>
1748 LDB URL for database or target server.
1754 Account name of service account (required).
1758 <term>--dns-host-name</term>
1760 DNS hostname of this service account (required).
1764 <term>--group-msa-membership</term>
1766 Optional Group MSA Membership SDDL.
1770 <term>--managed-password-interval</term>
1772 Managed password refresh interval in days.
1779 <title>service-account modify</title>
1780 <para>Modify an existing service account on the domain.</para>
1783 <term>-H, --URL</term>
1785 LDB URL for database or target server.
1791 Account name of service account (required).
1795 <term>--dns-host-name</term>
1797 Update DNS hostname of this service account.
1801 <term>--group-msa-membership</term>
1803 Update Group MSA Membership SDDL.
1810 <title>service-account delete</title>
1811 <para>Delete a service accounts on the domain.</para>
1814 <term>-H, --URL</term>
1816 LDB URL for database or target server.
1822 Account name of service account to delete.
1829 <title>service-account group-msa-membership</title>
1830 <para>Service account Group MSA Membership management.</para>
1834 <title>service-account group-msa-membership show</title>
1835 <para>Display Group MSA Membership for a service account.</para>
1838 <term>-H, --URL</term>
1840 LDB URL for database or target server.
1846 Account name of service account (required).
1852 Return as JSON instead of a list.
1859 <title>service-account group-msa-membership add</title>
1860 <para>Add a principal to Group MSA Membership for a service account.</para>
1863 <term>-H, --URL</term>
1865 LDB URL for database or target server.
1871 Account name of service account (required).
1875 <term>--principal</term>
1877 Name, DN or SID of principal to add.
1884 <title>service-account group-msa-membership remove</title>
1885 <para>Remove a principal from Group MSA Membership for a service account.</para>
1888 <term>-H, --URL</term>
1890 LDB URL for database or target server.
1896 Account name of service account (required).
1900 <term>--principal</term>
1902 Name, DN or SID of principal to remove.
1909 <title>domain classicupgrade [options] <replaceable>classic_smb_conf</replaceable></title>
1910 <para>Upgrade from Samba classic (NT4-like) database to Samba AD DC
1915 <title>domain dcpromo <replaceable>dnsdomain</replaceable> [DC|RODC] [options]</title>
1916 <para>Promote an existing domain member or NT4 PDC to an AD DC.</para>
1920 <title>domain demote</title>
1921 <para>Demote ourselves from the role of domain controller.</para>
1925 <title>domain exportkeytab <replaceable>keytab</replaceable> [options]</title>
1926 <para>Dumps Kerberos keys of the domain into a keytab.</para>
1930 <title>domain info <replaceable>ip_address</replaceable> [options]</title>
1931 <para>Print basic info about a domain and the specified DC.
1936 <title>domain join <replaceable>dnsdomain</replaceable> [DC|RODC|MEMBER|SUBDOMAIN] [options]</title>
1937 <para>Join a domain as either member or backup domain controller.</para>
1941 <title>domain level <replaceable>show|raise</replaceable> <replaceable>options</replaceable> [options]</title>
1942 <para>Show/raise domain and forest function levels.</para>
1946 <title>domain passwordsettings <replaceable>show|set</replaceable> <replaceable>options</replaceable> [options]</title>
1947 <para>Show/set password settings.</para>
1951 <title>domain passwordsettings pso</title>
1952 <para>Manage fine-grained Password Settings Objects (PSOs).</para>
1956 <title>domain passwordsettings pso apply <replaceable>pso-name</replaceable> <replaceable>user-or-group-name</replaceable> [options]</title>
1957 <para>Applies a PSO's password policy to a user or group.</para>
1961 <title>domain passwordsettings pso create <replaceable>pso-name</replaceable> <replaceable>precedence</replaceable> [options]</title>
1962 <para>Creates a new Password Settings Object (PSO).</para>
1966 <title>domain passwordsettings pso delete <replaceable>pso-name</replaceable> [options]</title>
1967 <para>Deletes a Password Settings Object (PSO).</para>
1971 <title>domain passwordsettings pso list [options]</title>
1972 <para>Lists all Password Settings Objects (PSOs).</para>
1976 <title>domain passwordsettings pso set <replaceable>pso-name</replaceable> [options]</title>
1977 <para>Modifies a Password Settings Object (PSO).</para>
1981 <title>domain passwordsettings pso show <replaceable>user-name</replaceable> [options]</title>
1982 <para>Displays a Password Settings Object (PSO).</para>
1986 <title>domain passwordsettings pso show-user <replaceable>pso-name</replaceable> [options]</title>
1987 <para>Displays the Password Settings that apply to a user.</para>
1991 <title>domain passwordsettings pso unapply <replaceable>pso-name</replaceable> <replaceable>user-or-group-name</replaceable> [options]</title>
1992 <para>Updates a PSO to no longer apply to a user or group.</para>
1996 <title>domain provision</title>
1997 <para>Promote an existing domain member or NT4 PDC to an AD DC.</para>
2001 <title>domain trust</title>
2002 <para>Domain and forest trust management.</para>
2006 <title>domain trust create <replaceable>DOMAIN</replaceable> <replaceable>options</replaceable> [options]</title>
2007 <para>Create a domain or forest trust.</para>
2011 <title>domain trust modify <replaceable>DOMAIN</replaceable> <replaceable>options</replaceable> [options]</title>
2012 <para>Modify a domain or forest trust.</para>
2016 <title>domain trust delete <replaceable>DOMAIN</replaceable> <replaceable>options</replaceable> [options]</title>
2017 <para>Delete a domain trust.</para>
2021 <title>domain trust list <replaceable>options</replaceable> [options]</title>
2022 <para>List domain trusts.</para>
2026 <title>domain trust namespaces [<replaceable>DOMAIN</replaceable>] <replaceable>options</replaceable> [options]</title>
2027 <para>Manage forest trust namespaces.</para>
2031 <title>domain trust show <replaceable>DOMAIN</replaceable> <replaceable>options</replaceable> [options]</title>
2032 <para>Show trusted domain details.</para>
2036 <title>domain trust validate <replaceable>DOMAIN</replaceable> <replaceable>options</replaceable> [options]</title>
2037 <para>Validate a domain trust.</para>
2042 <para>Manage Directory Replication Services (DRS).</para>
2046 <title>drs bind</title>
2047 <para>Show DRS capabilities of a server.</para>
2051 <title>drs kcc</title>
2052 <para>Trigger knowledge consistency center run.</para>
2056 <title>drs options</title>
2057 <para>Query or change <replaceable>options</replaceable> for NTDS Settings
2058 object of a domain controller.</para>
2062 <title>drs replicate <replaceable>destination_DC</replaceable> <replaceable>source_DC</replaceable> <replaceable>NC</replaceable> [options]</title>
2063 <para>Replicate a naming context between two DCs.</para>
2067 <title>drs showrepl</title>
2068 <para>Show replication status. The <arg
2069 choice="opt">--json</arg> option results in JSON output, and
2070 with the <arg choice="opt">--summary</arg> option produces
2071 very little output when the replication status seems healthy.
2076 <title>dsacl</title>
2077 <para>Administer DS ACLs</para>
2081 <title>dsacl delete</title>
2082 <para>Delete an access list entry on a directory object.</para>
2086 <title>dsacl get</title>
2087 <para>Print access list on a directory object.</para>
2091 <title>dsacl set</title>
2092 <para>Modify access list on a directory object.</para>
2096 <title>forest</title>
2097 <para>Manage Forest configuration.</para>
2101 <title>forest directory_service</title>
2102 <para>Manage directory_service behaviour for the forest.</para>
2106 <title>forest directory_service dsheuristics <replaceable>VALUE</replaceable></title>
2107 <para>Modify dsheuristics directory_service configuration for the forest.</para>
2111 <title>forest directory_service show</title>
2112 <para>Show current directory_service configuration for the forest.</para>
2117 <para>Manage Flexible Single Master Operations (FSMO).</para>
2121 <title>fsmo seize [options]</title>
2122 <para>Seize the role.</para>
2126 <title>fsmo show</title>
2127 <para>Show the roles.</para>
2131 <title>fsmo transfer [options]</title>
2132 <para>Transfer the role.</para>
2137 <para>Manage Group Policy Objects (GPO).</para>
2141 <title>gpo create <replaceable>displayname</replaceable> [options]</title>
2142 <para>Create an empty GPO.</para>
2146 <title>gpo del <replaceable>gpo</replaceable> [options]</title>
2147 <para>Delete GPO.</para>
2151 <title>gpo dellink <replaceable>container_dn</replaceable> <replaceable>gpo</replaceable> [options]</title>
2152 <para>Delete GPO link from a container.</para>
2156 <title>gpo fetch <replaceable>gpo</replaceable> [options]</title>
2157 <para>Download a GPO.</para>
2161 <title>gpo getinheritance <replaceable>container_dn</replaceable> [options]</title>
2162 <para>Get inheritance flag for a container.</para>
2166 <title>gpo getlink <replaceable>container_dn</replaceable> [options]</title>
2167 <para>List GPO Links for a container.</para>
2171 <title>gpo list <replaceable>username</replaceable> [options]</title>
2172 <para>List GPOs for an account.</para>
2176 <title>gpo listall</title>
2177 <para>List all GPOs.</para>
2181 <title>gpo listcontainers <replaceable>gpo</replaceable> [options]</title>
2182 <para>List all linked containers for a GPO.</para>
2186 <title>gpo setinheritance <replaceable>container_dn</replaceable> <replaceable>block|inherit</replaceable> [options]</title>
2187 <para>Set inheritance flag on a container.</para>
2191 <title>gpo setlink <replaceable>container_dn</replaceable> <replaceable>gpo</replaceable> [options]</title>
2192 <para>Add or Update a GPO link to a container.</para>
2196 <title>gpo show <replaceable>gpo</replaceable> [options]</title>
2197 <para>Show information for a GPO.</para>
2201 <title>gpo manage symlink list</title>
2202 <para>List VGP Symbolic Link Group Policy from the sysvol</para>
2206 <title>gpo manage symlink add</title>
2207 <para>Adds a VGP Symbolic Link Group Policy to the sysvol</para>
2211 <title>gpo manage symlink remove</title>
2212 <para>Removes a VGP Symbolic Link Group Policy from the sysvol</para>
2216 <title>gpo manage files list</title>
2217 <para>List VGP Files Group Policy from the sysvol</para>
2221 <title>gpo manage files add</title>
2222 <para>Add VGP Files Group Policy to the sysvol</para>
2226 <title>gpo manage files remove</title>
2227 <para>Remove VGP Files Group Policy from the sysvol</para>
2231 <title>gpo manage openssh list</title>
2232 <para>List VGP OpenSSH Group Policy from the sysvol</para>
2236 <title>gpo manage openssh set</title>
2237 <para>Sets a VGP OpenSSH Group Policy to the sysvol</para>
2241 <title>gpo manage sudoers add</title>
2242 <para>Adds a Samba Sudoers Group Policy to the sysvol.</para>
2246 <title>gpo manage sudoers list</title>
2247 <para>List Samba Sudoers Group Policy from the sysvol.</para>
2251 <title>gpo manage sudoers remove</title>
2252 <para>Removes a Samba Sudoers Group Policy from the sysvol.</para>
2256 <title>gpo manage scripts startup list</title>
2257 <para>List VGP Startup Script Group Policy from the sysvol</para>
2261 <title>gpo manage scripts startup add</title>
2262 <para>Adds VGP Startup Script Group Policy to the sysvol</para>
2266 <title>gpo manage scripts startup remove</title>
2267 <para>Removes VGP Startup Script Group Policy from the sysvol</para>
2271 <title>gpo manage motd list</title>
2272 <para>List VGP MOTD Group Policy from the sysvol.</para>
2276 <title>gpo manage motd set</title>
2277 <para>Sets a VGP MOTD Group Policy to the sysvol</para>
2281 <title>gpo manage issue list</title>
2282 <para>List VGP Issue Group Policy from the sysvol.</para>
2286 <title>gpo manage issue set</title>
2287 <para>Sets a VGP Issue Group Policy to the sysvol</para>
2291 <title>gpo manage access add</title>
2292 <para>Adds a VGP Host Access Group Policy to the sysvol</para>
2296 <title>gpo manage access list</title>
2297 <para>List VGP Host Access Group Policy from the sysvol</para>
2301 <title>gpo manage access remove</title>
2302 <para>Remove a VGP Host Access Group Policy from the sysvol</para>
2306 <title>group</title>
2307 <para>Manage groups.</para>
2311 <title>group add <replaceable>groupname</replaceable> [options]</title>
2312 <para>Create a new AD group.</para>
2316 <title>group create <replaceable>groupname</replaceable> [options]</title>
2317 <para>Add a new AD group. This is a synonym for the
2318 <command>samba-tool group add</command> command and is available
2319 for compatibility reasons only. Please use
2320 <command>samba-tool group add</command> instead.</para>
2324 <title>group addmembers <replaceable>groupname</replaceable> <replaceable>members</replaceable> [options]</title>
2325 <para>Add members to an AD group.</para>
2329 <title>group delete <replaceable>groupname</replaceable> [options]</title>
2330 <para>Delete an AD group.</para>
2334 <title>group edit <replaceable>groupname</replaceable></title>
2335 <para>Edit a group AD object.</para>
2339 <term>--editor=EDITOR</term>
2341 Specifies the editor to use instead of the system default, or 'vi' if no
2342 system default is set.
2349 <title>group list</title>
2350 <para>List all groups.</para>
2354 <title>group listmembers <replaceable>groupname</replaceable> [options]</title>
2355 <para>List all members of the specified AD group.</para>
2356 <para>By default the sAMAccountNames are listed. If no sAMAccountName
2357 is available, the CN will be used instead.</para>
2360 <term>--full-dn</term>
2362 List the distinguished names instead of the sAMAccountNames.
2366 <term>--hide-expired</term>
2368 Do not list expired group members.
2372 <term>--hide-disabled</term>
2374 Do not list disabled group members.
2381 <title>group move <replaceable>groupname</replaceable> <replaceable>new_parent_dn</replaceable> [options]</title>
2382 <para>This command moves a group into the specified organizational unit
2383 or container.</para>
2384 <para>The groupname specified on the command is the sAMAccountName.
2386 <para>The name of the organizational unit or container can be
2387 specified as a full DN or without the domainDN component.</para>
2392 <title>group removemembers <replaceable>groupname</replaceable> <replaceable>members</replaceable> [options]</title>
2393 <para>Remove members from the specified AD group.</para>
2397 <title>group show <replaceable>groupname</replaceable> [options]</title>
2398 <para>Show group object and it's attributes.</para>
2402 <title>group stats [options]</title>
2403 <para>Show statistics for overall groups and group memberships.</para>
2407 <title>group rename <replaceable>groupname</replaceable> [options]</title>
2408 <para>Rename a group and related attributes.</para>
2409 <para>This command allows to set the group's name related attributes. The
2410 group's CN will be renamed automatically.
2411 The group's CN will be the sAMAccountName.
2412 Use the --force-new-cn option to specify the new CN manually and the
2413 --reset-cn to reset this change.</para>
2414 <para>Use an empty attribute value to remove the specified attribute.</para>
2415 <para>The groupname specified on the command is the sAMAccountName.</para>
2419 <term>--force-new-cn=NEW_CN</term>
2421 Specify a new CN (RDN) instead of using the sAMAccountName.
2426 <term>--reset-cn</term>
2428 Set the CN to the sAMAccountName.
2433 <term>--mail-address=MAIL_ADDRESS</term>
2440 <term>--samaccountname=SAMACCOUNTNAME</term>
2442 New account name (sAMAccountName/logon name)
2449 <title>ldapcmp <replaceable>URL1</replaceable> <replaceable>URL2</replaceable> <replaceable>domain|configuration|schema|dnsdomain|dnsforest</replaceable> [options] </title>
2450 <para>Compare two LDAP databases.</para>
2454 <title>ntacl</title>
2455 <para>Manage NT ACLs.</para>
2459 <title>ntacl changedomsid <replaceable>original-domain-SID</replaceable> <replaceable>new-domain-SID</replaceable> <replaceable>file</replaceable> [options]</title>
2460 <para>Change the domain SID for ACLs.
2461 Can be used to change all entries in acl_xattr when the machine's SID
2462 has accidentally changed or the data set has been copied
2463 to another machine either via backup/restore or rsync.</para>
2467 <term>--use-ntvfs</term>
2469 Set the ACLs directly to the TDB or xattr. The POSIX permissions will
2470 NOT be changed, only the NT ACL will be stored.
2475 <term>--service=SERVICE</term>
2477 Specify the name of the smb.conf service to use. This option is
2478 required in combination with the --use-s3fs option.
2483 <term>--use-s3fs</term>
2485 Set the ACLs for use with the default s3fs file server via the VFS
2486 layer. This option requires a smb.conf service, specified by the
2487 --service=SERVICE option.
2492 <term>--xattr-backend=[native|tdb]</term>
2494 Specify the xattr backend type (native fs or tdb).
2499 <term>--eadb-file=EADB_FILE</term>
2501 Name of the tdb file where attributes are stored.
2506 <term>--recursive</term>
2508 Set the ACLs for directories and their contents recursively.
2513 <term>--follow-symlinks</term>
2515 Follow symlinks when --recursive is specified.
2520 <term>--verbose</term>
2522 Verbosely list files and ACLs which are being processed.
2530 <title>ntacl get <replaceable>file</replaceable> [options]</title>
2531 <para>Get ACLs on a file.</para>
2535 <title>ntacl set <replaceable>acl</replaceable> <replaceable>file</replaceable> [options]</title>
2536 <para>Set ACLs on a file.</para>
2540 <title>ntacl sysvolcheck</title>
2541 <para>Check sysvol ACLs match defaults (including correct ACLs on GPOs).</para>
2545 <title>ntacl sysvolreset</title>
2546 <para>Reset sysvol ACLs to defaults (including correct ACLs on GPOs).</para>
2551 <para>Manage organizational units (OUs).</para>
2555 <title>ou add <replaceable>ou_dn</replaceable> [options]</title>
2556 <para>Add a new organizational unit.</para>
2557 <para>The name of the organizational unit can be specified as a full DN
2558 or without the domainDN component.</para>
2562 <term>--description=DESCRIPTION</term>
2564 Specify OU's description.
2571 <title>ou create <replaceable>ou_dn</replaceable> [options]</title>
2572 <para>Add a new organizational unit. This is a synonym for the
2573 <command>samba-tool ou add</command> command and is available
2574 for compatibility reasons only. Please use
2575 <command>samba-tool ou add</command> instead.</para>
2579 <title>ou delete <replaceable>ou_dn</replaceable> [options]</title>
2580 <para>Delete an organizational unit.</para>
2581 <para>The name of the organizational unit can be specified as a full DN
2582 or without the domainDN component.</para>
2586 <term>--force-subtree-delete</term>
2588 Delete organizational unit and all children recursively.
2595 <title>ou list [options]</title>
2596 <para>List all organizational units.</para>
2599 <term>--full-dn</term>
2601 Display DNs including the base DN.
2608 <title>ou listobjects <replaceable>ou_dn</replaceable> [options]</title>
2609 <para>List all objects in an organizational unit.</para>
2610 <para>The name of the organizational unit can be specified as a full DN
2611 or without the domainDN component.</para>
2615 <term>--full-dn</term>
2617 Display DNs including the base DN.
2622 <term>-r|--recursive</term>
2624 List objects recursively.
2631 <title>ou move <replaceable>old_ou_dn</replaceable> <replaceable>new_parent_dn</replaceable> [options]</title>
2632 <para>Move an organizational unit.</para>
2633 <para>The name of the organizational units can be specified as a full DN
2634 or without the domainDN component.</para>
2638 <title>ou rename <replaceable>old_ou_dn</replaceable> <replaceable>new_ou_dn</replaceable> [options]</title>
2639 <para>Rename an organizational unit.</para>
2640 <para>The name of the organizational units can be specified as a full DN
2641 or without the domainDN component.</para>
2646 <para>Manage Read-Only Domain Controller (RODC).</para>
2650 <title>rodc preload <replaceable>SID</replaceable>|<replaceable>DN</replaceable>|<replaceable>accountname</replaceable> [options]</title>
2651 <para>Preload one account for an RODC.</para>
2655 <title>schema</title>
2656 <para>Manage and query schema.</para>
2660 <title>schema attribute modify <replaceable>attribute</replaceable> [options]</title>
2661 <para>Modify the behaviour of an attribute in schema.</para>
2665 <title>schema attribute show <replaceable>attribute</replaceable> [options]</title>
2666 <para>Display an attribute schema definition.</para>
2670 <title>schema attribute show_oc <replaceable>attribute</replaceable> [options]</title>
2671 <para>Show objectclasses that MAY or MUST contain this attribute.</para>
2675 <title>schema objectclass show <replaceable>objectclass</replaceable> [options]</title>
2676 <para>Display an objectclass schema definition.</para>
2680 <title>shell</title>
2681 <para>Opens an interactive Samba Python shell.</para>
2685 <title>shell [options]</title>
2686 <para>Opens an interactive Python shell for Samba ldb connection.</para>
2689 <term>-H, --URL</term>
2691 LDB URL for database or target server.
2698 <title>sites</title>
2699 <para>Manage sites.</para>
2703 <title>sites list [options]</title>
2704 <para>List sites.</para>
2709 Output as JSON instead of a list
2716 <title>sites view <replaceable>site</replaceable> [options]</title>
2717 <para>View site details.</para>
2721 <title>sites create <replaceable>site</replaceable> [options]</title>
2722 <para>Create a new site.</para>
2726 <title>sites remove <replaceable>site</replaceable> [options]</title>
2727 <para>Delete an existing site.</para>
2731 <title>sites subnet list <replaceable>site</replaceable> [options]</title>
2732 <para>List subnets for a site.</para>
2737 Output as JSON instead of a list
2744 <title>sites subnet view <replaceable>subnet</replaceable> [options]</title>
2745 <para>View subnet details.</para>
2749 <title>sites subnet create <replaceable>subnet</replaceable> <replaceable>site-of-subnet</replaceable> [options]</title>
2750 <para>Create a new subnet.</para>
2754 <title>sites subnet remove <replaceable>subnet</replaceable> [options]</title>
2755 <para>Delete an existing subnet.</para>
2759 <title>sites subnet set-site <replaceable>subnet</replaceable> <replaceable>site-of-subnet</replaceable> [options]</title>
2760 <para>Assign a subnet to a site.</para>
2765 <para>Manage Service Principal Names (SPN).</para>
2769 <title>spn add <replaceable>name</replaceable> <replaceable>user</replaceable> [options]</title>
2770 <para>Create a new SPN.</para>
2774 <title>spn delete <replaceable>name</replaceable> [<replaceable>user</replaceable>] [options]</title>
2775 <para>Delete an existing SPN.</para>
2779 <title>spn list <replaceable>user</replaceable> [options]</title>
2780 <para>List SPNs of a given user.</para>
2784 <title>testparm</title>
2785 <para>Check the syntax of the configuration file.</para>
2790 <para>Retrieve the time on a server.</para>
2795 <para>Manage users.</para>
2799 <title>user add <replaceable>username</replaceable> [<replaceable>password</replaceable>]</title>
2800 <para>Add a new user to the Active Directory Domain.</para>
2804 <title>user create <replaceable>username</replaceable> [<replaceable>password</replaceable>]</title>
2805 <para>Add a new user. This is a synonym for the
2806 <command>samba-tool user add</command> command and is available
2807 for compatibility reasons only. Please use
2808 <command>samba-tool user add</command> instead.</para>
2812 <title>user delete <replaceable>username</replaceable> [options]</title>
2813 <para>Delete an existing user account.</para>
2817 <title>user disable <replaceable>username</replaceable></title>
2818 <para>Disable a user account.</para>
2822 <title>user edit <replaceable>username</replaceable></title>
2823 <para>Edit a user account AD object.</para>
2827 <term>--editor=EDITOR</term>
2829 Specifies the editor to use instead of the system default, or 'vi' if no
2830 system default is set.
2837 <title>user enable <replaceable>username</replaceable></title>
2838 <para>Enable a user account.</para>
2842 <title>user list</title>
2843 <para>List all users.</para>
2844 <para>By default the user's sAMAccountNames are listed.</para>
2847 <term>--full-dn</term>
2849 List user's distinguished names instead of the sAMAccountNames.
2853 <term>-b BASE_DN|--base-dn=BASE_DN</term>
2855 Specify base DN to use. Only users under the specified base DN will be
2860 <term>--hide-expired</term>
2862 Do not list expired user accounts.
2866 <term>--hide-disabled</term>
2868 Do not list disabled user accounts.
2872 <term>--locked-only</term>
2874 Only list locked user accounts.
2881 <title>user setprimarygroup <replaceable>username</replaceable> <replaceable>primarygroupname</replaceable></title>
2882 <para>Set the primary group a user account.</para>
2886 <title>user getgroups <replaceable>username</replaceable></title>
2887 <para>Get the direct group memberships of a user account.</para>
2891 <title>user show <replaceable>username</replaceable> [options]</title>
2892 <para>Display a user AD object.</para>
2896 <term>--attributes=USER_ATTRS</term>
2898 Comma separated list of attributes, which will be printed.
2905 <title>user move <replaceable>username</replaceable> <replaceable>new_parent_dn</replaceable> [options]</title>
2906 <para>This command moves a user account into the specified
2907 organizational unit or container.</para>
2908 <para>The username specified on the command is the
2909 sAMAccountName.</para>
2910 <para>The name of the organizational unit or container can be
2911 specified as a full DN or without the domainDN component.</para>
2915 <title>user password [options]</title>
2916 <para>Change password for a user account (the one provided in
2917 authentication).</para>
2921 <title>user rename <replaceable>username</replaceable> [options]</title>
2922 <para>Rename a user and related attributes.</para>
2923 <para>This command allows to set the user's name related attributes. The user's
2924 CN will be renamed automatically.
2925 The user's new CN will be made up by combining the given-name, initials
2926 and surname. A dot ('.') will be appended to the initials automatically,
2928 Use the --force-new-cn option to specify the new CN manually and --reset-cn
2929 to reset this change.</para>
2930 <para>Use an empty attribute value to remove the specified attribute.</para>
2931 <para>The username specified on the command is the sAMAccountName.</para>
2935 <term>--surname=SURNAME</term>
2942 <term>--given-name=GIVEN_NAME</term>
2949 <term>--initials=INITIALS</term>
2956 <term>--force-new-cn=NEW_CN</term>
2958 Specify a new CN (RDN) instead of using a combination
2959 of the given name, initials and surname.
2964 <term>--reset-cn</term>
2966 Set the CN to the default combination of given name,
2967 initials and surname.
2972 <term>--display-name=DISPLAY_NAME</term>
2979 <term>--mail-address=MAIL_ADDRESS</term>
2986 <term>--samaccountname=SAMACCOUNTNAME</term>
2988 New account name (sAMAccountName/logon name)
2993 <term>--upn=UPN</term>
2995 New user principal name
3002 <title>user setexpiry <replaceable>username</replaceable> [options]</title>
3003 <para>Set the expiration of a user account.</para>
3007 <title>user setpassword <replaceable>username</replaceable> [options]</title>
3008 <para>Sets or resets the password of a user account.</para>
3012 <title>user unlock <replaceable>username</replaceable> [options]</title>
3013 <para>This command unlocks a user account in the Active Directory
3018 <title>user getpassword <replaceable>username</replaceable> [options]</title>
3019 <para>Gets the password of a user account.</para>
3023 <title>user get-kerberos-ticket <replaceable>username</replaceable> [options]</title>
3024 <para>Gets a Kerberos Ticket Granting Ticket as the account.</para>
3028 <title>user syncpasswords <replaceable>--cache-ldb-initialize</replaceable> [options]</title>
3029 <para>Syncs the passwords of all user accounts, using an optional script.</para>
3030 <para>Note that this command should run on a single domain controller only
3031 (typically the PDC-emulator).</para>
3035 <title>user auth policy assign <replaceable>username</replaceable> [options]</title>
3036 <para>Set assigned authentication policy for user.</para>
3039 <term>--policy</term>
3041 Name of authentication policy to assign or leave empty to remove.
3048 <title>user auth policy remove <replaceable>username</replaceable></title>
3049 <para>Remove assigned authentication policy from user.</para>
3053 <title>user auth policy view <replaceable>username</replaceable></title>
3054 <para>View the assigned authentication policy for user.</para>
3058 <title>user auth silo assign <replaceable>username</replaceable> [options]</title>
3059 <para>Set assigned authentication silo for user.</para>
3064 Name of authentication silo to assign or leave empty to remove.
3071 <title>user auth silo remove <replaceable>username</replaceable></title>
3072 <para>Remove assigned authentication silo from user.</para>
3076 <title>user auth silo view <replaceable>username</replaceable></title>
3077 <para>View the assigned authentication silo for user.</para>
3081 <title>vampire [options] <replaceable>domain</replaceable></title>
3082 <para>Join and synchronise a remote AD domain to the local server.
3083 Please note that <command>samba-tool vampire</command> is deprecated,
3084 please use <command>samba-tool domain join</command> instead.</para>
3088 <title>visualize [options] <replaceable>subcommand</replaceable></title>
3089 <para>Produce graphical representations of Samba network state.
3090 To work out what is happening in a replication graph, it is sometimes
3091 helpful to use visualisations.</para>
3094 There are two subcommands, two graphical modes, and (roughly) two modes
3095 of operation with respect to the location of authority.</para>
3097 <refsect3><title>MODES OF OPERATION</title>
3099 <term>samba-tool visualize ntdsconn</term>
3100 <listitem><para>Looks at NTDS connections.
3105 <term>samba-tool visualize reps</term>
3106 <listitem><para>Looks at repsTo and repsFrom objects.
3111 <term>samba-tool visualize uptodateness</term>
3112 <listitem><para>Looks at replication lag as shown by the
3113 uptodateness vectors.
3118 <refsect3><title>GRAPHICAL MODES</title>
3120 <term>--distance</term>
3121 <listitem><para>Distances between DCs are shown in a matrix in
3128 <listitem><para>Generate Graphviz dot output (for
3129 ntdsconn and reps modes). When viewed using dot or
3130 xdot, this shows the network as a graph with DCs as
3131 vertices and connections edges. Certain types of
3132 degenerate edges are shown in different colours or
3133 line-styles. </para></listitem>
3137 <listitem><para>Generate Graphviz dot output as with
3138 <arg choice="opt">--dot</arg> and attempt to view it
3139 immediately using <command>/usr/bin/xdot</command>.
3146 <listitem><para>Normally,
3147 <command>samba-tool</command> talks to one database;
3148 with the <arg choice="opt">-r</arg> option attempts
3149 are made to contact all the DCs known to the first
3150 database. This is necessary for <command>samba-tool
3151 visualize uptodateness</command> and for
3152 <command>samba-tool visualize reps</command> because
3153 the repsFrom/To objects are not replicated, and it can
3154 reveal replication issues in other modes.
3161 <para>Gives usage information.</para>
3167 <title>VERSION</title>
3169 <para>This man page is complete for version &doc.version; of the Samba
3174 <title>AUTHOR</title>
3176 <para>The original Samba software and related utilities
3177 were created by Andrew Tridgell. Samba is now developed
3178 by the Samba Team as an Open Source project similar
3179 to the way the Linux kernel is developed.</para>