1 <samba:parameter name="ntlm auth"
4 enumlist="enum_ntlm_auth"
5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc">
7 <para>This parameter determines whether or not <citerefentry><refentrytitle>smbd</refentrytitle>
8 <manvolnum>8</manvolnum></citerefentry> will attempt to
9 authenticate users using the NTLM encrypted password response for
10 this local passdb (SAM or account database). </para>
12 <para>If disabled, both NTLM and LanMan authentication against the
13 local passdb is disabled.</para>
15 <para>Note that these settings apply only to local users,
16 authentication will still be forwarded to and NTLM authentication
17 accepted against any domain we are joined to, and any trusted
18 domain, even if disabled or if NTLMv2-only is enforced here. To
19 control NTLM authentication for domain users, this option must
20 be configured on each DC.</para>
22 <para>By default with <command moreinfo="none">ntlm auth</command> set to
23 <constant>ntlmv2-only</constant> only NTLMv2 logins will be
24 permitted. All modern clients support NTLMv2 by default, but some older
25 clients will require special configuration to use it.</para>
27 <para>The primary user of NTLMv1 is MSCHAPv2 for VPNs and 802.1x.</para>
29 <para>The available settings are:</para>
33 <para><constant>ntlmv1-permitted</constant>
34 (alias <constant>yes</constant>) - Allow NTLMv1 and above for all clients.</para>
36 <para>This is the required setting to enable the <parameter
37 moreinfo="none">lanman auth</parameter> parameter.</para>
42 <para><constant>ntlmv2-only</constant>
43 (alias <constant>no</constant>) - Do not allow NTLMv1 to be used,
44 but permit NTLMv2.</para>
48 <para><constant>mschapv2-and-ntlmv2-only</constant> - Only
49 allow NTLMv1 when the client promises that it is providing
50 MSCHAPv2 authentication (such as the <command
51 moreinfo="none">ntlm_auth</command> tool).</para>
55 <para><constant>disabled</constant> - Do not accept NTLM (or
56 LanMan) authentication of any level, nor permit
57 NTLM password changes.</para>
59 <para><emphasis>WARNING:</emphasis> Both Microsoft Windows
60 and Samba <emphasis>Read Only Domain Controllers</emphasis>
61 (RODCs) convert a plain-text LDAP Simple Bind into an NTLMv2
62 authentication to forward to a full DC. Setting this option
63 to <constant>disabled</constant> will cause these forwarded
64 authentications to fail.</para>
66 <para>Additionally, for Samba acting as an Active Directory
67 Domain Controller, for user accounts, if <parameter moreinfo="none">nt hash store</parameter>
68 is set to the default setting of <constant>auto</constant>,
69 the <emphasis>NT hash will not be stored</emphasis>
70 in the sam.ldb database for new users and after a
71 password change.</para>
77 <para>The default changed from <constant>yes</constant> to
78 <constant>no</constant> with Samba 4.5. The default changed again
79 to <constant>ntlmv2-only</constant> with Samba 4.7, however the
80 behaviour is unchanged.</para>
83 <related>nt hash store</related>
84 <related>lanman auth</related>
85 <related>raw NTLMv2 auth</related>
86 <value type="default">ntlmv2-only</value>