MODIFIED DEFAULT OPTIONS Certain option defaults do not match their respective backend provider defaults, these option names and AD provider-specific defaults are listed below: KRB5 Provider krb5_validate = true krb5_use_enterprise_principal = true LDAP Provider ldap_schema = ad ldap_force_upper_case_realm = true ldap_id_mapping = true ldap_sasl_mech = GSS-SPNEGO ldap_referrals = false ldap_account_expire_policy = ad ldap_use_tokengroups = true ldap_sasl_authid = sAMAccountName@REALM (typically SHORTNAME$@REALM) The AD provider looks for a different principal than the LDAP provider by default, because in an Active Directory environment the principals are divided into two groups - User Principals and Service Principals. Only User Principal can be used to obtain a TGT and by default, computer object's principal is constructed from its sAMAccountName and the AD realm. The well-known host/hostname@REALM principal is a Service Principal and thus cannot be used to get a TGT with. NSS configuration fallback_homedir = /home/%d/%u The AD provider automatically sets "fallback_homedir = /home/%d/%u" to provide personal home directories for users without the homeDirectory attribute. If your AD Domain is properly populated with Posix attributes, and you want to avoid this fallback behavior, you can explicitly set "fallback_homedir = %o". Note that the system typically expects a home directory in /home/%u folder. If you decide to use a different directory structure, some other parts of your system may need adjustments. For example automated creation of home directories in combination with selinux requires selinux adjustment, otherwise the home directory will be created with wrong selinux context.