MODIFIED DEFAULT OPTIONS
Certain option defaults do not match their respective backend
provider defaults, these option names and AD provider-specific
defaults are listed below:
KRB5 Provider
krb5_validate = true
krb5_use_enterprise_principal = true
LDAP Provider
ldap_schema = ad
ldap_force_upper_case_realm = true
ldap_id_mapping = true
ldap_sasl_mech = GSS-SPNEGO
ldap_referrals = false
ldap_account_expire_policy = ad
ldap_use_tokengroups = true
ldap_sasl_authid = sAMAccountName@REALM (typically SHORTNAME$@REALM)
The AD provider looks for a different principal than the
LDAP provider by default, because in an Active Directory
environment the principals are divided into two groups
- User Principals and Service Principals. Only User
Principal can be used to obtain a TGT and by default,
computer object's principal is constructed from
its sAMAccountName and the AD realm. The well-known
host/hostname@REALM principal is a Service Principal
and thus cannot be used to get a TGT with.
NSS configuration
fallback_homedir = /home/%d/%u
The AD provider automatically sets
"fallback_homedir = /home/%d/%u" to provide personal
home directories for users without the homeDirectory
attribute. If your AD Domain is properly
populated with Posix attributes, and you want to avoid
this fallback behavior, you can explicitly
set "fallback_homedir = %o".
Note that the system typically expects a home directory
in /home/%u folder. If you decide to use a different
directory structure, some other parts of your system may
need adjustments.
For example automated creation of home directories in
combination with selinux requires selinux adjustment,
otherwise the home directory will be created with wrong
selinux context.